Results 1 - 10
of
2,302
AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS
"... ABSTRACT Group communication implies a many-to-many communication and it goes beyond both one ..."
Abstract
- Add to MetaCart
ABSTRACT Group communication implies a many-to-many communication and it goes beyond both one
Secure Group Communications Using Key Graphs
- SIGCOMM '98
, 1998
"... Many emerging applications (e.g., teleconference, real-time information services, pay per view, distributed interactive simulation, and collaborative work) are based upon a group communications model, i.e., they require packet delivery from one or more authorized senders to a very large number of au ..."
Abstract
-
Cited by 556 (17 self)
- Add to MetaCart
of authorized receivers. As a result, securing group communications (i.e., providing confidentiality, integrity, and authenticity of messages delivered between group members) will become a critical networking issue. In this paper, we present a novel solution to the scalability problem of group/multicast key
POSTER: Deniable Anonymous Group Authentication
"... At first glance, anonymous authentication, the ability to authenticate yourself without revealing who you are, seems like a counterintuitive concept. However, it is surprisingly useful in many applications where a regular authentication ..."
Abstract
- Add to MetaCart
At first glance, anonymous authentication, the ability to authenticate yourself without revealing who you are, seems like a counterintuitive concept. However, it is surprisingly useful in many applications where a regular authentication
On the Security of Homage Group Authentication Protocol
- In: Syverson, P. (ed): Financial Cryptography 5th International Conference. Grand Cayman, British West Indies. LNCS
, 2002
"... This paper describes two attacks on an anonymous group identification scheme proposed by Handley at Financial Crypto 2000. The first attack enables to forge valid proofs of membership for any secret key. As a consequence, any user, registered or not, can be properly authenticated by the group manage ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
This paper describes two attacks on an anonymous group identification scheme proposed by Handley at Financial Crypto 2000. The first attack enables to forge valid proofs of membership for any secret key. As a consequence, any user, registered or not, can be properly authenticated by the group
1 Question-Based Group Authentication
"... There are various situations where a distinction needs to be made between group members and outsiders. For example, to protect students in chat groups from unpleasant incidents caused by intruders; or to provide access to common domains such as computer labs. In some of these situations the implicat ..."
Abstract
- Add to MetaCart
There are various situations where a distinction needs to be made between group members and outsiders. For example, to protect students in chat groups from unpleasant incidents caused by intruders; or to provide access to common domains such as computer labs. In some of these situations
Further Reflection on Homage Anonymous Group Authentication Protocol
"... Abstract. Anonymous group authentication provides an individual with the ability to prove membership of a group without revealing their identity. The Homage protocol proposed by Handley [9] provides an efficient mechanism for anonymous group authentication. Attacks have been proposed [11] on this pr ..."
Abstract
- Add to MetaCart
Abstract. Anonymous group authentication provides an individual with the ability to prove membership of a group without revealing their identity. The Homage protocol proposed by Handley [9] provides an efficient mechanism for anonymous group authentication. Attacks have been proposed [11
A Lightweight Distributed Group Authentication Mechanism
"... Identifying trustable devices and establishing secure tunnels between them in ad hoc network environments is a difficult task because it has to be quick, inexpensive and secure. Certificate-based authentication mechanisms are too expensive for small devices. The use of such mechanisms must be contro ..."
Abstract
- Add to MetaCart
be controlled and reserved for special situations, (e.g. banking applications) but not for everyday transactions. In addition, indiscriminate use of asymmetric ciphering and certificate-based authentication is a shortcut to battery exhaustion attacks. This paper describes a lightweight distributed group
An Individual and Group Authentication Model for Wireless Network Services
"... Authentication is the most important component to protect information system from unauthorized access. Because mobile devices have resource limitations, current existing authentication methods experience security, efficiency, flexibility and scalability problems in wireless network services. Althoug ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
. Although many access control methods utilize both individuals and groups while validating authorization, there has been up to date no authentication mechanism supporting both group and individual. To overcome the existing problems, an authentication model for large scale wireless network is proposed
Efficient group authentication protocol based on human interaction
- In Proceedings of the Workshop on Foundation of Computer Security and Automated Reasoning Protocol Security Analysis (FCS-ARSPA
, 2006
"... on human interaction ..."
Sas-based group authentication and key agreement protocols
- In Public Key Cryptography
, 2008
"... Abstract. New trends in consumer electronics have created a strong demand for fast, reliable and user-friendly key agreement protocols. However, many key agreement protocols are secure only against passive attacks. Therefore, message authentication is often unavoidable in order to achieve security a ..."
Abstract
-
Cited by 17 (0 self)
- Add to MetaCart
authenticity. In this article, we generalise this methodology for multi-party settings. We give a new group message authentication protocol that utilises only limited authenticated communication and show how to combine this protocol with classical key agreement procedures. More precisely, we describe how
Results 1 - 10
of
2,302