Sciweavers

1573 search results - page 68 / 315
» Strong User Authentication
Sort
View
CORR
2006
Springer
206views Education» more  CORR 2006»
14 years 9 months ago
ANAP: Anonymous Authentication Protocol in Mobile Ad hoc Networks
The pervasiveness of wireless communication recently gave mobile ad hoc networks (MANET) a significant researcher's attention, due to its innate capabilities of instant commu...
Tomasz Ciszkowski, Zbigniew Kotulski
CCS
2009
ACM
15 years 4 months ago
Physically restricted authentication with trusted hardware
Modern computer systems permit users to access protected information from remote locations. In certain secure environments, it would be desirable to restrict this access to a part...
Michael S. Kirkpatrick, Elisa Bertino
CSFW
2003
IEEE
15 years 3 months ago
Identity Based Authenticated Key Agreement Protocols from Pairings
We investigate a number of issues related to identity based authenticated key agreement protocols using the Weil or Tate pairings. These issues include how to make protocols effici...
Liqun Chen, Caroline Kudla
CRYPTO
2003
Springer
96views Cryptology» more  CRYPTO 2003»
15 years 3 months ago
Scalable Protocols for Authenticated Group Key Exchange
We consider the fundamental problem of authenticated group key exchange among n parties within a larger and insecure public network. A number of solutions to this problem have bee...
Jonathan Katz, Moti Yung
CCS
2006
ACM
15 years 1 months ago
Fortifying password authentication in integrated healthcare delivery systems
Integrated Delivery Systems (IDSs) now become a primary means of care provision in healthcare domain. However, existing password systems (under either the single-server model or t...
Yanjiang Yang, Robert H. Deng, Feng Bao