Ident protocol

Known as: Identd, Identification protocol, Port 113 
The Ident Protocol (Identification Protocol, IDENT), specified in , is an Internet protocol that helps identify the user of a particular TCP… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1974-2017
0102019742017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2012
2012
Traditionally, symmetric-key message authentication codes (MACs) are easily built from pseudorandom functions (PRFs). In this… (More)
  • figure 1
  • table 1
  • table 2
Is this relevant?
Highly Cited
2010
Highly Cited
2010
We present a privacy preserving protocol for fingerprint-based authentication. We consider a scenario where a client equipped… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • figure 4
Is this relevant?
Highly Cited
2010
Highly Cited
2010
Recent advances in biometric recognition and the increasin g use of biometric data prompt significant privacy challenges assoc… (More)
  • figure 1
  • table 1
  • figure 2
  • table 2
  • figure 3
Is this relevant?
Highly Cited
2009
Highly Cited
2009
Proofs of storage (PoS) are interactive protocols allowing a client to verify that a server faithfully stores a file. Previous… (More)
Is this relevant?
2009
2009
In this paper, we describe a new primitive for ErrorTolerant Searchable Encryption and a security model for it. This generic… (More)
  • figure 1
Is this relevant?
Highly Cited
2007
Highly Cited
2007
We provide a formal model for identification schemes. Under this model, we give strong definitions for security and privacy. Our… (More)
Is this relevant?
2004
2004
In this paper an efficient user identification scheme based on ID-based cryptosystem is discussed. In this paper, it is indicated… (More)
Is this relevant?
Highly Cited
2002
Highly Cited
2002
We discuss a modification of the Cramer-Shoup strong-RSA signature scheme. Our proposal also presumes the strong RSA assumption… (More)
  • figure 1
Is this relevant?
Highly Cited
2001
Highly Cited
2001
We present a model for attacking various cryptographic schemes by taking advantage of random hardware faults. The model consists… (More)
Is this relevant?
Highly Cited
1996
Highly Cited
1996
ed s The weak binding of preformed metallic clusters atomically smooth substrates has presented an impedime the study of… (More)
  • figure 1
  • figure 2
Is this relevant?