Sciweavers

10 search results - page 2 / 2
» Cryptanalysis of a Cognitive Authentication Scheme (Extended...
Sort
View
CISC
2009
Springer
199views Cryptology» more  CISC 2009»
13 years 3 months ago
Cryptanalysis of Certificateless Signcryption Schemes and an Efficient Construction without Pairing
Abstract. Certificateless cryptography introduced by Al-Riyami and Paterson eliminates the key escrow problem inherent in identity based cryptosystems. Even though building practic...
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Ra...
ISPA
2005
Springer
13 years 10 months ago
Storage-Optimal Key Sharing with Authentication in Sensor Networks
Abstract. Wireless Sensor Networks are edging closer to widespread feasibility with recent research showing promising results in developing and adapting new mechanisms to suit thei...
Jian Wang, Zhengyou Xia, Lein Harn, Guihai Chen
IACR
2011
221views more  IACR 2011»
12 years 5 months ago
A Novel RFID Distance Bounding Protocol Based on Physically Unclonable Functions
Abstract. Radio Frequency Identification (RFID) systems are vulnerable to relay attacks (i.e., mafia, terrorist and distance frauds) when they are used for authentication purpose...
Süleyman Kardas, Mehmet Sabir Kiraz, Muhammed...
EJC
2007
13 years 6 months ago
On the Construction of Ontologies based on Natural Language Semantic
instrumental roles in titles of medical abstracts: a combined conceptual and modelling UML approach Topic – This paper provides a detailed description of the instrumental role in...
Terje Aaberge
SSS
2009
Springer
195views Control Systems» more  SSS 2009»
13 years 12 months ago
Anonymous Transactions in Computer Networks
Abstract. We present schemes for providing anonymous transactions while privacy and anonymity are preserved, providing user anonymous authentication in distributed networks such as...
Shlomi Dolev, Marina Kopeetsky