Sciweavers

5722 search results - page 164 / 1145
» Security Function Interactions
Sort
View
99
Voted
CHI
2010
ACM
15 years 7 months ago
The secure haptic keypad: a tactile password system
Authentication in public spaces poses significant security risks. Most significantly, passwords can be stolen, potentially leading to fraud. A common method to steal a PIN is thro...
Andrea Bianchi, Ian Oakley, Dong Soo Kwon
135
Voted
INDOCRYPT
2010
Springer
14 years 10 months ago
Attack on a Higher-Order Masking of the AES Based on Homographic Functions
In the recent years, Higher-order Side Channel attacks have been widely investigated. In particular, 2nd-order DPA have been improved and successfully applied to break several mask...
Emmanuel Prouff, Thomas Roche
HCI
1993
15 years 2 months ago
Quantitative Measures for Evaluating Human-Computer Interfaces
There currently are 4 different views on human computer interaction in measuring interactive qualities: (1) the interaction-oriented view, (2) the user-oriented view, (3) the prod...
Matthias Rauterberg
AC
1997
Springer
15 years 4 months ago
Cryptographic Primitives for Information Authentication - State of the Art
This paper describes the state of the art for cryptographic primitives that are used for protecting the authenticity of information: cryptographic hash functions and digital signat...
Bart Preneel
ESORICS
2005
Springer
15 years 6 months ago
Machine-Checked Security Proofs of Cryptographic Signature Schemes
Abstract. Formal methods have been extensively applied to the certification of cryptographic protocols. However, most of these works make the perfect cryptography assumption, i.e....
Sabrina Tarento