Sciweavers

35 search results - page 1 / 7
» LOKI - A Cryptographic Primitive for Authentication and Secr...
Sort
View
ASIACRYPT
1990
Springer
13 years 8 months ago
LOKI - A Cryptographic Primitive for Authentication and Secrecy Applications
Lawrence Brown, Josef Pieprzyk, Jennifer Seberry
CCS
2001
ACM
13 years 9 months ago
The faithfulness of abstract protocol analysis: message authentication
hfulness of Abstract Protocol Analysis: Message Authentication∗ Joshua D. Guttman F. Javier Thayer Lenore D. Zuck December 18, 2002 Dolev and Yao initiated an approach to studyi...
Joshua D. Guttman, F. Javier Thayer, Lenore D. Zuc...
JCS
2011
156views more  JCS 2011»
12 years 11 months ago
Securing low-cost RFID systems: An unconditionally secure approach
We explore a new direction towards solving the identity authentication problem in RFID systems. We break the RFID authentication process into two main problems: message authenticat...
Basel Alomair, Loukas Lazos, Radha Poovendran
IH
2007
Springer
13 years 11 months ago
Security of Invertible Media Authentication Schemes Revisited
Abstract. Dittmann, Katzenbeisser, Schallhart and Veith (IACR ePrint 2004) introduced the notion of invertible media authentication schemes, embedding authentication data in media ...
Daniel Dönigus, Stefan Endler, Marc Fischlin,...
JCSS
2006
102views more  JCSS 2006»
13 years 4 months ago
Password-based authentication and key distribution protocols with perfect forward secrecy
In an open networking environment, a workstation usually needs to identify its legal users for providing its services. Kerberos provides an efficient approach whereby a trusted th...
Hung-Min Sun, Her-Tyan Yeh