Sciweavers

210 search results - page 28 / 42
» The Secure Remote Password Protocol
Sort
View
PET
2004
Springer
15 years 3 months ago
Secure Outsourcing of Sequence Comparisons
Internet computing technologies, like grid computing, enable a weak computational device connected to such a grid to be less limited by its inadequate local computational, storage,...
Mikhail J. Atallah, Jiangtao Li
IJNSEC
2008
145views more  IJNSEC 2008»
14 years 9 months ago
Efficient User Authentication and Key Agreement with User Privacy Protection
Using smart cards, remote user authentication and key agreement can be simplified, flexible, and efficient for creating a secure distributed computers environment. Addition to use...
Wen-Shenq Juang, Jing-Lin Wu
FDL
2004
IEEE
15 years 1 months ago
UML System-Level Analysis and Design of Secure Communication Schemes for Embedded Systems
In this work we develop a secure communication protocol in the context of a Remote Meter Reading (RMR) System. We first analyze existing standards in secure communication (e.g. IP...
Mauro Prevostini, Giuseppe Piscopo, I. Stefanini
ISW
2009
Springer
15 years 4 months ago
Robust Authentication Using Physically Unclonable Functions
Abstract. In this work we utilize a physically unclonable function (PUF) to improve resilience of authentication protocols to various types of compromise. As an example application...
Keith B. Frikken, Marina Blanton, Mikhail J. Atall...

Lecture Notes
404views
16 years 7 months ago
Network Security
A comprehensive treatment of network security. Topics include remote access security, DMZ, firewalls, VPNs, PKI architecture, X.509 Public key infrastructure, web security, S-HTTP,...
Raj Jain