Sciweavers

1656 search results - page 3 / 332
» Secure Computation Without Authentication
Sort
View
EUROCRYPT
2003
Springer
13 years 11 months ago
On the Limitations of Universally Composable Two-Party Computation without Set-up Assumptions
The recently proposed universally composable (UC) security framework for analyzing security of cryptographic protocols provides very strong security guarantees. In particular, a p...
Ran Canetti, Eyal Kushilevitz, Yehuda Lindell
PERVASIVE
2007
Springer
13 years 12 months ago
Shake Well Before Use: Authentication Based on Accelerometer Data
Abstract. Small, mobile devices without user interfaces, such as Bluetooth headsets, often need to communicate securely over wireless networks. Active attacks can only be prevented...
Rene Mayrhofer, Hans Gellersen
ACSAC
1998
IEEE
13 years 10 months ago
The Solar Trust Model: Authentication Without Limitation
Michael Clifford, C. Lavine, Matt Bishop
QUANTUMCOMM
2009
Springer
14 years 9 days ago
The Case for Quantum Key Distribution
Quantum key distribution (QKD) promises secure key agreement by using quantum mechanical systems. We argue that QKD will be an important part of future cryptographic infrastructur...
Douglas Stebila, Michele Mosca, Norbert Lütke...
FC
2005
Springer
98views Cryptology» more  FC 2005»
13 years 11 months ago
Secure Biometric Authentication for Weak Computational Devices
This paper presents computationally “lightweight” schemes for performing biometric authentication that carry out the comparison stage without revealing any information that can...
Mikhail J. Atallah, Keith B. Frikken, Michael T. G...