154
Voted
ACISP
15 years 10 months ago
2008 Springer
Abstract. We propose a new hybrid protocol for cryptographically secure biometric authentication. The main advantages of the proposed protocol over previous solutions can be summar...
135
Voted
ACISP
15 years 10 months ago
2008 Springer
Abstract. Permission-role assignment is an important issue in rolebased access control (RBAC). There are two types of problems that may arise in permission-role assignment. One is ...
138
Voted
ACISP
15 years 10 months ago
2008 Springer
The elastic block cipher design employs the round function of a given, b-bit block cipher in a black box fashion, embedding it in a network structure to construct a family of ciphe...
146
Voted
ACISP
15 years 10 months ago
2008 Springer
The standard solution for mutual authentication between human users and servers on the Internet is to execute a TLS handshake during which the server authenticates using a X.509 ce...
129
Voted
ACISP
15 years 5 months ago
2008 Springer
We consider one-round key exchange protocols secure in the standard model. The security analysis uses the powerful security model of Canetti and Krawczyk and a natural extension of...
|