Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
125 | Xiaojian Tian, Duncan S. Wong |
Session Corruption Attack and Improvements on Encryption Based MT-Authenticators.  |
CT-RSA  |
2006 |
DBLP DOI BibTeX RDF |
MT-authenticator, BCK-model, CK-model, Verifiable Encryption |
92 | Yvonne Hitchcock, Yiu Shing Terry Tin, Juan Manuel González Nieto, Colin Boyd, Paul Montague |
A Password-Based Authenticator: Security Proof and Applications.  |
INDOCRYPT  |
2003 |
DBLP DOI BibTeX RDF |
key agreement, password authentication, Key management protocols |
75 | Ying-Han Pang, Andrew Teoh Beng Jin, David Ngo Chek Ling |
Personal Authenticator on the Basis of Two-Factors: Palmprint Features and Tokenized Random Data.  |
Australian Conference on Artificial Intelligence  |
2004 |
DBLP DOI BibTeX RDF |
|
64 | Peng Ning, An Liu, Wenliang Du |
Mitigating DoS attacks against broadcast authentication in wireless sensor networks.  |
ACM Trans. Sens. Networks  |
2008 |
DBLP DOI BibTeX RDF |
security, Sensor networks, broadcast authentication, DoS attacks |
64 | Katelin Bailey, Apu Kapadia, Linden Vongsathorn, Sean W. Smith |
TwoKind authentication: protecting private information in untrustworthy environments.  |
WPES  |
2008 |
DBLP DOI BibTeX RDF |
principle of least privilege, authenticators, passwords |
64 | You Sung Kang, KyungHee Oh, Byung-Ho Chung, Kyoil Chung, DaeHun Nyang |
Analysis and Countermeasure on Vulnerability of WPA Key Exchange Mechanism.  |
ICOIN  |
2004 |
DBLP DOI BibTeX RDF |
802.11i, 802.1X, WPA, WLAN security |
54 | Aleck Nash, Hudan Studiawan, George Grispos, Kim-Kwang Raymond Choo |
Security Analysis of Google Authenticator, Microsoft Authenticator, and Authy.  |
ICDF2C (2)  |
2023 |
DBLP DOI BibTeX RDF |
|
48 | Huawei Zhao, Jing Qin 0002, Zhifeng Fang |
Converters for Designing Applied Cryptographic Protocols.  |
EUC (2)  |
2008 |
DBLP DOI BibTeX RDF |
|
48 | Shaoquan Jiang |
Deniable Authentication on the Internet.  |
Inscrypt  |
2007 |
DBLP DOI BibTeX RDF |
Authentication, Protocol, Key Exchange, Deniability |
48 | Shaoquan Jiang, Guang Gong |
Efficient Authenticators with Application to Key Exchange.  |
ICISC  |
2005 |
DBLP DOI BibTeX RDF |
|
48 | Changhua He, John C. Mitchell |
Analysis of the 802.11i 4-way handshake.  |
Workshop on Wireless Security  |
2004 |
DBLP DOI BibTeX RDF |
4-way handshake, authentication, WLAN, key management, denial-of-service, 802.11i |
44 | Tetsuo Kamina, Toshinori Aoki, Yoshiteru Eto, Noboru Koshizuka, Jun Yamada, Ken Sakamura |
Verifying Identifier-Authenticity in Ubiquitous Computing Environment.  |
AINA Workshops (2)  |
2007 |
DBLP DOI BibTeX RDF |
2-D code, ucode, authenticator, infrastructure, QR Code |
44 | Yiu Shing Terry Tin, Harikrishna Vasanta, Colin Boyd, Juan Manuel González Nieto |
Protocols with Security Proofs for Mobile Applications.  |
ACISP  |
2004 |
DBLP DOI BibTeX RDF |
secure key exchange, authenticator, Provable security, mobile security |
43 | Ying-Han Pang, Andrew Teoh Beng Jin, David Ngo Chek Ling |
Two-Factor Cancelable Biometrics Authenticator.  |
J. Comput. Sci. Technol.  |
2007 |
DBLP DOI BibTeX RDF |
face recognition, Geometric moments, cancelable biometrics, pseudo Zernike moment |
43 | Andrew Teoh Beng Jin, David Ngo Chek Ling, Alwyn Goh |
An Integrated Dual Factor Authenticator Based on the Face Data and Tokenised Random Number.  |
ICBA  |
2004 |
DBLP DOI BibTeX RDF |
|
43 | Donald W. Davies |
A Message Authenticator Algorithm Suitable for A Mainframe Computer.  |
CRYPTO  |
1984 |
DBLP DOI BibTeX RDF |
|
32 | Manuel Barbosa, Pooya Farshim |
Security Analysis of Standard Authentication and Key Agreement Protocols Utilising Timestamps.  |
AFRICACRYPT  |
2009 |
DBLP DOI BibTeX RDF |
Key Agreement, Timestamp, Entity Authentication |
32 | M. Abdul Alim, Behçet Sarikaya |
EAP-Sens: a security architecture for wireless sensor networks.  |
WICON  |
2008 |
DBLP DOI BibTeX RDF |
GPSK, security, wireless sensor network, WPAN, EAP |
32 | Yunlei Zhao, Chan H. Lee, Yiming Zhao, Hong Zhu 0004 |
Some Observations on Zap and Its Applications.  |
ACNS  |
2004 |
DBLP DOI BibTeX RDF |
Zap, public-coin honest verifier zero-knowledge, deniable authentication, timed commitment, witness indistinguishability |
32 | Yvo Desmedt, Yair Frankel |
Shared Generation of Authenticators and Signatures (Extended Abstract).  |
CRYPTO  |
1991 |
DBLP DOI BibTeX RDF |
|
32 | Albrecht Beutelspacher |
Perfect and Essentially Perfect Authentication Schemes.  |
EUROCRYPT  |
1987 |
DBLP DOI BibTeX RDF |
|
28 | Yang Zhang |
Effective Attacks in the Tor Authentication Protocol.  |
NSS  |
2009 |
DBLP DOI BibTeX RDF |
Tor Authentication Protocol, Onion Routing Protocol, Authenticator, Tor, Universally Composable Security |
28 | Qing Li 0034, Yih-Chun Hu, Meiyuan Zhao, Adrian Perrig, Jesse Walker, Wade Trappe |
SEAR: a secure efficient ad hoc on demand routing protocol for wireless networks.  |
AsiaCCS  |
2008 |
DBLP DOI BibTeX RDF |
SEAR, authenticator, one-way hash function |
27 | Vassilis Papaspirou, Maria Papathanasaki, Leandros A. Maglaras, Ioanna Kantzavelou, Christos Douligeris, Mohamed Amine Ferrag, Helge Janicke |
A Novel Authentication Method That Combines Honeytokens and Google Authenticator.  |
Inf.  |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Shay Gueron |
A New Interpretation for the GHASH Authenticator of AES-GCM.  |
CSCML  |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Michal Kepkowski, Lucjan Hanzlik, Ian D. Wood, Mohamed Ali Kâafar |
How Not to Handle Keys: Timing Attacks on FIDO Authenticator Privacy.  |
Proc. Priv. Enhancing Technol.  |
2022 |
DBLP DOI BibTeX RDF |
|
27 | Michal Kepkowski, Lucjan Hanzlik, Ian D. Wood, Mohamed Ali Kâafar |
How Not to Handle Keys: Timing Attacks on FIDO Authenticator Privacy.  |
CoRR  |
2022 |
DBLP DOI BibTeX RDF |
|
27 | Narla John Metilda Sagaya Mary, Srinivasan Umesh, Sandesh Varadaraju Katta |
S-Vectors and TESA: Speaker Embeddings and a Speaker Authenticator Based on Transformer Encoder.  |
IEEE ACM Trans. Audio Speech Lang. Process.  |
2022 |
DBLP DOI BibTeX RDF |
|
27 | Harshat Kumar, Hojjat Seyed Mousavi, Behrooz Shahsavari |
Fusion-Id: A Photoplethysmography and Motion Sensor Fusion Biometric Authenticator With Few-Shot on-Boarding.  |
ICASSP  |
2022 |
DBLP DOI BibTeX RDF |
|
27 | Vassilis Papaspirou, Maria Papathanasaki, Leandros A. Maglaras, Ioanna Kantzavelou, Christos Douligeris, Mohamed Amine Ferrag, Helge Janicke |
Security Revisited: Honeytokens meet Google Authenticator.  |
SEEDA-CECNSM  |
2022 |
DBLP DOI BibTeX RDF |
|
27 | Markus Keil, Philipp Markert, Markus Dürmuth |
"It's Just a Lot of Prerequisites": A User Perception and Usability Analysis of the German ID Card as a FIDO2 Authenticator.  |
EuroUSEC  |
2022 |
DBLP DOI BibTeX RDF |
|
27 | Xiang Gao, Jia Yu 0005, Wenting Shen, Yan Chang, Shibin Zhang, Ming Yang 0023, Bin Wu |
Achieving low-entropy secure cloud data auditing with file and authenticator deduplication.  |
Inf. Sci.  |
2021 |
DBLP DOI BibTeX RDF |
|
27 | Vassilis Papaspirou, Maria Papathanasaki, Leandros A. Maglaras, Ioanna Kantzavelou, Christos Douligeris, Mohamed Amine Ferrag, Helge Janicke |
Cybersecurity Revisited: Honeytokens meet Google Authenticator.  |
CoRR  |
2021 |
DBLP BibTeX RDF |
|
27 | Chris Culnane, Christopher J. P. Newton, Helen Treharne |
Technical Report on a Virtual CTAP2 WebAuthn Authenticator.  |
CoRR  |
2021 |
DBLP BibTeX RDF |
|
27 | Yuto Okawa, Shuji Yamaguchi, Hidehito Gomi, Tetsutaro Uehara |
Implementation of an extended FIDO2 authenticator using Attribute-Based Signatures.  |
QRS Companion  |
2021 |
DBLP DOI BibTeX RDF |
|
27 | Yan Xu 0007, Song Sun, Jie Cui 0004, Hong Zhong 0001 |
Intrusion-resilient public cloud auditing scheme with authenticator update.  |
Inf. Sci.  |
2020 |
DBLP DOI BibTeX RDF |
|
27 | Bikash Debnath, Jadav Chandra Das, Debashis De, Ferial Ghaemi, Ali Ahmadian, Norazak Senu |
Reversible Palm Vein Authenticator Design With Quantum Dot Cellular Automata for Information Security in Nanocommunication Network.  |
IEEE Access  |
2020 |
DBLP DOI BibTeX RDF |
|
27 | Hui Li 0070, Xuesong Pan, Xinluo Wang, Haonan Feng, Chengjie Shi |
Authenticator Rebinding Attack of the UAF Protocol on Mobile Devices.  |
Wirel. Commun. Mob. Comput.  |
2020 |
DBLP DOI BibTeX RDF |
|
27 | Chengqian Guo, Quanwei Cai 0001, Qiongxiao Wang, Jingqiang Lin |
Extending Registration and Authentication Processes of FIDO2 External Authenticator with QR Codes.  |
TrustCom  |
2020 |
DBLP DOI BibTeX RDF |
|
27 | Jin Wook Byun |
On the Secure Design of Hash-Based Authenticator in the Smartcard Authentication System.  |
Wirel. Pers. Commun.  |
2019 |
DBLP DOI BibTeX RDF |
|
27 | Yun-Tai Chang, Marc J. Dupuis |
My Voiceprint Is My Authenticator: A Two-Layer Authentication Approach Using Voiceprint for Voice Assistants.  |
SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI  |
2019 |
DBLP DOI BibTeX RDF |
|
27 | Nikola K. Blanchard, Siargey Kachanovich, Ted Selker, Florentin Waligorski |
Reflexive Memory Authenticator: A Proposal for Effortless Renewable Biometrics.  |
ETAA@ESORICS  |
2019 |
DBLP DOI BibTeX RDF |
|
27 | Hubert Garavel, Lina Marsso |
Comparative Study of Eight Formal Specifications of the Message Authenticator Algorithm.  |
MARS/VPT@ETAPS  |
2018 |
DBLP DOI BibTeX RDF |
|
27 | Florian Reimair, Christian Kollmann, Alexander Marsalek |
Emulating U2F authenticator devices.  |
CNS  |
2016 |
DBLP DOI BibTeX RDF |
|
27 | Roland H. Steinegger, Daniel Deckers, Pascal Giessler, Sebastian Abeck |
Risk-based authenticator for web applications.  |
EuroPLoP  |
2016 |
DBLP BibTeX RDF |
|
27 | Wenting Shen, Jia Yu 0005, Rong Hao, Xu An Wang 0001 |
A Public Cloud Storage Auditing Scheme with Lightweight Authenticator Generation.  |
3PGCIC  |
2015 |
DBLP DOI BibTeX RDF |
|
27 | Guangdong Bai, Jun Sun 0001, Jianliang Wu, Quanqi Ye, Li Li 0044, Jin Song Dong, Shanqing Guo |
All Your Sessions Are Belong to Us: Investigating Authenticator Leakage through Backup Channels on Android.  |
ICECCS  |
2015 |
DBLP DOI BibTeX RDF |
|
27 | Nikolaos Pitropakis, Nikolaos Yfantopoulos, Dimitris Geneiatakis, Costas Lambrinoudakis |
Towards an augmented authenticator in the Cloud.  |
ISSPIT  |
2014 |
DBLP DOI BibTeX RDF |
|
27 | Andrea Bartoli, Juan Hernández-Serrano, Olga León, Apostolos A. Kountouris, Dominique Barthel |
Energy-efficient physical layer packet authenticator for machine-to-machine networks.  |
Trans. Emerg. Telecommun. Technol.  |
2013 |
DBLP DOI BibTeX RDF |
|
27 | Klaus John, Stefan Taber, Andreas Ehringfeld |
Proxy Authenticator - Approach of a Signature-based Single Sign On Solution for E-Government Services.  |
EGOV/ePart Ongoing Research  |
2013 |
DBLP BibTeX RDF |
|
27 | Haibo Tian |
Deniable message transmission authenticator based on weak signature schemes.  |
IET Inf. Secur.  |
2012 |
DBLP DOI BibTeX RDF |
|
27 | Chien-Yuan Chen, Cheng-Yuan Ku, David C. Yen |
Cryptographic relational algebra for databases using the field authenticator.  |
Comput. Math. Appl.  |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Hyoungjoo Lee, Sungzoon Cho |
Retraining a keystroke dynamics-based authenticator with impostor patterns.  |
Comput. Secur.  |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Pilsung Kang 0001, Seongseob Hwang, Sungzoon Cho |
Continual Retraining of Keystroke Dynamics Based Authenticator.  |
ICB  |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Nicolas Sklavos 0001, Costas Efstathiou |
SecurID Authenticator: On the Hardware Implementation Efficiency.  |
ICECS  |
2007 |
DBLP DOI BibTeX RDF |
|
27 | John R. Vollbrecht, Pasi Eronen, Nick L. Petroni Jr., Yoshihiro Ohba |
State Machines for Extensible Authentication Protocol (EAP) Peer and Authenticator.  |
RFC  |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Raymond S. T. Lee |
iJADE Authenticator - An Intelligent Multiagent Based Facial Authentication System.  |
Int. J. Pattern Recognit. Artif. Intell.  |
2002 |
DBLP DOI BibTeX RDF |
|
27 | Bart Preneel, Vincent Rijmen, Paul C. van Oorschot |
Security analysis of the message authenticator algorithm (MAA).  |
Eur. Trans. Telecommun.  |
1997 |
DBLP DOI BibTeX RDF |
|
16 | Giuseppe Ateniese, Seny Kamara, Jonathan Katz |
Proofs of Storage from Homomorphic Identification Protocols.  |
ASIACRYPT  |
2009 |
DBLP DOI BibTeX RDF |
|
16 | Jing Liu 0003, Xinming Ye, Jun Zhang 0001, Jun Li 0002 |
Security Verification of 802.11i 4-Way Handshake Protocol.  |
ICC  |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Hovav Shacham, Brent Waters |
Compact Proofs of Retrievability.  |
ASIACRYPT  |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Ee-Chien Chang, Jia Xu 0006 |
Remote Integrity Check with Dishonest Storage Server.  |
ESORICS  |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Huijuan Yang, Alex ChiChung Kot |
Pattern-Based Data Hiding for Binary Image Authentication by Connectivity-Preserving.  |
IEEE Trans. Multim.  |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Rafael Marín López, Pedro J. Fernández, Antonio Fernandez Gómez-Skarmeta |
3-Party Approach for Fast Handover in EAP-Based Wireless Networks.  |
OTM Conferences (2)  |
2007 |
DBLP DOI BibTeX RDF |
security, authentication, key distribution, Fast handover |
16 | Matti Pöllä, Timo Honkela |
Probabilistic Text Change Detection Using an Immune Model.  |
IJCNN  |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Liang Li, Wei-Qiang Jiang, Jie Tian 0001, Yixian Yang, Cai-Ping Jiang, Zhe Wu, Xin Yang 0001 |
A Networking Identity Authentication Scheme Combining Fingerprint Coding and Identity Based Encryption.  |
ISI  |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Chin-Chen Chang 0001, Chih-Chiang Tsou, Yung-Chen Chou |
A Remediable Image Authentication Scheme Based on Feature Extraction and Clustered VQ.  |
PCM  |
2007 |
DBLP DOI BibTeX RDF |
quad-tree segmentation, Image authentication, tampering detection |
16 | Zinaida Benenson, Felix C. Freiling, Ernest Hammerschmidt, Stefan Lucks, Lexi Pimenidis |
Authenticated Query Flooding in Sensor Networks.  |
SEC  |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Seong-Pyo Hong, Jong-An Park, Seung Jo Han, Jae-Young Pyun, Joon Lee |
Design of WLAN Secure System Against Weaknesses of the IEEE 802.1x.  |
ICHIT  |
2006 |
DBLP DOI BibTeX RDF |
IEEE 802.1x, Privacy, Authentication, Wireless LAN Security |
16 | Ravi Mukkamala, Vijayalakshmi Atluri, Janice Warner, Ranjit Abbadasari |
A Distributed Coalition Service Registry for Ad-Hoc Dynamic Coalitions: A Service-Oriented Approach. (PDF / PS)  |
DBSec  |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Guomin Yang, Duncan S. Wong, Xiaotie Deng |
Efficient Anonymous Roaming and Its Security Analysis.  |
ACNS  |
2005 |
DBLP DOI BibTeX RDF |
Anonymous Roaming, Authenticated Key Exchange |
16 | Virgil Griffith, Markus Jakobsson |
Messin' with Texas Deriving Mother's Maiden Names Using Public Records.  |
ACNS  |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock |
Errors in Computational Complexity Proofs for Protocols.  |
ASIACRYPT  |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Jun Jiang, Chen He 0001, Ling-ge Jiang |
On the Design of Provably Secure Identity-Based Authentication and Key Exchange Protocol for Heterogeneous Wireless Access.  |
ICCNMC  |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Daniel J. Bernstein |
The Poly1305-AES Message-Authentication Code.  |
FSE  |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Shintaro Mizuno, Kohji Yamada, Kenji Takahashi |
Authentication using multiple communication channels.  |
Digital Identity Management  |
2005 |
DBLP DOI BibTeX RDF |
internet, authentication, mobile phone, multiple channels |
16 | Ying-Han Pang, Andrew Teoh Beng Jin, David Ngo Chek Ling |
Binarized Revocable Biometrics in Face Recognition.  |
CIS (2)  |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Ying-Han Pang, Andrew Teoh Beng Jin, David Ngo Chek Ling |
A Robust Face Recognition System.  |
Australian Conference on Artificial Intelligence  |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Tee Connie, Andrew Teoh Beng Jin, Michael Goh Kah Ong, David Ngo Chek Ling |
PalmHashing: a novel approach for dual-factor authentication.  |
Pattern Anal. Appl.  |
2004 |
DBLP DOI BibTeX RDF |
PalmHash, Security, Biometric, Token, Palmprint recognition, Two-factor authenticators |
16 | Yang Zhao, Patrizio Campisi, Deepa Kundur |
Dual domain watermarking for authentication and compression of cultural heritage image.  |
IEEE Trans. Image Process.  |
2004 |
DBLP DOI BibTeX RDF |
|
16 | Erik Anderson, Cheryl L. Beaver, Timothy Draelos, Richard Schroeppel, Mark Torgerson |
ManTiCore: Encryption with Joint Cipher-State Authentication.  |
ACISP  |
2004 |
DBLP DOI BibTeX RDF |
Encryption Mode, Inexpensive Authentication, Luby-Rackoff, Feistel, Middletext, Hash, Cipher |
16 | Mi-Ae Kim, Geun-Sil Song, Won-Hyung Lee |
A Robust Image Authentication Method Surviving Acceptable Modifications.  |
ICCSA (1)  |
2004 |
DBLP DOI BibTeX RDF |
|
16 | Simson L. Garfinkel |
Email-Based Identification and Authentication: An Alternative to PKI?  |
IEEE Secur. Priv.  |
2003 |
DBLP DOI BibTeX RDF |
EBIA, Email Security, Social Security Numbers (SSNs), PKI, Identity Theft |
16 | Michelle S. Wangham, Joni da Silva Fraga, Rafael R. Obelheiro, Galeno A. Jung, Elizabeth Fernandes 0001 |
Security Mechanisms for Mobile Agent Platforms Based on SPKI/SDSI Chains of Trust.  |
SELMAS ![In: Software Engineering for Multi-Agent Systems II, Research Issues and Practical Applications [the book is a result of SELMAS 2003], pp. 207-224, 2003, Springer, 3-540-21182-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
16 | Michelle S. Wangham, Joni da Silva Fraga, Rafael R. Obelheiro |
A Security Scheme for Mobile Agent Platforms in Large-Scale Systems.  |
Communications and Multimedia Security  |
2003 |
DBLP DOI BibTeX RDF |
|
16 | Alwyn Goh, Geong Sen Poh, David Ngo Chek Ling |
Loss-Tolerant Stream Authentication via Configurable Integration of One-Time Signatures and Hash-Graphs.  |
Communications and Multimedia Security  |
2003 |
DBLP DOI BibTeX RDF |
|
16 | Tero Alamäki, Margareta Björksten, Péter Dornbach, Casper Gripenberg, Norbert Gyorbíró, Gábor Márton, Zoltán Németh, Timo Skyttä, Mikko Tarkiainen |
Privacy Enhancing Service Architectures.  |
Privacy Enhancing Technologies  |
2002 |
DBLP DOI BibTeX RDF |
|
16 | Ching-Yung Lin, Shih-Fu Chang |
SARI: self-authentication-and-recovery image watermarking system.  |
ACM Multimedia  |
2001 |
DBLP DOI BibTeX RDF |
authentication, watermarking, recovery, information hiding, multimedia security |
16 | Maria Grazia Albanesi, Marco Ferretti, Federico Guerrini |
A Taxonomy for Image Authentication Techniques and its Application to the Current State of the Art.  |
ICIAP  |
2001 |
DBLP DOI BibTeX RDF |
|
16 | Reihaneh Safavi-Naini, Huaxiong Wang, Chaoping Xing |
Linear Authentication Codes: Bounds and Constructions.  |
INDOCRYPT  |
2001 |
DBLP DOI BibTeX RDF |
Linear Authentication Codes, Distributed Authentication Codes, Authentication Codes |
16 | Stuart E. Schechter, Todd Parnell, Alexander J. Hartemink |
Anonymous Authentication of Membership in Dynamic Groups.  |
Financial Cryptography  |
1999 |
DBLP DOI BibTeX RDF |
key replacement, verifiably common secret encoding, authentication, anonymity, identification |
16 | Stefan Wolf 0001 |
Strong Security Against Active Attacks in Information-Theoretic Secret-Key Agreement.  |
ASIACRYPT  |
1998 |
DBLP DOI BibTeX RDF |
unconditional secrecy, authentication, information theory, privacy amplification, Secret-key agreement |