Sciweavers

2399 search results - page 8 / 480
» On Authentication between Human and Computer
Sort
View
ASIACRYPT
2001
Springer
15 years 1 months ago
Efficient and Mutually Authenticated Key Exchange for Low Power Computing Devices
Abstract. In this paper, we consider the problem of mutually authenticated key exchanges between a low-power client and a powerful server. We show how the Jakobsson-Pointcheval sch...
Duncan S. Wong, Agnes Hui Chan
CHI
2006
ACM
15 years 10 months ago
Theatre as an intermediary between users and CHI designers
Alan F. Newell, M. E. Morgan, Peter Gregor, Alex C...
ESAS
2007
Springer
15 years 1 months ago
The Candidate Key Protocol for Generating Secret Shared Keys from Similar Sensor Data Streams
Secure communication over wireless channels necessitates authentication of communication partners to prevent man-in-the-middle attacks. For spontaneous interaction between independ...
Rene Mayrhofer