Sciweavers

1656 search results - page 64 / 332
» Secure Computation Without Authentication
Sort
View
88
Voted
FC
1999
Springer
160views Cryptology» more  FC 1999»
15 years 5 months ago
Anonymous Authentication of Membership in Dynamic Groups
Abstract. We present a series of protocols for authenticating an individual’s membership in a group without revealing that individual’s identity and without restricting how the...
Stuart E. Schechter, Todd Parnell, Alexander J. Ha...
88
Voted
CHI
2010
ACM
15 years 7 months ago
Usability and strength in click-based graphical passwords
Click-based graphical passwords have attractive usability properties, such as cueing and good memorability. However, image size and number of click-points in each password signifi...
Elizabeth Stobert
128
Voted

Publication
117views
14 years 9 months ago
Design, Implementation, and Performance Analysis of DiscoSec–Service Pack for Securing WLANs
To improve the already tarnished reputation of WLAN security, the new IEEE 802.11i security standard provides means for an enhanced user authentication and strong data confidential...
Ivan Martinovic, Paul Pichota, Matthias Wilhelm, F...
89
Voted
CCS
2007
ACM
15 years 7 months ago
Beamauth: two-factor web authentication with a bookmark
We propose BeamAuth, a two-factor web authentication technique where the second factor is a specially crafted bookmark. BeamAuth presents two interesting features: (1) only server...
Ben Adida
97
Voted
WISEC
2009
ACM
15 years 7 months ago
Jamming for good: a fresh approach to authentic communication in WSNs
While properties of wireless communications are often considered as a disadvantage from a security perspective, this work demonstrates how multipath propagation, a broadcast mediu...
Ivan Martinovic, Paul Pichota, Jens B. Schmitt