Sciweavers

1365 search results - page 44 / 273
» Simple authentication for the web
Sort
View
NBIS
2009
Springer
15 years 4 months ago
Improving the Robustness of Wireless Device Pairing Using Hyphen-Delimited Numeric Comparison
Abstract—The operation of achieving authenticated key agreement between two human-operated mobile devices over a short range wireless communication channel, such as Bluetooth or ...
Ambarish Karole, Nitesh Saxena
AICT
2006
IEEE
126views Communications» more  AICT 2006»
15 years 3 months ago
A Framework to Add AAA Functionalities in IP Multicast
Multicasting, as an operational paradigm, has not been widely adopted until now, in spite of the advantages of its lower resource utilization and bandwidth conservation. This is d...
Salekul Islam, J. William Atwood
ACNS
2008
Springer
96views Cryptology» more  ACNS 2008»
14 years 11 months ago
Efficient Device Pairing Using "Human-Comparable" Synchronized Audiovisual Patterns
Abstract. "Pairing" is referred to as the operation of achieving authenticated key agreement between two human-operated devices over a short- or medium-range wireless com...
Ramnath Prasad, Nitesh Saxena
INFORMATICALT
2007
76views more  INFORMATICALT 2007»
14 years 9 months ago
An Integrative Framework to Protocol Analysis and Repair: Bellare-Rogaway Model + Planning + Model Checker
A modified version of the Bellare and Rogaway (1993) adversarial model is encoded using Asynchronous Product Automata (APA). A model checker tool, Simple Homomorphism Verificatio...
Kim-Kwang Raymond Choo
CCS
2011
ACM
13 years 9 months ago
Fortifying web-based applications automatically
Browser designers create security mechanisms to help web developers protect web applications, but web developers are usually slow to use these features in web-based applications (...
Shuo Tang, Nathan Dautenhahn, Samuel T. King