Search Results - "Strangio, M.A."

  • Showing 1 - 7 results of 7
Refine Results
  1. 1

    Cryptanalysis and improvement of an elliptic curve Diffie-Hellman key agreement protocol by Shengbao Wang, Zhenfu Cao, Strangio, M.A., Lihua Wang

    Published in IEEE communications letters (01-02-2008)
    “…In SAC'05, Strangio proposed protocol ECKE- 1 as an efficient elliptic curve Diffie-Hellman two-party key agreement protocol using public key authentication…”
    Get full text
    Journal Article
  2. 2

    Mathematical model to simulate the extracellular myoelectrical activity of the cat colon by Mirizzi, N, Strangio, M.A, Mirizzi, R, Riezzo, G

    Published in Medical engineering & physics (01-01-2009)
    “…Abstract The rationale of this study was to investigate if the bases of generation of the electrical activity of the whole gut are the same. For this reason,…”
    Get full text
    Journal Article
  3. 3

    Mobile Local Macropayments: Security and Prototyping by Gianluigi, M., Strangio, M.A., Schuster, A.

    Published in IEEE pervasive computing (01-10-2006)
    “…An acceptable trade-off between security and usability is a mandatory design goal for any mobile payment system that wants to attract customers. Designers must…”
    Get full text
    Journal Article
  4. 4

    A two-factor mobile authentication scheme for secure financial transactions by Di Pietro, R., Gianluigi Me, Strangio, M.A.

    “…Many authentication schemes are based on parties possessing cryptographic keys often held on smart cards or other tamper-proof devices. Modern portable devices…”
    Get full text
    Conference Proceeding
  5. 5

    An optimal round two-party password-authenticated key agreement protocol by Strangio, M.A.

    “…Key agreement protocols constitute one of the most valuable cryptographic primitives since they allow two (or more) users to setup a private and authenticated…”
    Get full text
    Conference Proceeding
  6. 6

    EC-PAY: An Efficient and Secure ECC-Based Wireless Local Payment Scheme by Gianluigi Me, Strangio, M.A.

    “…Local payment transactions may enable people to walk into a store and purchase items by just pressing a button on their mobile phone. While a mobile device…”
    Get full text
    Conference Proceeding
  7. 7

    Local Authentication with Bluetooth enabled Mobile Devices by Dellutri, F., Me, G., Strangio, M.A.

    “…As the processing power of mobile devices such as PDAs and smartphones increase they constitute the target platforms for new value-added services and…”
    Get full text
    Conference Proceeding