Sciweavers

1116 search results - page 82 / 224
» Key Agreement Using Statically Keyed Authenticators
Sort
View
111
Voted
ICISS
2007
Springer
15 years 4 months ago
A Zero Knowledge Password Proof Mutual Authentication Technique Against Real-Time Phishing Attacks
Phishing attack is a kind of identity theft trying to steal confidential data. Existing approaches against phishing attacks cannot prevent real-time phishing attacks. This paper pr...
Mohsen Sharifi, Alireza Saberi, Mojtaba Vahidi, Mo...
80
Voted
ECIS
2000
15 years 2 months ago
Authentic Intervention in Information Systems Practice
In this paper the philosophical concept of authenticity is used as a framing device for providing an interpretation of aspects of both ethical and practical action on the part of i...
Robert A. Stephens, Stephen K. Probert
IFIP
2004
Springer
15 years 6 months ago
Static program transformations for efficient software model checking
Ensuring correctness of software by formal methods is a very relevant and widely studied problem. Automatic verification of software using model checkers from the state space exp...
Shobha Vasudevan, Jacob A. Abraham
119
Voted
CSREASAM
2009
14 years 10 months ago
A Secure Certificate for Secure Group Communication
- Security is a primary concern in group communication, and secure authentication is essential to establishing a secure group communication. Most conventional authentications consi...
Sunghyuck Hong
AINA
2005
IEEE
15 years 6 months ago
Authenticated Encryption Schemes with Message Linkage for Threshold Signatures
Based on the factorization problem, a modified (t, n) threshold group-oriented scheme with message recovery is proposed. In the proposed scheme, any combination of more than t mem...
Chi-Hsiung Huang, Chia-Yin Lee, Chu-Hsing Lin, Chi...