Sciweavers

151 search results - page 2 / 31
» Secure Human Identification Protocols
Sort
View
ISW
2010
Springer
13 years 3 months ago
Cryptanalysis of the Convex Hull Click Human Identification Protocol
Recently a convex hull based human identification protocol was proposed by Sobrado and Birget, whose steps can be performed by humans without additional aid. The main part of the p...
Hassan Jameel Asghar, Shujun Li, Josef Pieprzyk, H...
GECCO
2006
Springer
202views Optimization» more  GECCO 2006»
13 years 9 months ago
Human competitive security protocols synthesis
This poster paper outlines a method for a search based approach to the development of provably correct protocols. Categories and Subject Descriptors C.2.2 [Computer Communication ...
Hao Chen, John A. Clark, Jeremy Jacob
ESORICS
2008
Springer
13 years 7 months ago
Improved Security Notions and Protocols for Non-transferable Identification
Abstract. Different security notions and settings for identification protocols have been proposed so far, considering different powerful adversaries that can play "man-in-the-...
Carlo Blundo, Giuseppe Persiano, Ahmad-Reza Sadegh...
CHI
2010
ACM
14 years 5 days ago
Real time eye movement identification protocol
Do Hyong Koh, Sandeep A. Munikrishne Gowda, Oleg V...
ADHOCNOW
2009
Springer
13 years 6 months ago
Secure EPC Gen2 Compliant Radio Frequency Identification
The increased functionality of EPC Class1 Gen2 (EPCGen2) is making this standard a de facto specification for inexpensive tags in the RFID industry. Recently three EPCGen2 complian...
Mike Burmester, Breno de Medeiros, Jorge Munilla, ...