Authentication in Constrained Settings
From MaRDI portal
Publication:2947097
DOI10.1007/978-3-319-21356-9_1zbMath1401.94187OpenAlexW2294403897MaRDI QIDQ2947097
Publication date: 21 September 2015
Published in: Cryptography and Information Security in the Balkans (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-21356-9_1
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Authentication, digital signatures and secret sharing (94A62)
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Correction: ``Random walk in a random environment and first-passage percolation on trees
- A fuzzy vault scheme
- Secure and Lightweight Distance-Bounding
- On Modeling Terrorist Frauds
- On the Pseudorandom Function Assumption in (Secure) Distance-Bounding Protocols
- Robust and Private Bayesian Inference
- On the Leakage of Information in Biometric Authentication
- Towards Secure Distance Bounding
- What Can We Learn Privately?
- Private information retrieval
- Secure Biometric Authentication with Improved Accuracy
- An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
- Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
- The Bussard-Bagga and Other Distance-Bounding Protocols under Attacks
- Distinguishing Distributions Using Chernoff Information
- On Privacy Models for RFID
- Theory of Cryptography
- Topics in Cryptology – CT-RSA 2006
This page was built for publication: Authentication in Constrained Settings