Sciweavers

1018 search results - page 15 / 204
» Remote User Authentication Using Public Information
Sort
View
PERVASIVE
2007
Springer
15 years 5 months ago
Shake Well Before Use: Authentication Based on Accelerometer Data
Abstract. Small, mobile devices without user interfaces, such as Bluetooth headsets, often need to communicate securely over wireless networks. Active attacks can only be prevented...
Rene Mayrhofer, Hans Gellersen
TC
2008
14 years 11 months ago
Computationally Efficient PKI-Based Single Sign-On Protocol, PKASSO for Mobile Devices
In an attempt to expand Public Key Infrastructure (PKI) usage to a ubiquitous and mobile computing environment, we found that the deployment of the PKI on a resource-constrained de...
Ki-Woong Park, Sang Seok Lim, Kyu Ho Park
SACI
2007
IEEE
15 years 6 months ago
Implementation of an Authentication Protocol for Sending Audio-Video Information in Java
— an application for assuring the authenticity of audio-video information is developed. The application is implemented in Java by using Java Media Framework to send audio and vid...
Bogdan Groza, Dorina Petrica, Simona Barbu, Marian...
EUROPKI
2004
Springer
15 years 5 months ago
Flexible and Scalable Public Key Security for SSH
Abstract. A standard tool for secure remote access, the SSH protocol uses publickey cryptography to establish an encrypted and integrity-protected channel with a remote server. How...
Yasir Ali, Sean W. Smith
ACNS
2005
Springer
93views Cryptology» more  ACNS 2005»
15 years 5 months ago
Messin' with Texas Deriving Mother's Maiden Names Using Public Records
We have developed techniques to automatically infer mother's maiden names from public records. We demonstrate our techniques using publicly available records from the state o...
Virgil Griffith, Markus Jakobsson