Results 241 to 250 of about 29,312 (265)
Some of the next articles are maybe not open access.
Authentication by Encrypted Negative Password
IEEE Transactions on Information Forensics and Security, 2019Secure password storage is a vital aspect in systems based on password authentication, which is still the most widely used authentication technique, despite some security flaws. In this paper, we propose a password authentication framework that is designed for secure password storage and could be easily integrated into existing authentication systems ...
Wenjian Luo +3 more
openaire +1 more source
Authenticated encryption for FPGA bitstreams
Proceedings of the 19th ACM/SIGDA international symposium on Field programmable gate arrays, 2011FPGA bitstream encryption blocks theft of the design in the FPGA bitstream by preventing unauthorized copy and reverse engineering. By itself, encryption does not protect against tampering with the bitstream, so without additional capabilities, bitstream encryption cannot prevent the FPGA from executing an unauthorized bitstream.
Stephen Trimberger +2 more
openaire +1 more source
Heterogeneous Deniable Authenticated Encryption Protocol
2020Deniable authenticated encryption can achieve confidentiality and deniable authentication in a logical single step. Such a cryptographic primitive simplifies the design of cryptographic scheme and reduces the cost of computation and communication. In this paper, we propose a heterogeneous deniable authenticated encryption scheme called HDAE.
Chunhua Jin +4 more
openaire +1 more source
Field Encryption and Authentication
1984Database encryption and authentication at the field level is attractive because it allows projections to be performed and individual data elements decrypted or authenticated. But field based protection is not usually recommended for security reasons: using encryption to hide individual data elements is vulnerable to ciphertext searching; using ...
openaire +1 more source
Analysis of Homomorphic Authenticated Encryption (Encrypt with Authenticate Construction)
Jouranl of Information and Security, 2021openaire +1 more source
Lightweight Authenticated Encryption for FPGAs
2016Traditionally, authenticated encryption was achieved by using two seperate algorithms for encryption and authentication. Recently, modes that combine encryption and authentication together are being proposed. This feature is especially beneficial in case of hardware implementations, as it allows for a substantial decrease in the circuit area and power ...
openaire +1 more source
Cookies, Authentication, Authorization, and Encryption
2002If you are like me, an author having complete control of your Web site gives you the willies. Well, after this chapter, you can rest a little more easily as you start securing CMS.NET.
openaire +1 more source
Broadcast Authentication and Broadcast Encryption
2014Broadcast authentication schemes that employ only symmetric PRFs include certificates-based schemes like one-time-signatures (OTS), and timed efficient stream loss tolerant authentication (TESLA), and identity-based schemes based on probabilistic subset allocation.
openaire +1 more source

