Electronic authentication with a portable device such as a smart card has been receiving increasing atten-tion. An explosion of papers argues security on such kind of authentication, however the human concerned in an authentication is often regarded as his/her portable device. This paper considers an identification of a server computer of a service provider by a human with a portable device as a part of the authentication and an attack by a client computer which relays the communication between the portable device and the server computer. As a defense against the attack, we introduce a system with a portable device which has an interface to show information to a human.
In today’s world, the use of computer networks is everywhere, and to access the home network we use ...
AbstractIn recent years, a new technology has come into picturefor remote user authentication (RUA) ...
Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction...
Electronic authentication with a portable device such as a smart card has been receiving increasing ...
Abstract: Individual authentication technologies are essential for electronic systems as social infr...
Our proposed simple device authentication framework [1] aims to provide device-oriented authenticati...
Abstract. We study the security requirements for remote authentication with password protected smart...
Part 12: Authentication and DelegationInternational audienceWe study the security requirements for r...
AbstractA trusted portable computing device and its security mechanism were presented to solve the s...
User authentication is a difficulty for every system providing safe access to precious, private info...
Authentication protocols are very common mechanisms to confirm the legitimacy of someone’s or someth...
Part 9: Short PapersInternational audienceRemote user authentication is important to identify whethe...
Conventional smart card-based authentication systems used in health care alleviate some of the secur...
[[abstract]]The user authentication scheme is a useful mechanism for verifying the legitimacy of a r...
"The original publication is available at www.springerlink.com”. Copyright Springer. [Full text of t...
In today’s world, the use of computer networks is everywhere, and to access the home network we use ...
AbstractIn recent years, a new technology has come into picturefor remote user authentication (RUA) ...
Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction...
Electronic authentication with a portable device such as a smart card has been receiving increasing ...
Abstract: Individual authentication technologies are essential for electronic systems as social infr...
Our proposed simple device authentication framework [1] aims to provide device-oriented authenticati...
Abstract. We study the security requirements for remote authentication with password protected smart...
Part 12: Authentication and DelegationInternational audienceWe study the security requirements for r...
AbstractA trusted portable computing device and its security mechanism were presented to solve the s...
User authentication is a difficulty for every system providing safe access to precious, private info...
Authentication protocols are very common mechanisms to confirm the legitimacy of someone’s or someth...
Part 9: Short PapersInternational audienceRemote user authentication is important to identify whethe...
Conventional smart card-based authentication systems used in health care alleviate some of the secur...
[[abstract]]The user authentication scheme is a useful mechanism for verifying the legitimacy of a r...
"The original publication is available at www.springerlink.com”. Copyright Springer. [Full text of t...
In today’s world, the use of computer networks is everywhere, and to access the home network we use ...
AbstractIn recent years, a new technology has come into picturefor remote user authentication (RUA) ...
Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction...