Sciweavers

691 search results - page 49 / 139
» A New Security Model for Authenticated Key Agreement
Sort
View
STOC
2010
ACM
193views Algorithms» more  STOC 2010»
15 years 5 months ago
Privacy Amplification with Asymptotically Optimal Entropy Loss
We study the problem of "privacy amplification": key agreement between two parties who both know a weak secret w, such as a password. (Such a setting is ubiquitous on th...
Nishanth Chandran, Bhavana Kanukurthi, Rafail Ostr...
COMCOM
2000
79views more  COMCOM 2000»
15 years 1 months ago
Jikzi - a new framework for security policy, trusted publishing and electronic commerce
In this paper, we describe a thread of research which we have followed off and on at Cambridge for about three years. Our topic is the security of electronic documents, in the bro...
Ross J. Anderson, Jong-Hyeon Lee
BPM
2003
Springer
102views Business» more  BPM 2003»
15 years 6 months ago
A Process-Oriented Model for Authentication on the Basis of a Coloured Petri Net
Abstract. Public-key cryptography is a prerequisite for security in distributed systems and for reliable electronic commerce. The protection of public keys against attacks is the A...
Peter Lory
ACNS
2006
Springer
121views Cryptology» more  ACNS 2006»
15 years 7 months ago
Authentication for Paranoids: Multi-party Secret Handshakes
In a society increasingly concerned with the steady assault on electronic privacy, the need for privacy-preserving techniques is both natural and justified. This need extends to t...
Stanislaw Jarecki, Jihye Kim, Gene Tsudik
ICPR
2006
IEEE
16 years 2 months ago
New Experiments on ICP-Based 3D Face Recognition and Authentication
In this paper, we discuss new experiments on face recognition and authentication based on dimensional surface matching. While most of existing methods use facial intensity images,...
Boulbaba Ben Amor, Liming Chen, Mohsen Ardabilian