Sciweavers

286 search results - page 2 / 58
» Authentication in the Taos Operating System
Sort
View
IJNSEC
2010
143views more  IJNSEC 2010»
13 years 18 days ago
A New Secure Remote User Authentication Scheme with Smart Cards
Remote user authentication scheme is one of the simplest and the most convenient authentication mechanisms to deal with secret data over insecure networks. These types of schemes ...
Manoj Kumar
JCS
2011
156views more  JCS 2011»
13 years 22 days ago
Securing low-cost RFID systems: An unconditionally secure approach
We explore a new direction towards solving the identity authentication problem in RFID systems. We break the RFID authentication process into two main problems: message authenticat...
Basel Alomair, Loukas Lazos, Radha Poovendran
SOSP
1989
ACM
13 years 7 months ago
A Logic of Authentication
Michael Burrows, Martín Abadi, Roger M. Nee...
NDSS
2005
IEEE
13 years 11 months ago
Pretty Secure BGP, psBGP
The Border Gateway Protocol (BGP) is an IETF standard inter-domain routing protocol on the Internet. However, it is well known that BGP is vulnerable to a variety of attacks, and ...
Tao Wan, Evangelos Kranakis, Paul C. van Oorschot
ESORICS
2004
Springer
13 years 11 months ago
Parameterized Authentication
We describe an approach to sensor-based authentication that can adapt to accommodate incomplete, unreliable, or inaccurate input provided to the system. Parameterized Authenticatio...
Michael J. Covington, Mustaque Ahamad, Irfan A. Es...