Sciweavers

5488 search results - page 69 / 1098
» On the Secure Implementation of Security Protocols
Sort
View
ASIACRYPT
2001
Springer
15 years 3 months ago
Secure Human Identification Protocols
One interesting and important challenge for the cryptologic community is that of providing secure authentication and identification for unassisted humans. There are a range of prot...
Nicholas J. Hopper, Manuel Blum
ACISP
2001
Springer
15 years 4 months ago
Elliptic Curve Cryptography on a Palm OS Device
The market for Personal Digital Assistants (PDA) is growing rapidly and PDAs are becoming increasingly interesting for commercial transactions. One requirement for further growing ...
André Weimerskirch, Christof Paar, Sheuelin...
ACSAC
2003
IEEE
15 years 3 months ago
Scalable and Efficient PKI for Inter-Organizational Communication
We propose an efficient and flexible system for a secure and authentic data exchange in a multiinstitutional environment, where the institutions maintain different databases and p...
Arne Ansper, Ahto Buldas, Margus Freudenthal, Jan ...
WISTP
2010
Springer
14 years 9 months ago
Efficient Mutual Authentication for Multi-domain RFID Systems Using Distributed Signatures
Abstract. The use of RFID technology in complex and distributed environments often leads to a multi-domain RFID system in which security issues such as authentication of tags and r...
Michael Braun, Ulrike Meyer, Susanne Wetzel
CCS
2003
ACM
15 years 5 months ago
Fast automatic synthesis of security protocols using backward search
Ò ÙØÓÑ Ø × ÙÖ ØÝ ÔÖÓØÓ ÓÐ Ò Ö ØÓÖ × ÔÖÓÔÓ× Ø Ø Ù× × ÐÓ ¹ × ×ÝÒØ × × ÖÙÐ × ØÓ Ù Ø Ò Û Ö × Ö ÓÖ ×Ù Ø Ð ÔÖÓØÓ Ó...
Hongbin Zhou, Simon N. Foley