Sciweavers

1018 search results - page 19 / 204
» Remote User Authentication Using Public Information
Sort
View
JCS
2011
126views more  JCS 2011»
14 years 6 months ago
Authentication protocols based on low-bandwidth unspoofable channels: A comparative survey
One of the main challenges in pervasive computing is how we can establish secure communication over an untrusted high-bandwidth network without any initial knowledge or a Public K...
L. H. Nguyen, A. W. Roscoe
NDSS
2003
IEEE
15 years 5 months ago
Proactive Two-Party Signatures for User Authentication
We study proactive two-party signature schemes in the context of user authentication. A proactive two-party signature scheme (P2SS) allows two parties—the client and the serverâ...
Antonio Nicolosi, Maxwell N. Krohn, Yevgeniy Dodis...
SOUPS
2009
ACM
15 years 6 months ago
Look into my eyes!: can you guess my password?
Authentication systems for public terminals – and thus public spaces – have to be fast, easy and secure. Security is of utmost importance since the public setting allows manif...
Alexander De Luca, Martin Denzel, Heinrich Hussman...
ACSAC
2009
IEEE
15 years 6 months ago
Privacy through Noise: A Design Space for Private Identification
To protect privacy in large systems, users must be able to authenticate against a central server without disclosing their identity to the network. Private identification protocols ...
Karsten Nohl, David Evans
KES
2006
Springer
14 years 11 months ago
Interaction Between Small Size Device and Large Screen in Public Space
We propose a simple way to interact with a large screen which is situated in a public space by using a small size device. In order to get the connection information easily, we use ...
Chunming Jin, Shin Takahashi, Jiro Tanaka