Sciweavers

110 search results - page 2 / 22
» ijnsec 2006
Sort
View
IJNSEC
2007
79views more  IJNSEC 2007»
13 years 5 months ago
A Novel Approach to Hide Credentials
Zhensong Liao, Hai Jin, Deqing Zou, Weizhong Qiang
IJNSEC
2006
80views more  IJNSEC 2006»
13 years 5 months ago
Side Channel Analysis on Biometric-based Key Generation Algorithms on Resource Constrained Devices
Side channel analysis is a technique that enables the adversary to benefit from information leakages occurring due to the implementation of encryption algorithms on
Dimitrios L. Delivasilis, Sokratis K. Katsikas
IJNSEC
2006
94views more  IJNSEC 2006»
13 years 5 months ago
Attacks on An ISO/IEC 11770-2 Key Establishment Protocol
Two possible types of attack (a replay attack and a type attack) on a key establishment protocol (mechanism 12) standardised in ISO/IEC 11770-2 are described and two solutions are...
Zhaohui Cheng, Richard Comley
IJNSEC
2008
122views more  IJNSEC 2008»
13 years 4 months ago
A Zero-knowledge Undeniable Signature Scheme in Non-abelian Group Setting
Recently non-abelian groups have attracted the attention of cryptographers for constructing public-key cryptographic protocols. In this paper we use the conjugacy problem in non-a...
Tony Thomas, Arbind K. Lal