Sciweavers

24529 search results - page 167 / 4906
» Computing on Authenticated Data
Sort
View
IACR
2011
121views more  IACR 2011»
14 years 2 months ago
Two RFID Privacy Models in Front of a Court
In ASIACRYPT 2007, Vaudenay proposed a comprehensive privacy model for unilateral RFID schemes. Soon after, in ASIACCS 2008, Paise and Vaudenay presented a new version of the cited...
Mohammad Hassan Habibi, Mohammad Reza Aref
FOCS
2005
IEEE
15 years 8 months ago
The Complexity of Online Memory Checking
We consider the problem of storing a large file on a remote and unreliable server. To verify that the file has not been corrupted, a user could store a small private (randomized...
Moni Naor, Guy N. Rothblum
ICIP
1999
IEEE
16 years 4 months ago
Deformable Matching of Hand Shapes for User Verification
Wepresent a method for personal authentication based on deformable matching of hand shapes. Authentication systems are already employed in domains that require some sort of user v...
Anil K. Jain, Nicolae Duta
IDTRUST
2009
ACM
15 years 10 months ago
Personal identity verification (PIV) cards as federated identities: challenges and opportunities
In this paper, we describe the challenges in using Personal Identity Verification (PIV) cards and PIV-like cards as federated identities to authenticate to US Federal government f...
Sarbari Gupta
ASIACRYPT
2006
Springer
15 years 6 months ago
A Scalable Password-Based Group Key Exchange Protocol in the Standard Model
This paper presents a secure constant-round password-based group key exchange protocol in the common reference string model. Our protocol is based on the group key exchange protoco...
Michel Abdalla, David Pointcheval