|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 8079 occurrences of 2235 keywords
|
|
|
Results
Found 25398 publication records. Showing 25398 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
81 | Stuart E. Schechter, Robert W. Reeder |
1 + 1 = you: measuring the comprehensibility of metaphors for configuring backup authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOUPS ![In: Proceedings of the 5th Symposium on Usable Privacy and Security, SOUPS 2009, Mountain View, California, USA, July 15-17, 2009, 2009, ACM, 978-1-60558-736-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
backup authentication, password reset, authentication |
77 | Jae-Woo Lee |
Security Agent Model Using Interactive Authentication Database. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AIS ![In: Artificial Intelligence and Simulation, 13th International Conference on AI, Simulation, and Planning in High Autonomy Systems, AIS 2004, Jeju Island, Korea, October 4-6, 2004, Revised Selected Papers, pp. 627-634, 2004, Springer, 3-540-24476-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
71 | Jae-Woo Lee |
Client Authentication Model Using Duplicated Authentication Server Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AIS ![In: Artificial Intelligence and Simulation, 13th International Conference on AI, Simulation, and Planning in High Autonomy Systems, AIS 2004, Jeju Island, Korea, October 4-6, 2004, Revised Selected Papers, pp. 655-662, 2004, Springer, 3-540-24476-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
68 | Goce Jakimoski |
Unconditionally Secure Information Authentication in Presence of Erasures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMACC ![In: Cryptography and Coding, 10th IMA International Conference, Cirencester, UK, December 19-21, 2005, Proceedings, pp. 304-321, 2005, Springer, 3-540-30276-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
erasure- resilient codes, erasure-tolerant authentication, message authentication, authentication codes |
64 | David Q. Liu, Mark Coslow |
Extensible authentication protocols for IEEE standards 802.11 and 802.16. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mobility Conference ![In: Proceedings of the 5th International Conference on Mobile Technology, Applications, and Systems, Mobility Conference 2008, Yilan, Taiwan, September 10-12, 2008, pp. 47, 2008, ACM, 978-1-60558-089-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
extensible authentication protocol, wireless, IEEE 802.11, EAP |
64 | Guojun Wang 0001, Qiong Wang, Jiannong Cao 0001, Minyi Guo |
An Effective Trust Establishment Scheme for Authentication in Mobile Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIT ![In: Seventh International Conference on Computer and Information Technology (CIT 2007), October 16-19, 2007, University of Aizu, Fukushima, Japan, pp. 749-754, 2007, IEEE Computer Society, 978-0-7695-2983-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Trust Transfer, Mobile Ad-Hoc Networks, Authentication, Cryptography, Secret Sharing |
64 | Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciarini, Elisa Bertino |
Privacy preserving multi-factor authentication with biometrics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 2006 Workshop on Digital Identity Management, Alexandria, VA, USA, November 3, 2006, pp. 63-72, 2006, ACM, 1-59593-547-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
identity theft prevention, privacy, authentication, biometrics |
60 | Youngsook Lee, Junghyun Nam, Seungjoo Kim, Dongho Won |
Two Efficient and Secure Authentication Schemes Using Smart Cards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (5) ![In: Computational Science and Its Applications - ICCSA 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part V, pp. 858-866, 2006, Springer, 3-540-34079-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
smart card, password, mutual authentication, Authentication scheme |
56 | Lunwei Wang, Lianyue He, Xiangke Liao, Huaimin Wang |
Research on Control Flags-based Weighted Authentication Trustworthiness Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PRDC ![In: 11th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2005), 12-14 December, 2005, Changsha, Hunan, China, pp. 369-373, 2005, IEEE Computer Society, 0-7695-2492-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
56 | Lunwei Wang, Lifeng Wei, Xiangke Liao, Huaimin Wang |
AT-RBAC: An Authentication Trustworthiness-Based RBAC Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GCC Workshops ![In: Grid and Cooperative Computing - GCC 2004 Workshops: GCC 2004 International Workshops, IGKG, SGT, GISS, AAC-GEVO, and VVS, Wuhan, China, October 21-24, 2004. Proceedings, pp. 343-350, 2004, Springer, 3-540-23578-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
56 | Peng Ning, An Liu, Wenliang Du |
Mitigating DoS attacks against broadcast authentication in wireless sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Sens. Networks ![In: ACM Trans. Sens. Networks 4(1), pp. 1:1-1:35, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
security, Sensor networks, broadcast authentication, DoS attacks |
56 | Heesun Park, Stan Redford |
Client certificate and IP address based multi-factor authentication for J2EE web applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CASCON ![In: Proceedings of the 2007 conference of the Centre for Advanced Studies on Collaborative Research, October 22-25, 2007, Richmond Hill, Ontario, Canada, pp. 167-174, 2007, IBM. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
IP address checking, J2EE web application, SSL client certificate, certificate based authentication, multi-factor authentication |
56 | Reihaneh Safavi-Naini, Huaxiong Wang, Chaoping Xing |
Linear Authentication Codes: Bounds and Constructions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2001, Second International Conference on Cryptology in India, Chennai, India, December 16-20, 2001, Proceedings, pp. 127-135, 2001, Springer, 3-540-43010-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Linear Authentication Codes, Distributed Authentication Codes, Authentication Codes |
52 | Yatao Yang, Yonghao Gu, Xi Tan, Lina Ma |
A New Wireless Mesh Network Authentication Scheme Based on Threshold Method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICYCS ![In: Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008, Zhang Jia Jie, Hunan, China, November 18-21, 2008, pp. 2260-2265, 2008, IEEE Computer Society, 978-0-7695-3398-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
52 | Chung-Ming Huang, Jian-Wei Li |
One-Pass Authentication and Key Agreement Procedure in IP Multimedia Subsystem for UMTS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA ![In: 21st International Conference on Advanced Information Networking and Applications (AINA 2007), May 21-23, 2007, Niagara Falls, Canada, pp. 482-489, 2007, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
52 | Qing Li 0034, Wade Trappe |
Reducing delay and enhancing DoS resistance in multicast authentication through multigrade security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 1(2), pp. 190-204, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
52 | Jaeduck Choi, Souhwan Jung, Younghan Kim 0002, Myungsik Yoo |
A Fast and Efficient Handover Authentication Achieving Conditional Privacy in V2I Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NEW2AN ![In: Smart Spaces and Next Generation Wired/Wireless Networking, 9th International Conference, NEW2AN 2009 and Second Conference on Smart Spaces, ruSMART 2009, St. Petersburg, Russia, September 15-18, 2009. Proceedings, pp. 291-300, 2009, Springer, 978-3-642-04188-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
V2I, Handover Authentication, Conditional Privacy, VANET |
52 | Takeyuki Uehara, Reihaneh Safavi-Naini, Philip Ogunbona |
A secure and flexible authentication system for digital images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Syst. ![In: Multim. Syst. 9(5), pp. 441-456, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Compression tolerance, JPEG, Image authentication |
52 | Hao Chen 0095 |
Efficient compromising resilient authentication schemes for large scale wireless sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Third ACM Conference on Wireless Network Security, WISEC 2010, Hoboken, New Jersey, USA, March 22-24, 2010, pp. 49-54, 2010, ACM, 978-1-60558-923-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
code and function based authentication schemes, polynomial based authentication scheme, wireless sensor netowork |
48 | Jung-Muk Lim, Hyung-Jin Lim, Tai-Myoung Chung |
Performance Evaluation of Public Key Based Mechanisms for Mobile IPv4 Authentication in AAA Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICOIN ![In: Information Networking, Advances in Data Communications and Wireless Networks, International Conference, ICOIN 2006, Sendai, Japan, January 16-19, 2006, Revised Selected Papers, pp. 62-71, 2006, Springer, 3-540-48563-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
48 | Jiayang Liu, Lin Zhong 0001, Jehan Wickramasuriya, Venu Vasudevan |
User evaluation of lightweight user authentication with a single tri-axis accelerometer. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mobile HCI ![In: Proceedings of the 11th Conference on Human-Computer Interaction with Mobile Devices and Services, Mobile HCI 2009, Bonn, Germany, September 15-18, 2009, 2009, ACM, 978-1-60558-281-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
authentication, user study, gesture, accelerometer |
48 | Seong-Soo Park 0001, Jong-Hyouk Lee, Tai-Myoung Chung |
Authentication Analysis Based on Certificate for Proxy Mobile IPv6 Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (1) ![In: Computational Science and Its Applications - ICCSA 2009, International Conference, Seoul, Korea, June 29-July 2, 2009, Proceedings, Part I, pp. 885-896, 2009, Springer, 978-3-642-02453-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Proxy MIPv6, EAP-TLS, Authentication, Certificate, BAN Logic |
48 | Ivonne Thomas, Michael Menzel 0001, Christoph Meinel |
Using quantified trust levels to describe authentication requirements in federated identity management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SWS ![In: Proceedings of the 5th ACM Workshop On Secure Web Services, SWS 2008, Alexandria, VA, USA, October 31, 2008, pp. 71-80, 2008, ACM, 978-1-60558-292-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
authentication and access control, trust levels, web service federation, trust management, federated identity management |
48 | Su Jung Yu, Joo-Seok Song |
A New Authentication and Key Agreement Protocol Scheme in Convergence of UMTS and DVB-H Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES (3) ![In: Knowledge-Based Intelligent Information and Engineering Systems, 11th International Conference, KES 2007, XVII Italian Workshop on Neural Networks, Vietri sul Mare, Italy, September 12-14, 2007, Proceedings, Part III, pp. 959-966, 2007, Springer, 978-3-540-74828-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
security, authentication, UMTS, DVB-H, convergence networks |
48 | Haifeng Qian, Zhenfu Cao, Lichen Wang, Qingshui Xue |
Efficient Non-interactive Deniable Authentication Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIT ![In: Fifth International Conference on Computer and Information Technology (CIT 2005), 21-23 September 2005, Shanghai, China, pp. 673-679, 2005, IEEE Computer Society, 0-7695-2432-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Tight security, Authentication, Digital signature, MAC, Deniablity, Impersonation attack, Trapdoor permutations |
48 | IkSu Park, Seung Bae Park, ByeongKyun Oh |
User Authentication Protocol Based on Human Memorable Password and Using RSA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (1) ![In: Computational Science and Its Applications - ICCSA 2004, International Conference, Assisi, Italy, May 14-17, 2004, Proceedings, Part I, pp. 527-536, 2004, Springer, 3-540-22054-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Password Dictionary, Authentication, Cryptography, public key cryptography, Password authentication |
48 | IkSu Park, Seung Bae Park, ByeongKyun Oh |
User Authentication Protocol Based on Human Memorable Password and Using RSA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (4) ![In: Computational Science and Its Applications - ICCSA 2004, International Conference, Assisi, Italy, May 14-17, 2004, Proceedings, Part IV, pp. 698-707, 2004, Springer, 3-540-22060-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Password Dictionary, Authentication, Cryptography, public key cryptography, Password authentication |
46 | Saber Zrelli, Yoichi Shinoda |
Experimental Evaluation of EAP Performance in Roaming Scenarios. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINTEC ![In: Sustainable Internet, Third Asian Internet Engineering Conference, AINTEC 2007, Phuket, Thailand, November 27-29, 2007, Proceedings, pp. 86-98, 2007, Springer, 978-3-540-76808-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
46 | Seo-Il Kang, Deok-Gyu Lee, Im-Yeong Lee |
A Study on Key Distribution and ID Registration in the AAA System for Ubiquitous Multimedia Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM (2) ![In: Advances in Multimedia Modeling, 13th International Multimedia Modeling Conference, MMM 2007, Singapore, January 9-12, 2007. Proceedings, Part II, pp. 487-493, 2007, Springer, 978-3-540-69428-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
ID registration, Authentication, key distribution, Multimedia service |
46 | Suguru Fujisawa, Makoto Otani, Kenzi Watanabe |
Implementation of PKI Authentication Functions for Network User Authentication System "Opengate". ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAINT ![In: Proceedings of the 2008 International Symposium on Applications and the Internet, SAINT 2008, 28 July - 1 August 2008, Turku, Finland, pp. 297-300, 2008, IEEE Computer Society, 978-0-7695-3297-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
UPKI, Network User Authentication, Opengate, PKI |
45 | Leonid Kompanets, Janusz Bobulski, Roman Wyrzykowski |
Pseudo-entropy Similarity for Human Biometrics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Biometric Authentication ![In: Biometric Authentication, International ECCV 2002 Workshop Copenhagen, Denmark, June 1, 2002, Proceedings, pp. 67-77, 2002, Springer, 3-540-43723-1. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
44 | Jae-Woo Lee |
A Policy of Copyright Protection Using Authentication Key Based on Digital Watermarking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MUE ![In: 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 26-28 April 2007, Seoul, Korea, pp. 1205-1209, 2007, IEEE Computer Society, 978-0-7695-2777-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
44 | Chuhong Fei, Deepa Kundur, Raymond H. Kwong |
Analysis and design of secure watermark-based authentication systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 1(1), pp. 43-55, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
44 | Takamichi Saito, Ryosuke Hatsugai, Toshiyuki Kito |
On Compromising Password-Based Authentication over HTTPS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA (1) ![In: 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 18-20 April 2006, Vienna, Austria, pp. 869-874, 2006, IEEE Computer Society, 0-7695-2466-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
44 | Kihun Hong, Souhwan Jung, Shyhtsun Felix Wu |
A Hash-Chain Based Authentication Scheme for Fast Handover in Wireless Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 6th International Workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers, pp. 96-107, 2005, Springer, 3-540-31012-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Koji Iwano, Taro Miyazaki, Sadaoki Furui |
Multimodal Speaker Verification Using Ear Image Features Extracted by PCA and ICA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AVBPA ![In: Audio- and Video-Based Biometric Person Authentication, 5th International Conference, AVBPA 2005, Hilton Rye Town, NY, USA, July 20-22, 2005, Proceedings, pp. 588-596, 2005, Springer, 3-540-27887-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Hea Suk Jo, Hee Yong Youn |
A New Synchronization Protocol for Authentication in Wireless LAN Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (1) ![In: Computational Science and Its Applications - ICCSA 2004, International Conference, Assisi, Italy, May 14-17, 2004, Proceedings, Part I, pp. 711-721, 2004, Springer, 3-540-22054-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
44 | Hea Suk Jo, Hee Yong Youn |
A New Synchronization Protocol for Authentication in Wireless LAN Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (3) ![In: Computational Science and Its Applications - ICCSA 2004, International Conference, Assisi, Italy, May 14-17, 2004, Proceedings, Part III, pp. 1010-1019, 2004, Springer, 3-540-22057-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
44 | Michael J. Covington, Mustaque Ahamad, Irfan A. Essa, H. Venkateswaran |
Parameterized Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2004, 9th European Symposium on Research Computer Security, Sophia Antipolis, France, September 13-15, 2004, Proceedings, pp. 276-292, 2004, Springer, 3-540-22987-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
44 | Ji Ma 0001, Mehmet A. Orgun |
Formalising theories of trust for authentication protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Syst. Frontiers ![In: Inf. Syst. Frontiers 10(1), pp. 19-32, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Trust theory, Agents, Authentication protocols, Belief logic |
44 | Jihwan Lim, Heekuck Oh, Sangjin Kim |
A New Hash-Based RFID Mutual Authentication Protocol Providing Enhanced User Privacy Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, 4th International Conference, ISPEC 2008, Sydney, Australia, April 21-23, 2008, Proceedings, pp. 278-289, 2008, Springer, 978-3-540-79103-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Authentication, RFID, User Privacy |
44 | Youngsook Lee, Junghyun Nam, Dongho Won |
Vulnerabilities in a Remote Agent Authentication Scheme Using Smart Cards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES-AMSTA ![In: Agent and Multi-Agent Systems: Technologies and Applications, Second KES International Symposium, KES-AMSTA 2008, Incheon, Korea, March 26-28, 2008. Proceedings, pp. 850-857, 2008, Springer, 978-3-540-78581-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
distributed system, smart card, impersonation attack, authentication scheme |
44 | Kui Ren 0001, Wenjing Lou |
Privacy-enhanced, Attack-resilient Access Control in Pervasive Computing Environments with Optional Context Authentication Capability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mob. Networks Appl. ![In: Mob. Networks Appl. 12(1), pp. 79-92, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
pervasive computing environment (PCE), context authentication, security, privacy, access control |
44 | Giovanni Di Crescenzo, Munir Cochinwala, Hyong Sop Shim |
Modeling cryptographic properties of voice and voice-based entity authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 2007 Workshop on Digital Identity Management, Fairfax, VA, USA, November 2, 2007, pp. 53-61, 2007, ACM, 978-1-59593-889-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
modeling human factors, biometrics, voice, entity authentication |
44 | Kai Chen 0007, Xinglei Zhu, Zhishou Zhang |
A Hybrid Content-Based Image Authentication Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PCM ![In: Advances in Multimedia Information Processing - PCM 2007, 8th Pacific Rim Conference on Multimedia, Hong Kong, China, December 11-14, 2007, Proceedings, pp. 226-235, 2007, Springer, 978-3-540-77254-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Content hash, Watermarking, Digital Signature, ECC, Image Authentication |
44 | Cástor Mariño, Manuel G. Penedo, Marta Penas, María J. Carreira, F. González |
Personal authentication using digital retinal images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Pattern Anal. Appl. ![In: Pattern Anal. Appl. 9(1), pp. 21-33, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Digital retinal images, Registration, Personal authentication, Creases |
44 | Byungkwan Park, Daesung Moon, Yongwha Chung, Jin-Won Park |
Capacity Planning for Scalable Fingerprint Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES (1) ![In: Knowledge-Based Intelligent Information and Engineering Systems, 10th International Conference, KES 2006, Bournemouth, UK, October 9-11, 2006, Proceedings, Part I, pp. 906-915, 2006, Springer, 3-540-46535-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Performance Evaluation, Authentication Protocol, Fingerprint Verification |
44 | Hea Suk Jo, Hee Yong Youn |
A Secure User Authentication Protocol Based on One-Time-Password for Home Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (1) ![In: Computational Science and Its Applications - ICCSA 2005, International Conference, Singapore, May 9-12, 2005, Proceedings, Part I, pp. 519-528, 2005, Springer, 3-540-25860-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
three-way handshake, security, Authentication, home network, one-time password |
44 | Shiqun Li, Jianying Zhou 0001, Xiangxue Li, Kefei Chen |
An Authentication Protocol for Pervasive Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPA ![In: Parallel and Distributed Processing and Applications, Third International Symposium, ISPA 2005, Nanjing, China, November 2-5, 2005, Proceedings, pp. 553-563, 2005, Springer, 3-540-29769-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Pervasive Computing Security, Authentication, E-Commerce, Public Key Infrastructure |
44 | Zheng Liu, Xue Li 0001, Zhaoyang Dong |
Multimedia authentication with sensor-based watermarking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MM&Sec ![In: Proceedings of the 6th workshop on Multimedia & Security, MM&Sec 2004, Magdeburg, Germany, September 20-21, 2004, pp. 155-159, 2004, ACM, 1-58113-854-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
fuzzy identification system, authentication, fragile watermarking |
44 | Michael Kaminsky, George Savvides, David Mazières, M. Frans Kaashoek |
Decentralized user authentication in a global file system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOSP ![In: Proceedings of the 19th ACM Symposium on Operating Systems Principles 2003, SOSP 2003, Bolton Landing, NY, USA, October 19-22, 2003, pp. 60-73, 2003, ACM, 1-58113-757-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
authentication, authorization, file system, groups, users, credentials, ACL, SFS |
44 | Willy Susilo, Yi Mu 0001 |
Non-interactive Deniable Ring Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2003, 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers, pp. 386-401, 2003, Springer, 3-540-21376-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Ring signature schemes, non-interactive, ring-to-ring authentication, deniable |
43 | Xiehua Li, ShuTang Yang, Jian-Hua Li, HongWen Zhu |
Security Protocol Analysis with Improved Authentication Tests. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006, Proceedings, pp. 123-133, 2006, Springer, 3-540-33052-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Authentication tests, Message type, Neuman-Stubblebine protocol, Improved authentication tests |
43 | Kee-Won Kim, Jun-Cheol Jeon, Kee-Young Yoo |
Efficient and Secure Password Authentication Schemes for Low-Power Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MSN ![In: Mobile Ad-hoc and Sensor Networks, First International Conference, MSN 2005, Wuhan, China, December 13-15, 2005, Proceedings, pp. 73-82, 2005, Springer, 3-540-30856-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
low-power device, wireless network, password authentication, mutual authentication |
43 | Adrian Perrig |
The BiBa one-time signature and broadcast authentication protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: CCS 2001, Proceedings of the 8th ACM Conference on Computer and Communications Security, Philadelphia, Pennsylvania, USA, November 6-8, 2001., pp. 28-37, 2001, ACM, 1-58113-385-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
signature based on a one-way function without trapdoor, source authentication for multicast, broadcast authentication, one-time signature |
43 | Reihaneh Safavi-Naini, Huaxiong Wang |
New Results on Multi-Receiver Authentication Codes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31 - June 4, 1998, Proceeding, pp. 527-541, 1998, Springer, 3-540-64518-7. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
Multi-receiver authentication code, Authentication code |
43 | Taekyoung Kwon 0002, JooSeok Song |
Security and efficiency in authentication protocols resistant to password guessing attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: 22nd IEEE Conference on Local Computer Networks (LCN '97), 2-5 November 1997, Minneapolis, Minnesota, USA, Proceedings, pp. 245-252, 1997, IEEE Computer Society, 0-8186-8141-1. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
password guessing attack resistance, secret, user-chosen weak secret, security-oriented protocols, cipher operations, protocol steps, poorly-chosen weak secret protection, security, efficiency, cryptographic protocols, key exchange, message authentication, authentication protocols, secure communications, random numbers, dictionary attacks |
43 | Antonio Izquierdo, Nada Golmie, Katrin Hoeper, Lidong Chen |
Using the EAP framework for fast media independent handover authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WICON ![In: Proceedings of the 4th Annual International Conference on Wireless Internet, WICON 2008, Maui, Hawaii, USA, November 17-19, 2008, pp. 42, 2008, ICST, 978-963-9799-36-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
pre-authentication, re-authentication, performance, authentication, handover, EAP |
42 | Jochen Liedtke |
A Short Note on Small Virtually-Addresses Control Blocks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGOPS Oper. Syst. Rev. ![In: ACM SIGOPS Oper. Syst. Rev. 29(3), pp. 31-34, 1995. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
42 | Jiafen Liu, Mingtian Zhou |
Designing an Authentication Protocol via Authentication Test. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the 12th IEEE Symposium on Computers and Communications (ISCC 2007), July 1-4, Aveiro, Portugal, pp. 475-480, 2007, IEEE Computer Society, 978-1-4244-1520-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
42 | Qinghan Xiao |
Biometric User Authentication for Heightened Information Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICBA ![In: Biometric Authentication, First International Conference, ICBA 2004, Hong Kong, China, July 15-17, 2004, Proceedings, pp. 708-715, 2004, Springer, 3-540-22146-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
42 | Jae-Woo Lee, Doo-Kwon Baik |
Improved Client Authentication Using Session Authentication in the Internet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Human.Society@Internet 2003 ![In: Web Communication Technologies and Internet-Related Social Issues - HSI 2003, Second International Conference on Human Society@Internet, Seoul, Korea, June 18-20, 2003, Proceedings, pp. 650-655, 2003, Springer, 3-540-40456-2. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
42 | Kenta Matsumiya, Soko Aoki, Masana Murase, Hideyuki Tokuda |
Zero-Stop Authentication: Sensor-Based Real-Time Authentication System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RTCSA ![In: Real-Time and Embedded Computing Systems and Applications, 9th International Conference, RTCSA 2003, Tainan, Taiwan, February 18-20, 2003. Revised Papers, pp. 296-311, 2003, Springer, 3-540-21974-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
41 | Deok-Gyu Lee, Yun-kyung Lee, Jong Wook Han, Jong Hyuk Park, Im-Yeong Lee |
Intelligent Home Network Authentication: Home Device Authentication Using Device Certification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OTM Conferences (2) ![In: On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE, GADA, and IS, OTM Confederated International Conferences CoopIS, DOA, ODBASE, GADA, and IS 2007, Vilamoura, Portugal, November 25-30, 2007, Proceedings, Part II, pp. 1688-1700, 2007, Springer, 978-3-540-76835-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
home device authentication, home device certificate |
41 | Yun-kyung Lee, Deok-Gyu Lee, Jong Wook Han, Kyo-Il Chung |
Home Network Device Authentication: Device Authentication Framework and Device Certificate Profile. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APWeb/WAIM Workshops ![In: Advances in Web and Network Technologies, and Information Management, APWeb/WAIM 2007 International Workshops: DBMAN 2007, WebETrends 2007, PAIS 2007 and ASWAN 2007, Huang Shan, China, June 16-18, 2007, Proceedings, pp. 573-582, 2007, Springer, 978-3-540-72908-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
home network security, home device authentication, home device certificate |
41 | Ruud M. Bolle, Andrew W. Senior, Nalini K. Ratha, Sharath Pankanti |
Fingerprint Minutiae: A Constructive Definition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Biometric Authentication ![In: Biometric Authentication, International ECCV 2002 Workshop Copenhagen, Denmark, June 1, 2002, Proceedings, pp. 58-66, 2002, Springer, 3-540-43723-1. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
41 | Massimo Tistarelli, Andrea Lagorio, Enrico Grosso |
Understanding Iconic Image-Based Face Biometrics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Biometric Authentication ![In: Biometric Authentication, International ECCV 2002 Workshop Copenhagen, Denmark, June 1, 2002, Proceedings, pp. 19-29, 2002, Springer, 3-540-43723-1. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
41 | Tetiana Valchuk, Roman Wyrzykowski, Leonid Kompanets |
Mental Characteristics of Person as Basic Biometrics ![Search on Bibsonomy](Pics/bibsonomy.png) |
Biometric Authentication ![In: Biometric Authentication, International ECCV 2002 Workshop Copenhagen, Denmark, June 1, 2002, Proceedings, pp. 78-90, 2002, Springer, 3-540-43723-1. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
40 | Paul L. Yu, John S. Baras, Brian M. Sadler |
Physical-Layer Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 3(1), pp. 38-51, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
40 | Patryk Chamuczynski, Omar Alfandi, Henrik Brosenne, Constantin Werner, Dieter Hogrefe |
Enabling Pervasiveness by Seamless Inter-domain Handover: Performance Study of PANA Pre-authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PerCom ![In: Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2008), 17-21 March 2008, Hong Kong, pp. 372-376, 2008, IEEE Computer Society, 978-0-7695-3113-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Pervasive Computing |
40 | Cástor Mariño, Manuel G. Penedo, Marta Penas |
Retinal Based Authentication via Distributed Web Application. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCAST ![In: Computer Aided Systems Theory - EUROCAST 2005, 10th International Conference on Computer Aided Systems Theory, Las Palmas de Gran Canaria, Spain, February 7-11, 2005, Revised Selected Papers, pp. 386-391, 2005, Springer, 3-540-29002-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
40 | Jong-hu Lee, Jae-Cheol Ryou 0001 |
Strong User Authentication in IEEE802.11 Wireless LAN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Human.Society@Internet 2003 ![In: Web Communication Technologies and Internet-Related Social Issues - HSI 2003, Second International Conference on Human Society@Internet, Seoul, Korea, June 18-20, 2003, Proceedings, pp. 638-643, 2003, Springer, 3-540-40456-2. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
40 | Muxiang Zhang |
Adaptive Protocol for Entity Authentication and Key Agreement in Mobile Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2003, 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers, pp. 166-183, 2003, Springer, 3-540-21376-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
39 | Hassnaa Moustafa, Jacky Forestier, Mohamed Chaari |
Distributed authentication for services commercialization in ad hoc networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mobility Conference ![In: Proceedings of the 6th International Conference on Mobile Technology, Applications, and Systems, Mobility Conference 2009, Nice, France, September 2-4, 2009, 2009, ACM, 978-1-60558-536-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
authentication access controls, services commercialization using ad hoc networks, ad hoc networks |
39 | Zhimin Yang, Adam C. Champion, Boxuan Gu, Xiaole Bai, Dong Xuan |
Link-layer protection in 802.11i WLANS with dummy authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Second ACM Conference on Wireless Network Security, WISEC 2009, Zurich, Switzerland, March 16-19, 2009, pp. 131-138, 2009, ACM, 978-1-60558-460-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
dummy authentication, security, wlan, open access |
39 | Ralph Holz, Heiko Niedermayer, Peter Hauck, Georg Carle |
Trust-Rated Authentication for Domain-Structured Distributed Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, 5th European PKI Workshop: Theory and Practice, EuroPKI 2008, Trondheim, Norway, June 16-17, 2008, Proceedings, pp. 74-88, 2008, Springer, 978-3-540-69484-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Trust-Rating, Distributed Systems, Peer-to-Peer, Authentication, Protocols, PKI, Multi-Domain |
39 | Debasis Giri, Parmeshwary Dayal Srivastava |
Cryptanalysis and the Improvement of Kim et al.'s Password Authentication Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, Third International Conference, ICISS 2007, Delhi, India, December 16-20, 2007, Proceedings, pp. 156-166, 2007, Springer, 978-3-540-77085-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Authentication, Smart card, Attack, Timestamp, Nonce |
39 | Maryna Komarova, Michel Riguidel |
Optimized ticket distribution scheme for fast re-authentication protocol (fap). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Q2SWinet ![In: Q2SWinet'07 - Proceedings of the Third ACM Workshop on Q2S and Security for Wireless and Mobile Networks, Chania, Crete Island, Greece, October 22, 2007, pp. 71-77, 2007, ACM, 978-1-59593-806-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
inter-domain roaming, authentication, authorization, wireless security |
39 | Hui-Feng Huang |
An Efficient Mutual Authentication Protocol on RFID Tags. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC Workshops ![In: Emerging Directions in Embedded and Ubiquitous Computing, EUC 2007 Workshops: TRUST, WSOC, NCUS, UUWSN, USN, ESO, and SECUBIQ, Taipei, Taiwan, December 17-20, 2007, Proceedings, pp. 550-556, 2007, Springer, 978-3-540-77089-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
security, authentication, RFID system |
39 | Young-Soo Kim, Sung-Ja Choi, Gang-Soo Lee, Geuk Lee |
Entity Based Message Authentication System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES-AMSTA ![In: Agent and Multi-Agent Systems: Technologies and Applications, First KES International Symposium, KES-AMSTA 2007, Wroclaw, Poland, May 31- June 1, 2007, Proceedings, pp. 948-955, 2007, Springer, 978-3-540-72829-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
entity based cryptosystem, security, authentication, agent, public key cryptosystem |
39 | John G. Brainard, Ari Juels, Ronald L. Rivest, Michael Szydlo, Moti Yung |
Fourth-factor authentication: somebody you know. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, October 30 - November 3, 2006, pp. 168-178, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
hardware tokens, vouchers, authentication |
39 | Ralf Wienzek, Rajendra Persaud |
Fast Re-authentication for Handovers in Wireless Communication Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Networking ![In: NETWORKING 2006 - Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications Systems, 5th International IFIP-TC6 Networking Conference, Coimbra, Portugal, May 15-19, 2006, Proceedings, pp. 556-567, 2006, Springer, 3-540-34192-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Wireless Networks, Authentication, Handover |
39 | Youngsook Lee, Junghyun Nam, Dongho Won |
Security Enhancement of a Remote User Authentication Scheme Using Smart Cards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OTM Workshops (1) ![In: On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, OTM Confederated International Workshops and Posters, AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET, OnToContent, ORM, PerSys, OTM Academy Doctoral Consortium, RDDS, SWWS, and SeBGIS 2006, Montpellier, France, October 29 - November 3, 2006. Proceedings, Part I, pp. 508-516, 2006, Springer, 3-540-48269-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
parallel session attack, smart card, password, Authentication scheme, reflection attack |
39 | Yongjian Li, Jun Pang 0001 |
Generalized Unsolicited Tests for Authentication Protocol Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PDCAT ![In: Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT 2006), 4-7 December 2006, Taipei, Taiwan, pp. 509-514, 2006, IEEE Computer Society, 0-7695-2736-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
the Otway-Rees protocol, authentication, cryptographic protocols, strand space |
39 | Ana Sanz Merino, Yasuhiko Matsunaga, Manish Shah, Takashi Suzuki, Randy H. Katz |
Secure Authentication System for Public WLAN Roaming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mob. Networks Appl. ![In: Mob. Networks Appl. 10(3), pp. 355-370, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
policy control, authentication, wireless LAN, roaming, link layer security |
39 | Jun Li 0025, Bruce Christianson, Martin J. Loomes |
"Fair" Authentication in Pervasive Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MADNES ![In: Secure Mobile Ad-hoc Networks and Sensors, First International Workshop, MADNES 2005, Singapore, September 20-22, 2005, Revised Selected Papers, pp. 132-143, 2005, Springer, 3-540-36646-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Human self-determination, Mobile ad-hoc Networks, Authentication, Trust, Pervasive Computing |
39 | Makoto Otani, Katsuhiko Eguchi, Hirofumi Eto, Kenzi Watanabe, Shin-ichi Tadaki, Yoshiaki Watanabe |
Implementation of IPv6 functions for a network user authentication system opengate. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGUCCS ![In: Proceedings of the 33rd Annual ACM SIGUCCS Conference on User Services 2005, Monterey, CA, USA, November 6-9, 2005, pp. 283-286, 2005, ACM, 1-59593-200-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
network user authentication system, opengate, internet, IPv6 |
39 | Nidal Aboudagga, M. Tamer Refaei, Mohamed Eltoweissy, Luiz A. DaSilva, Jean-Jacques Quisquater |
Authentication protocols for ad hoc networks: taxonomy and research issues. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Q2SWinet ![In: Q2SWinet'05 - Proceedings of the First ACM Workshop on Q2S and Security for Wireless and Mobile Networks, Montreal, Quebec, Canada, October 13, 2005, pp. 96-104, 2005, ACM, 1-59593-241-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
protocol taxonomy, ad hoc networks, authentication, network security, credentials, identity verification |
39 | Chin-Chen Chang 0001, Jui-Yi Kuo, Jung-San Lee |
Time-bounded Based Password Authentication Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CW ![In: 4th International Conference on Cyberworlds (CW 2005), 23-25 November 2005, Singapore, pp. 117-122, 2005, IEEE Computer Society, 0-7695-2378-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Resource access, Authentication, Time-bounded |
39 | Pallav Gupta, Srivaths Ravi 0001, Anand Raghunathan, Niraj K. Jha |
Efficient fingerprint-based user authentication for embedded systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DAC ![In: Proceedings of the 42nd Design Automation Conference, DAC 2005, San Diego, CA, USA, June 13-17, 2005, pp. 244-247, 2005, ACM, 1-59593-058-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
embedded systems, fingerprint, user authentication, extensible processors |
39 | Erik Anderson, Cheryl L. Beaver, Timothy Draelos, Richard Schroeppel, Mark Torgerson |
ManTiCore: Encryption with Joint Cipher-State Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy: 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004. Proceedings, pp. 440-453, 2004, Springer, 3-540-22379-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Encryption Mode, Inexpensive Authentication, Luby-Rackoff, Feistel, Middletext, Hash, Cipher |
39 | Valery I. Korzhik, Guillermo Morales-Luna |
Hybrid authentication based on noisy channels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 1(4), pp. 203-210, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Key sharing, Information-theoretically secure authentication, Hash functions, Privacy amplification |
39 | Yasuhiko Matsunaga, Ana Sanz Merino, Takashi Suzuki, Randy H. Katz |
Secure authentication system for public WLAN roaming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WMASH ![In: Proceedings of the 1st ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots, WMASH 2003, San Diego, CA, USA, September 19, 2003, pp. 113-121, 2003, ACM, 1-58113-768-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
policy control, authentication, wireless LAN, roaming, single sign-on, hotspot, link layer security |
39 | Yong Lee, H. K. Lee, Goo Yeon Lee, Hwa Jong Kim, Choong Kyo Jeong |
Design of hybrid authentication scheme and key distribution for mobile multi-hop relay in IEEE 802.16j. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EATIS ![In: Proceedings of the 2009 Euro American conference on Telematics and Information Systems: New Opportunities to increase Digital Citizenship, EATIS 2009, Prague, Czech Republic, June 3-5, 2009, pp. 12, 2009, 978-1-60558-398-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
hybrid authentication, mutual authentication, mobile wireless network, multi hop relay, IEEE 802.16j |
39 | Jahan Hassan, Harsha R. Sirisena, Björn Landfeldt |
Trust-Based Fast Authentication for Multiowner Wireless Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Mob. Comput. ![In: IEEE Trans. Mob. Comput. 7(2), pp. 247-261, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Fast authentication, inter-domain authentication, Markov Models, handoff, IEEE802.11 |
39 | Roman Weiss, Alexander De Luca |
PassShapes: utilizing stroke based authentication to increase password memorability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NordiCHI ![In: Proceedings of the 5th Nordic Conference on Human-Computer Interaction 2008, Lund, Sweden, October 20-22, 2008, pp. 383-392, 2008, ACM, 978-1-59593-704-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
PassShapes, graphical authentication, shape passwords, security, authentication |
39 | Mohamed Kassab, Abdelfattah Belghith, Jean-Marie Bonnin, Sahbi Sassi |
Fast pre-authentication based on proactive key distribution for 802.11 infrastructure networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WMuNeP ![In: WMuNeP'05 - Proceedings of the First ACM Workshop on Wireless Multimedia Networking and Performance Modeling, Montreal, Quebec, Canada, October 13, 2005, pp. 46-53, 2005, ACM, 1-59593-183-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
IAPP, pre-authentication, re-authentication, handover, WiFi, IEEE 802.11i |
39 | Ya-Fen Chang, Chin-Chen Chang 0001 |
A secure and efficient strong-password authentication protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGOPS Oper. Syst. Rev. ![In: ACM SIGOPS Oper. Syst. Rev. 38(3), pp. 79-90, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
strong password, smart card, password authentication, mutual authentication, denial-of-service attack, stolen-verifier attack |
39 | Michael K. Reiter, Stuart G. Stubblebine |
Toward Acceptable Metrics of Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 1997 IEEE Symposium on Security and Privacy, May 4-7, 1997, Oakland, CA, USA, pp. 10-20, 1997, IEEE Computer Society, 0-8186-7828-3. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
authentication metrics design, trusted intermediaries, intersecting paths, key interdependencies, certificates, ambiguities, message authentication, large-scale system, confidence, acceptability, multiple paths |
39 | Stuart G. Stubblebine, Rebecca N. Wright |
An Authentication Logic with Formal Semantics Supporting Synchronization, Revocation, and Recency. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 28(3), pp. 256-285, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
authentication logic, recent-secure authentication, reasoning about time, authentication, formal methods, computer security, security policies, clock synchronization, revocation, security analysis, protocol analysis, distributed systems security |
Displaying result #1 - #100 of 25398 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|