125
click to vote
ACISP
15 years 6 months ago
2008 Springer
Abstract. We propose a new hybrid protocol for cryptographically secure biometric authentication. The main advantages of the proposed protocol over previous solutions can be summar...
103
Voted
ACISP
15 years 6 months ago
2008 Springer
Abstract. Permission-role assignment is an important issue in rolebased access control (RBAC). There are two types of problems that may arise in permission-role assignment. One is ...
107
click to vote
ACISP
15 years 6 months ago
2008 Springer
The elastic block cipher design employs the round function of a given, b-bit block cipher in a black box fashion, embedding it in a network structure to construct a family of ciphe...
114
click to vote
ACISP
15 years 6 months ago
2008 Springer
The standard solution for mutual authentication between human users and servers on the Internet is to execute a TLS handshake during which the server authenticates using a X.509 ce...
107
click to vote
ACISP
15 years 2 months ago
2008 Springer
We consider one-round key exchange protocols secure in the standard model. The security analysis uses the powerful security model of Canetti and Krawczyk and a natural extension of...
|