Sciweavers

920 search results - page 23 / 184
» Selecting Secure Passwords
Sort
View
156
Voted
ICB
2007
Springer
164views Biometrics» more  ICB 2007»
15 years 9 months ago
Hardening Fingerprint Fuzzy Vault Using Password
Security of stored templates is a critical issue in biometric systems because biometric templates are non-revocable. Fuzzy vault is a cryptographic framework that enables secure te...
Karthik Nandakumar, Abhishek Nagar, Anil K. Jain
IJNSEC
2006
96views more  IJNSEC 2006»
15 years 5 months ago
Off-line Password Guessing Attack on an Efficient Key Agreement Protocol for Secure Authentication
In 2004, Kim, Huh, Hwang and Lee proposed an efficient key agreement protocol for secure authentication. In this paper, we shall show that their proposed protocol cannot resist th...
Rongxing Lu, Zhenfu Cao
135
Voted
OZCHI
2005
ACM
15 years 11 months ago
Spy-resistant keyboard: more secure password entry on public touch screen displays
Current software interfaces for entering text on touch screen devices mimic existing mechanisms such as keyboard typing or handwriting. These techniques are poor for entering priv...
Desney S. Tan, Pedram Keyani, Mary Czerwinski
138
Voted
IWSEC
2007
Springer
15 years 11 months ago
A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol
At Indocrypt 2005, Viet et al., [22] have proposed an anonymous password-authenticated key exchange (PAKE) protocol and its threshold construction both of which are designed for cl...
SeongHan Shin, Kazukuni Kobara, Hideki Imai
ICCSA
2004
Springer
15 years 10 months ago
Security of Shen et al.'s Timestamp-Based Password Authentication Scheme
Abstract. Recently, Shen et al. proposed an improvement on YangShieh’s timestamp-based password authentication scheme using smart cards. Then they claimed that their scheme canno...
Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo