Search Results - "Strangio, M.A."
-
1
Cryptanalysis and improvement of an elliptic curve Diffie-Hellman key agreement protocol
Published in IEEE communications letters (01-02-2008)“…In SAC'05, Strangio proposed protocol ECKE- 1 as an efficient elliptic curve Diffie-Hellman two-party key agreement protocol using public key authentication…”
Get full text
Journal Article -
2
Mathematical model to simulate the extracellular myoelectrical activity of the cat colon
Published in Medical engineering & physics (01-01-2009)“…Abstract The rationale of this study was to investigate if the bases of generation of the electrical activity of the whole gut are the same. For this reason,…”
Get full text
Journal Article -
3
Mobile Local Macropayments: Security and Prototyping
Published in IEEE pervasive computing (01-10-2006)“…An acceptable trade-off between security and usability is a mandatory design goal for any mobile payment system that wants to attract customers. Designers must…”
Get full text
Journal Article -
4
A two-factor mobile authentication scheme for secure financial transactions
Published in International Conference on Mobile Business (ICMB'05) (2005)“…Many authentication schemes are based on parties possessing cryptographic keys often held on smart cards or other tamper-proof devices. Modern portable devices…”
Get full text
Conference Proceeding -
5
An optimal round two-party password-authenticated key agreement protocol
Published in First International Conference on Availability, Reliability and Security (ARES'06) (2006)“…Key agreement protocols constitute one of the most valuable cryptographic primitives since they allow two (or more) users to setup a private and authenticated…”
Get full text
Conference Proceeding -
6
EC-PAY: An Efficient and Secure ECC-Based Wireless Local Payment Scheme
Published in Third International Conference on Information Technology and Applications (ICITA'05) (2005)“…Local payment transactions may enable people to walk into a store and purchase items by just pressing a button on their mobile phone. While a mobile device…”
Get full text
Conference Proceeding -
7
Local Authentication with Bluetooth enabled Mobile Devices
Published in Joint International Conference on Autonomic and Autonomous Systems and International Conference on Networking and Services - (icas-isns'05) (2005)“…As the processing power of mobile devices such as PDAs and smartphones increase they constitute the target platforms for new value-added services and…”
Get full text
Conference Proceeding