Sciweavers

2399 search results - page 8 / 480
» On Authentication between Human and Computer
Sort
View
ASIACRYPT
2001
Springer
15 years 5 months ago
Efficient and Mutually Authenticated Key Exchange for Low Power Computing Devices
Abstract. In this paper, we consider the problem of mutually authenticated key exchanges between a low-power client and a powerful server. We show how the Jakobsson-Pointcheval sch...
Duncan S. Wong, Agnes Hui Chan
CHI
2006
ACM
16 years 2 months ago
Theatre as an intermediary between users and CHI designers
Alan F. Newell, M. E. Morgan, Peter Gregor, Alex C...
ESAS
2007
Springer
15 years 5 months ago
The Candidate Key Protocol for Generating Secret Shared Keys from Similar Sensor Data Streams
Secure communication over wireless channels necessitates authentication of communication partners to prevent man-in-the-middle attacks. For spontaneous interaction between independ...
Rene Mayrhofer