Sciweavers

210 search results - page 14 / 42
» The Secure Remote Password Protocol
Sort
View
CRYPTO
2006
Springer
124views Cryptology» more  CRYPTO 2006»
15 years 1 months ago
Mitigating Dictionary Attacks on Password-Protected Local Storage
We address the issue of encrypting data in local storage using a key that is derived from the user's password. The typical solution in use today is to derive the key from the...
Ran Canetti, Shai Halevi, Michael Steiner
JDCTA
2010
187views more  JDCTA 2010»
14 years 4 months ago
Automatic Verification of Security Properties in Remote Internet Voting Protocol with Applied Pi Calculus
Soundness and coercion resistance are the important and intricate security requirements for remote voting protocols. Several formal models of soundness and coercion-resistance hav...
Bo Meng, Wei Huang, Zimao Li, Dejun Wang
ARC
2009
Springer
111views Hardware» more  ARC 2009»
15 years 4 months ago
A Protocol for Secure Remote Updates of FPGA Configurations
Saar Drimer, Markus G. Kuhn
TCC
2005
Springer
139views Cryptology» more  TCC 2005»
15 years 3 months ago
The Relationship Between Password-Authenticated Key Exchange and Other Cryptographic Primitives
Abstract. We consider the problem of password-authenticated key exchange (PAK) also known as session-key generation using passwords: constructing session-key generation protocols t...
Minh-Huyen Nguyen
CCS
2006
ACM
15 years 1 months ago
Fortifying password authentication in integrated healthcare delivery systems
Integrated Delivery Systems (IDSs) now become a primary means of care provision in healthcare domain. However, existing password systems (under either the single-server model or t...
Yanjiang Yang, Robert H. Deng, Feng Bao