2008 Annual Computer Security Applications Conference (ACSAC) 2008
DOI: 10.1109/acsac.2008.23
|View full text |Cite
|
Sign up to set email alerts
|

PAS: Predicate-Based Authentication Services Against Powerful Passive Adversaries

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
76
0

Year Published

2010
2010
2019
2019

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 36 publications
(77 citation statements)
references
References 10 publications
1
76
0
Order By: Relevance
“…For more practical sizes of the secret, the number of allowable sessions is even lower. Similarly, Bai et al's scheme can be used for 10 authentication sessions only [12]. For these reasons, we have restricted our comparison to the two protocols in [1].…”
Section: Suggested Parametersmentioning
confidence: 99%
See 3 more Smart Citations
“…For more practical sizes of the secret, the number of allowable sessions is even lower. Similarly, Bai et al's scheme can be used for 10 authentication sessions only [12]. For these reasons, we have restricted our comparison to the two protocols in [1].…”
Section: Suggested Parametersmentioning
confidence: 99%
“…al. in [12], but their protocol can only be used for a small number of authentications; precisely 10, using the default parameters. A different line of research is to develop special purpose hardware that utilizes other human senses (such as the sense of touch).…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…However, the security of these protocols can be compromised after a few authentication sessions [7,8]. Some other proposals for human identification protocols that have been shown to be insecure were proposed by the authors in [9,10,11]. These protocols were cryptanalysed in [12,13,14].…”
Section: Introductionmentioning
confidence: 99%