Sciweavers

SIGMOD
2012
ACM
250views Database» more  SIGMOD 2012»
11 years 6 months ago
Authenticating location-based services without compromising location privacy
The popularity of mobile social networking services (mSNSs) is propelling more and more businesses, especially those in retailing and marketing, into mobile and location-based for...
Haibo Hu, Jianliang Xu, Qian Chen, Ziwei Yang
IACR
2011
137views more  IACR 2011»
12 years 3 months ago
Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices
Although anonymous authentication has been extensively studied, so far no scheme has been widely adopted in practice. A particular issue with fully anonymous authentication schemes...
Liqun Chen, Kurt Dietrich, Hans Löhr, Ahmad-R...
INFORMATICALT
2010
126views more  INFORMATICALT 2010»
13 years 1 months ago
An Entire Chaos-Based Biometric Remote User Authentication Scheme on Tokens Without Using Password
This paper presents an entire chaos-based biometric remote user authentication scheme on tokens without using passwords. The proposed scheme is based on the chaotic hash function a...
Eun-Jun Yoon, Kee-Young Yoo
ICMCS
2009
IEEE
139views Multimedia» more  ICMCS 2009»
13 years 1 months ago
Evaluation of JPEG2000 hashing for efficient authentication
In this paper we investigate the applicability of different parts of the JPEG2000 codestream for authentication. Apart from the packet body different classes of information contai...
Dominik Engel, Thomas Stütz, Andreas Uhl
TWC
2008
129views more  TWC 2008»
13 years 4 months ago
An Efficient Mobile Authentication Scheme for Wireless Networks
In this paper, an efficient authentication scheme is proposed which is suitable for low-power mobile devices. It uses an elliptic-curve-cryptosystem based trust delegation mechanis...
Caimu Tang, Dapeng Oliver Wu
CSREASAM
2008
13 years 5 months ago
Password Entry Scheme Resistant to Eavesdropping
- We propose an authentication scheme resistant to eavesdropping attacks. Users select an alphanumeric password with a length of 9-15 symbols. They can use this password in the tra...
Bogdan Hoanca, Kenrick J. Mock
ICC
2007
IEEE
114views Communications» more  ICC 2007»
13 years 10 months ago
Two-Factor Localized Authentication Scheme for WLAN Roaming
- In the paper, we propose an efficient two-factor localized authentication scheme suitable for WLAN roaming. The proposed authentication scheme can greatly improve the security co...
Xiaodong Lin, Haojin Zhu, Pin-Han Ho, Xuemin Shen