Sciweavers

2363 search results - page 50 / 473
» How Secure is RFID
Sort
View
PET
2009
Springer
15 years 10 months ago
Vida: How to Use Bayesian Inference to De-anonymize Persistent Communications
We present the Vida family of abstractions of anonymous communication systems, model them probabilistically and apply Bayesian inference to extract patterns of communications and u...
George Danezis, Carmela Troncoso
IWSEC
2007
Springer
15 years 10 months ago
How to Find Many Collisions of 3-Pass HAVAL
The hash function HAVAL is an Australian extension of well known Merkle-Damg˚ard hash functions such as MD4 and MD5. It has three variants, 3-, 4- and 5-pass HAVAL. On 3-pass HAVA...
Kazuhiro Suzuki, Kaoru Kurosawa
TRUSTBUS
2007
Springer
15 years 10 months ago
How to Use ISO/IEC 24727-3 with Arbitrary Smart Cards
The forthcoming ISO/IEC 24727 series of standards defines application programming interfaces for smart cards and is expected to provide a major contribution to the global interope...
Detlef Hühnlein, Manuel Bach
PKC
2004
Springer
150views Cryptology» more  PKC 2004»
15 years 9 months ago
Undeniable Signatures Based on Characters: How to Sign with One Bit
We present a new undeniable signature scheme which is based on the computation of characters. Our signature scheme offers the advantage of having an arbitrarily short signature. I...
Jean Monnerat, Serge Vaudenay
ICIAR
2010
Springer
15 years 9 months ago
Two-Factor Authentication or How to Potentially Counterfeit Experimental Results in Biometric Systems
Two-factor authentication has been introduced in order to enhance security in authentication systems. Different factors have been introduced, which are combined for means of contr...
Christian Rathgeb, Andreas Uhl