Sciweavers

4 search results - page 1 / 1
» Password-Authenticated Session-Key Generation on the Interne...
Sort
View
CRYPTO
2010
Springer
140views Cryptology» more  CRYPTO 2010»
13 years 5 months ago
Password-Authenticated Session-Key Generation on the Internet in the Plain Model
Vipul Goyal, Abhishek Jain 0002, Rafail Ostrovsky
ACISP
2010
Springer
13 years 6 months ago
One-Time-Password-Authenticated Key Exchange
To reduce the damage of phishing and spyware attacks, banks, governments, and other security-sensitive industries are deploying one-time password systems, where users have many pa...
Kenneth G. Paterson, Douglas Stebila
ISADS
1999
IEEE
13 years 9 months ago
A Secure Key Registration System based on Proactive Secret-Sharing Scheme
We designed a secure key registration system based on the proactive secret-sharing scheme. A user can register important data such as a session key to a distributed system in a (t...
Masayuki Numao
OTM
2009
Springer
13 years 11 months ago
The Constellation Query Language
Collaboration in modeling is essential to success, but ORM diagrams intimidate many business people, and most would never install an ORM modeling tool on their computers. The Const...
Clifford Heath