Sciweavers

375 search results - page 35 / 75
» Using Mobile Agents for Secure Biometric Authentication
Sort
View
151
Voted
ESAS
2007
Springer
15 years 9 months ago
Authenticating DSR Using a Novel Multisignature Scheme Based on Cubic LFSR Sequences
The problem of secure routing in mobile ad hoc networks is long-standing and has been extensively studied by researchers. Recently, techniques of aggregating signatures have been a...
Saikat Chakrabarti 0002, Santosh Chandrasekhar, Mu...
DAC
2005
ACM
16 years 4 months ago
Efficient fingerprint-based user authentication for embedded systems
User authentication, which refers to the process of verifying the identity of a user, is becoming an important security requirement in various embedded systems. While conventional...
Pallav Gupta, Srivaths Ravi, Anand Raghunathan, Ni...
110
Voted
CSE
2009
IEEE
15 years 7 months ago
Reliable Identities Using Off-the-Shelf Hardware Security in MANETs
Application scenarios for mobile ad-hoc networks (MANETs) impose a variety of non-standard security requirements. furthermore, in many scenarios owner and user of devices do not a...
Nicolai Kuntze, Andreas Fuchs, Carsten Rudolph
123
Voted
CCS
2004
ACM
15 years 8 months ago
Reusable cryptographic fuzzy extractors
We show that a number of recent definitions and constructions of fuzzy extractors are not adequate for multiple uses of the same fuzzy secret—a major shortcoming in the case of...
Xavier Boyen
137
Voted
FSE
2003
Springer
123views Cryptology» more  FSE 2003»
15 years 8 months ago
The Security of "One-Block-to-Many" Modes of Operation
In this paper, we investigate the security, in the Luby-Rackoff security paradigm, of blockcipher modes of operation allowing to expand a one-block input into a longer t-block ou...
Henri Gilbert