Results 231 to 240 of about 44,601 (278)
Some of the next articles are maybe not open access.
Towards practical anonymous password authentication
Proceedings of the 26th Annual Computer Security Applications Conference, 2010The conventional approach for anonymous password authentication incurs O(N) server computation, linear to the total number of users. In ACSAC'09, Yang et al. proposed a new approach for anonymous password authentication, breaking this lower bound. However, Yang et al.'s scheme has not considered membership withdrawal and online guessing attacks, two ...
Yanjiang Yang +3 more
openaire +1 more source
RFID-Based, Anonymous Authentication Scheme
2009 Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing, 2009Low cost Radio Frequency Identification (RFID) like EPC Gen 2 is one kind of most popular RFIDs in the market. However, as studied by several researchers, Gen 2 is not secure. Therefore, many researchers have devoted to improving the security. However, in addition to the fact the security of these improved schemes are still questionable, these ...
Hung-Yu Chien +2 more
openaire +1 more source
SA3: Self-adaptive anonymous authentication for dynamic authentication policies
Future Generation Computer Systems, 2014Authentication is a procedure by which a client convinces the service provider about a claimed property under a given authentication policy. Anonymous authentication has an added property: protect the real identity of the client. In this paper, we study the situations with dynamic authentication policies, commonly seen in large scale systems such as ...
Lian, Yanling, Huang, Xinyi, Mu, Yi
openaire +2 more sources
Anonymous Authentication Systems
2012As the first application of secure anonymous systems, after reviewing conventional schemes, this chapter develops anonymous token, ITL, and ID list based anonymous authentication systems that enable authorities to determine whether entities are eligible or not without knowing their identities.
openaire +1 more source
Anonymous Shared Certificate Entity Authentication Protocol
Wireless Personal Communications, 2013Currently most existing entity authentication protocols can not guarantee anonymity against compromised verifier in semi-honest model. To solve the question, this paper puts forward a shared certificate entity authentication model, by which some qualities for anonymous entity authentication in semi-honest situation are suggested reasonably. On basis of
Jian Zhou, Xian-wei Zhou
openaire +1 more source
Dynamic k-Times Anonymous Authentication
2005k-times anonymous authentication (k-TAA) schemes allow members of a group to be anonymously authenticated by application providers for a bounded number of times. k-TAA has application in e-voting, e-cash, electronic coupons and anonymous trial browsing of content.
Lan Nguyen, Rei Safavi-Naini
openaire +1 more source
Design of Anonymous Attribute Authentication Mechanism
IEICE Transactions on Communications, 2009Privacy remains an issue for IT services. Users are concemed that their history of service use may be traceable since each user is assigned a single identifier as a means of authentication. In this paper, we propose a perfectly anonymous attribute authentication scheme that is both unidentifiable and untraceable. Then, we present the evaluation results
Shinsaku KIYOMOTO +2 more
openaire +1 more source
Reconsidering a lightweight anonymous authentication protocol
Journal of the Chinese Institute of Engineers, 2019ABSTRACTIn the cryptographic community, many efforts have been expended to build secure authentication protocols without using heavy asymmetric encryption.
Chien-Ming Chen +4 more
openaire +2 more sources
An Improved Anonymous Remote Authentication Protocol
2009 Second International Symposium on Information Science and Engineering, 2009Based on Diffie-Hellman key exchange protocol, an improved remote authentication protocol for value-added services in mobile networks is proposed, with the help of smart card and client account index. The improved scheme which inherits client anonymity and non-repudiation from previous identity-based remote authentication schemes is more efficient ...
Yining Liu, Jianyu Cao
openaire +1 more source
Certificate-free ad hoc anonymous authentication
Information Sciences, 2014There is an increasing demand of ad hoc anonymous authentication (AHAA) to secure communications between ad hoc group members while preserving privacy for the members. The main obstacles in AHAA is that it is difficult to deploy traditional public-key infrastructure (PKI) in this scenario and the end users are usually limited in computation. This paper
Zhiguang Qin +3 more
openaire +1 more source

