Sciweavers

255 search results - page 1 / 51
» Principles for Entity Authentication
Sort
View
ERSHOV
2003
Springer
13 years 10 months ago
Principles for Entity Authentication
We study the roles of message components in authentication protocols. In particular, we investigate how a certain component contributes to the task of achieving entity authenticati...
Michele Bugliesi, Riccardo Focardi, Matteo Maffei
POST
2012
181views more  POST 2012»
12 years 7 days ago
Provably Repairing the ISO/IEC 9798 Standard for Entity Authentication
Abstract. We formally analyze the family of entity authentication protocols defined by the ISO/IEC 9798 standard and find numerous weaknesses, both old and new, including some th...
David A. Basin, Cas J. F. Cremers, Simon Meier
FC
2005
Springer
110views Cryptology» more  FC 2005»
13 years 10 months ago
Approximate Message Authentication and Biometric Entity Authentication
Approximate Message Authentication Code (AMAC) is a recently introduced cryptographic primitive with several applications in the areas of cryptography and coding theory. Briefly s...
Giovanni Di Crescenzo, R. F. Graveman, Renwei Ge, ...
HUC
2007
Springer
13 years 10 months ago
Ninja: Non Identity Based, Privacy Preserving Authentication for Ubiquitous Environments
Most of today’s authentication schemes involve verifying the identity of a principal in some way. This process is commonly known as entity authentication. In emerging ubiquitous ...
Adrian Leung, Chris J. Mitchell
ESWS
2008
Springer
13 years 6 months ago
The Principle of Self-Description: Identity Through Linking
Abstract. If one wants to have a scheme for identifying non-Web accessible entities, should it be centralized or decentralized? Given a URI, how can one tell if it refers to a web ...
Harry Halpin