• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 285
Next 10 →

B (2010) Strong authentication and strong integrity (SASI) is not that strong

by Gildas Avoine, Xavier Carpent, Benjamin Martin - In: Workshop on RFID Security - RFIDSec'10
"... Abstract. In this work, we present a practical passive attack on SASI, an ultra-lightweight mutual authentication protocol for RFID. This at-tack can be used to reveal with overwhelming probability the secret ID of the prover by eavesdropping about 217 authentications. The result dis-mantles SASI an ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
Abstract. In this work, we present a practical passive attack on SASI, an ultra-lightweight mutual authentication protocol for RFID. This at-tack can be used to reveal with overwhelming probability the secret ID of the prover by eavesdropping about 217 authentications. The result dis-mantles SASI

Strongly authenticated URLs: Integrating of Web browsers and applications with strong authentication

by Strongly Authenticated Urls, Eddy Cheung, Andrew Goodchild, Hoylen Sue, Ben Fowler , 2003
"... With the growing popularity of the Internet, the Web browser is emerging as perhaps the most widely used type of user interface. Many desktop applications made use of a Web browser as a key component in their overall system design. The most common approach to integrate a Web browser into an applicat ..."
Abstract - Add to MetaCart
integrated with a Web browser's security mechanism. As a result, when an application invokes a Web browser which is accessing a secure site, the user may be required to authenticate multiple times. This need for multiple authentication, can lead to a reduction in the system's overall usability

Implementing Strong Authentication with OTP: Integrated System

by Pance Ribarski, Ljupcho Antovski
"... Abstract. Due to the arising problems with using static passwords, there is a strong need of implementing more secure protocols for authentication. The One-Time Password protocol is implementation for two-factor authentication; the two factors being something you own (a token) and something you know ..."
Abstract - Add to MetaCart
Abstract. Due to the arising problems with using static passwords, there is a strong need of implementing more secure protocols for authentication. The One-Time Password protocol is implementation for two-factor authentication; the two factors being something you own (a token) and something you

A Survey on Lightweight Entity Authentication with Strong PUFs

by Jeroen Delvaux, Dawu Gu, Roel Peeters, Ingrid Verbauwhede
"... Abstract. Physically unclonable functions (PUFs) exploit the unavoidable manufacturing variations of an integrated circuit (IC). Their input-output behavior serves as a unique IC ‘fingerprint’. Therefore, they have been envisioned as an IC authentication mechanism, in particular the subclass of so-c ..."
Abstract - Add to MetaCart
Abstract. Physically unclonable functions (PUFs) exploit the unavoidable manufacturing variations of an integrated circuit (IC). Their input-output behavior serves as a unique IC ‘fingerprint’. Therefore, they have been envisioned as an IC authentication mechanism, in particular the subclass of so

Strong security for distributed file systems

by Ethan Miller, Darrell Long, William Freeman, Benjamin Reed - In Proceedings of the 20th IEEE International Performance, Computing, and Communications Conference , 2002
"... We have developed a scheme to secure networkattached storage systems against many types of attacks. Our system uses strong cryptography to hide data from unauthorized users; someone gaining complete access to a disk cannot obtain any useful data from the system, and backups can be done without allow ..."
Abstract - Cited by 29 (0 self) - Add to MetaCart
of operation, and show that there is no longer any reason not to include strong encryption and authentication in network file systems. 1.

OCB: A Block-Cipher Mode of Operation for Efficient Authenticated Encryption

by Phillip Rogaway, Mihir Bellare, John Black, Ted Krovetz , 2001
"... We describe a parallelizable block-cipher mode of operation that simultaneously provides privacy and authenticity. OCB encrypts-and-authenticates a nonempty string M # {0, 1} # using #|M |/n# + 2 block-cipher invocations, where n is the block length of the underlying block cipher. Additional ov ..."
Abstract - Cited by 204 (24 self) - Add to MetaCart
-precision addition; a nearly optimal number of block-cipher calls; and no requirement for a random IV. We prove OCB secure, quantifying the adversary's ability to violate privacy or authenticity in terms of the quality of the block cipher as a pseudorandom permutation (PRP) or as a strong PRP, respectively

UbiKiMa: Ubiquitous authentication using a smartphone, migrating from passwords to strong cryptography ∗

by Short Paper, Maarten H. Everts, Jaap-henk Hoepman, Johanneke Siljee
"... Passwords are the only ubiquitous form of authentication currently available on the web. Unfortunately, passwords are insecure. In this paper we therefore propose the use of strong cryptography, using the fact that users increasingly own a smartphone that can perform the required cryptographic opera ..."
Abstract - Add to MetaCart
Passwords are the only ubiquitous form of authentication currently available on the web. Unfortunately, passwords are insecure. In this paper we therefore propose the use of strong cryptography, using the fact that users increasingly own a smartphone that can perform the required cryptographic

The SwitchWare Active Network Architecture

by D. Scott Alexander, William A. Arbaugh, Michael W. Hicks, Pankaj Kakkar, Angelos D. Keromytis, Jonathan T. Moore, Carl A. Gunter, Scott M. Nettles, Jonathan M. Smith , 1998
"... Active networks must balance the flexibility of a programmable network infrastructure against the safety and security requirements inherent in sharing that infrastructure. Furthermore, this balance must be achieved while maintaining the usability of the network. The SwitchWare active network archite ..."
Abstract - Cited by 156 (32 self) - Add to MetaCart
, which forms a high integrity base upon which the security of the other layers depends. In addition to integrity-checking and cryptography-based authentication, security in our architecture depends heavily on verification techniques from programming languages, such as strong type checking.

Principles of Authentication

by Sean Peisert, Tom Kroeger
"... In the real world we do authentication hundreds of times a day with little effort and strong confidence. We believe that the digital world can and should catch up. The focus of this paper is about authentication for critical applications. Specifically, it is about the fundamentals for evaluating whe ..."
Abstract - Cited by 1 (1 self) - Add to MetaCart
In the real world we do authentication hundreds of times a day with little effort and strong confidence. We believe that the digital world can and should catch up. The focus of this paper is about authentication for critical applications. Specifically, it is about the fundamentals for evaluating

Efficient Multicast Packet Authentication

by Alain Pannetrat , Refik Molva , 2003
"... Providing authentication mechanisms for IP-Multicast streams is paramount for the development of large scale commercial multicast content delivery applications. This need is particularly strong for the delivery of real time content, such as live video/audio news events or financial stock quote distr ..."
Abstract - Cited by 29 (0 self) - Add to MetaCart
Providing authentication mechanisms for IP-Multicast streams is paramount for the development of large scale commercial multicast content delivery applications. This need is particularly strong for the delivery of real time content, such as live video/audio news events or financial stock quote
Next 10 →
Results 1 - 10 of 285
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University