Sciweavers

7 search results - page 2 / 2
» A gesture-based authentication scheme for untrusted public t...
Sort
View
PERCOM
2005
ACM
15 years 11 months ago
Security Parallels between People and Pervasive Devices
Unique and challenging security problems arise due to the scarcity of computational, storage, and power resources in the low-cost pervasive computing environment. Particularly rel...
Stephen A. Weis
PKC
2009
Springer
129views Cryptology» more  PKC 2009»
15 years 4 months ago
Zero-Knowledge Proofs with Witness Elimination
Abstract. Zero-knowledge proofs with witness elimination are protocols that enable a prover to demonstrate knowledge of a witness to the verifier that accepts the interaction prov...
Aggelos Kiayias, Hong-Sheng Zhou