Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- ArticleOctober 2004
A PIN-entry method resilient against shoulder surfing
CCS '04: Proceedings of the 11th ACM conference on Computer and communications securityPages 236–245https://doi.org/10.1145/1030083.1030116Magnetic stripe cards are in common use for electronic payments and cash withdrawal. Reported incidents document that criminals easily pickpocket cards or skim them by swiping them through additional card readers. Personal identification numbers (PINs) ...
- ArticleOctober 2004
k-anonymous secret handshakes with reusable credentials
CCS '04: Proceedings of the 11th ACM conference on Computer and communications securityPages 158–167https://doi.org/10.1145/1030083.1030105The problem of privacy-preserving authentication has been extensively investigated in a set of diverse system settings. However, a full-fledged such mechanism called secret handshake, whereby two users (e.g., CIA agents) authenticate each other in a way ...
- ArticleOctober 2004
Concealing complex policies with hidden credentials
CCS '04: Proceedings of the 11th ACM conference on Computer and communications securityPages 146–157https://doi.org/10.1145/1030083.1030104Hidden credentials are useful in protecting sensitive resource requests, resources, policies, and credentials. We propose a significant performance improvement when implementing hidden credentials using Boneh/Franklin Identity Based Encryption. We also ...