A performance evaluation of local descriptors

K Mikolajczyk, C Schmid - IEEE transactions on pattern …, 2005 - ieeexplore.ieee.org
In this paper, we compare the performance of descriptors computed for local interest
regions, as, for example, extracted by the Harris-Affine detector [Mikolajczyk, K and Schmid …

Password-based authenticated key exchange in the three-party setting

M Abdalla, PA Fouque, D Pointcheval - International workshop on public …, 2005 - Springer
Password-based authenticated key exchange are protocols which are designed to be
secure even when the secret key or password shared between two users is drawn from a …

[SÁCH][B] Protocols for authentication and key establishment

C Boyd, A Mathuria, D Stebila - 2003 - Springer
The first edition of this book was published in 2003. Inevitably, certain parts of the book
became outdated quickly. At the same time new developments have continued apace …

Efficient algorithms for pairing-based cryptosystems

PSLM Barreto, HY Kim, B Lynn, M Scott - Annual international cryptology …, 2002 - Springer
We describe fast new algorithms to implement recent cryptosystems based on the Tate
pairing. In particular, our techniques improve pairing evaluation speed by a factor of about …

Fast dictionary attacks on passwords using time-space tradeoff

A Narayanan, V Shmatikov - Proceedings of the 12th ACM conference on …, 2005 - dl.acm.org
Human-memorable passwords are a mainstay of computer security. To decrease
vulnerability of passwords to brute-force dictionary attacks, many organizations enforce …

Authenticating pervasive devices with human protocols

A Juels, SA Weis - Advances in Cryptology–CRYPTO 2005: 25th Annual …, 2005 - Springer
Forgery and counterfeiting are emerging as serious security risks in low-cost pervasive
computing devices. These devices lack the computational, storage, power, and …

Mobile device assisted secure computer network communication

B Zhu, M Feng, X Yin, Y Yang, Y Zhang… - US Patent …, 2012 - Google Patents
7 299 503 B2* 11/2007 Ballard ““““““““““““““726/29 Ware and the secure Web site being
accessed, such that it is 7,363,500 B2* 4/2008 Funk,,,,,, n,, 713/180 unique to both. In this …

Quantum-safe round-optimal password authentication for mobile devices

Z Li, D Wang, E Morais - IEEE transactions on dependable and …, 2020 - ieeexplore.ieee.org
Password authentication is the dominant form of access control for the Web and mobile
devices, and its practicality and ubiquity is unlikely to be replaced by other authentication …

Simple password-based encrypted key exchange protocols

M Abdalla, D Pointcheval - Topics in Cryptology–CT-RSA 2005: The …, 2005 - Springer
Password-based encrypted key exchange are protocols that are designed to provide pair of
users communicating over an unreliable channel with a secure session key even when the …

[HTML][HTML] Blockchain based efficient tamper-proof EHR storage for decentralized cloud-assisted storage

D Ramesh, R Mishra, PK Atrey, DR Edla… - Alexandria Engineering …, 2023 - Elsevier
In recent years, the rapid and wide-ranging implementation of a cloud-based electronic
healthcare record (EHR) storage system has shown significant advantages in effectively …