Sciweavers

318 search results - page 9 / 64
» A New Family of Authentication Protocols
Sort
View
79
Voted
INDOCRYPT
2009
Springer
15 years 7 months ago
Two Attacks against the Ff RFID Protocol
This paper investigates a new family of RFID protocols called Ff that grew out of a proposal made at ESORICS 2007. This family has the property of having highly efficient implement...
Olivier Billet, Kaoutar Elkhiyaoui
100
Voted
CISC
2009
Springer
154views Cryptology» more  CISC 2009»
14 years 10 months ago
Efficient Generalized Selective Private Function Evaluation with Applications in Biometric Authentication
In a selective private function evaluation (SPFE) protocol, the client privately computes some predefined function on his own input and on m out of server's n database element...
Helger Lipmaa, Bingsheng Zhang
90
Voted
WWW
2009
ACM
16 years 1 months ago
PAKE-based mutual HTTP authentication for preventing phishing attacks
We developed a new Web authentication protocol with passwordbased mutual authentication which prevents various kinds of phishing attacks. This protocol provides a protection of us...
Yutaka Oiwa, Hiromitsu Takagi, Hajime Watanabe, Hi...
CORR
2010
Springer
142views Education» more  CORR 2010»
15 years 15 days ago
A Fault Analytic Method against HB+
The search for lightweight authentication protocols suitable for low-cost RFID tags constitutes an active and challenging research area. In this context, a family of protocols base...
Jose Carrijo, Rafael Tonicelli, Anderson C. A. Nas...
82
Voted
DCC
2010
IEEE
15 years 15 days ago
Practical unconditionally secure two-channel message authentication
We investigate unconditional security for message authentication protocols that are designed using two-channel cryptography. We look at both noninteractive message authentication ...
Atefeh Mashatan, Douglas R. Stinson