Sciweavers

631 search results - page 1 / 127
» Strong Authentication and Strong Integrity (SASI) Is Not Tha...
Sort
View
RFIDSEC
2010
13 years 3 months ago
Strong Authentication and Strong Integrity (SASI) Is Not That Strong
In this work, we present a practical passive attack on SASI, an ultra-lightweight mutual authentication protocol for RFID. This attack can be used to reveal with overwhelming proba...
Gildas Avoine, Xavier Carpent, Benjamin Martin 000...
WWW
2006
ACM
14 years 5 months ago
Strong authentication in web proxies
In this paper we present a way to integrate web proxies with smart card based authentication systems. Categories and Subject Descriptors K.6.5 [Security and Protection]: Authentic...
Domenico Rotiroti
PKC
2012
Springer
255views Cryptology» more  PKC 2012»
11 years 7 months ago
Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices
Abstract. An unresolved problem in research on authenticated key exchange (AKE) is to construct a secure protocol against advanced attacks such as key compromise impersonation and ...
Atsushi Fujioka, Koutarou Suzuki, Keita Xagawa, Ka...
IJNSEC
2006
122views more  IJNSEC 2006»
13 years 5 months ago
A Hash-based Strong Password Authentication Protocol with User Anonymity
Password authentication protocols range from complex public-key cryptosystems to simple hash-based password authentication schemes. One common feature of these protocols is that t...
Kumar V. Mangipudi, Rajendra S. Katti
ACISP
2008
Springer
13 years 11 months ago
Enforcing User-Aware Browser-Based Mutual Authentication with Strong Locked Same Origin Policy
The standard solution for mutual authentication between human users and servers on the Internet is to execute a TLS handshake during which the server authenticates using a X.509 ce...
Sebastian Gajek, Mark Manulis, Jörg Schwenk