Sciweavers

56 search results - page 7 / 12
» A Protocol for Programmable Smart Cards
Sort
View
89
Voted
FC
2000
Springer
83views Cryptology» more  FC 2000»
15 years 1 months ago
Secret Key Authentication with Software-Only Verification
Abstract Two protocols for authentication based on symmetric key cryptography are described, where the verifier can be implemented in software completely, without the need for secu...
Jaap-Henk Hoepman
ISVLSI
2008
IEEE
129views VLSI» more  ISVLSI 2008»
15 years 3 months ago
Smart-NICs: Power Proxying for Reduced Power Consumption in Network Edge Devices
The number of edge devices connected to the Internet is increasing at a rapid rate. To maintain network connectivity, the majority of these devices remain completely powered on wh...
Karthik Sabhanatarajan, Ann Gordon-Ross, Mark Oden...
NDSS
1999
IEEE
15 years 1 months ago
Secure Password-Based Protocol for Downloading a Private Key
We present protocols that allow a user Alice, knowing only her name and password, and not carrying a smart card, to "log in to the network" from a "generic" wo...
Radia J. Perlman, Charlie Kaufman
CCS
2007
ACM
15 years 3 months ago
Detecting relay attacks with timing-based protocols
Distance bounding protocols have been proposed as means of detecting relay attacks, also known as mafia fraud. In this paper we present the first symmetric key based distance bou...
Jason Reid, Juan Manuel González Nieto, Tee...
ACSAC
2000
IEEE
15 years 1 months ago
Applications in Health Care using Public-Key Certificates and Attribute Certificates
Security infrastructures are increasingly used in the health care and welfare sector, particularly for providing security, like confidentiality, authenticity, integrity, nonrepudi...
Petra Wohlmacher, Peter Pharow