|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 8079 occurrences of 2235 keywords
|
|
|
Results
Found 25398 publication records. Showing 25398 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
81 | Stuart E. Schechter, Robert W. Reeder |
1 + 1 = you: measuring the comprehensibility of metaphors for configuring backup authentication.  |
SOUPS  |
2009 |
DBLP DOI BibTeX RDF |
backup authentication, password reset, authentication |
77 | Jae-Woo Lee |
Security Agent Model Using Interactive Authentication Database.  |
AIS  |
2004 |
DBLP DOI BibTeX RDF |
|
71 | Jae-Woo Lee |
Client Authentication Model Using Duplicated Authentication Server Systems.  |
AIS  |
2004 |
DBLP DOI BibTeX RDF |
|
68 | Goce Jakimoski |
Unconditionally Secure Information Authentication in Presence of Erasures.  |
IMACC  |
2005 |
DBLP DOI BibTeX RDF |
erasure- resilient codes, erasure-tolerant authentication, message authentication, authentication codes |
64 | David Q. Liu, Mark Coslow |
Extensible authentication protocols for IEEE standards 802.11 and 802.16.  |
Mobility Conference  |
2008 |
DBLP DOI BibTeX RDF |
extensible authentication protocol, wireless, IEEE 802.11, EAP |
64 | Guojun Wang 0001, Qiong Wang, Jiannong Cao 0001, Minyi Guo |
An Effective Trust Establishment Scheme for Authentication in Mobile Ad Hoc Networks.  |
CIT  |
2007 |
DBLP DOI BibTeX RDF |
Trust Transfer, Mobile Ad-Hoc Networks, Authentication, Cryptography, Secret Sharing |
64 | Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciarini, Elisa Bertino |
Privacy preserving multi-factor authentication with biometrics.  |
Digital Identity Management  |
2006 |
DBLP DOI BibTeX RDF |
identity theft prevention, privacy, authentication, biometrics |
60 | Youngsook Lee, Junghyun Nam, Seungjoo Kim, Dongho Won |
Two Efficient and Secure Authentication Schemes Using Smart Cards.  |
ICCSA (5)  |
2006 |
DBLP DOI BibTeX RDF |
smart card, password, mutual authentication, Authentication scheme |
56 | Lunwei Wang, Lianyue He, Xiangke Liao, Huaimin Wang |
Research on Control Flags-based Weighted Authentication Trustworthiness Model.  |
PRDC  |
2005 |
DBLP DOI BibTeX RDF |
|
56 | Lunwei Wang, Lifeng Wei, Xiangke Liao, Huaimin Wang |
AT-RBAC: An Authentication Trustworthiness-Based RBAC Model.  |
GCC Workshops  |
2004 |
DBLP DOI BibTeX RDF |
|
56 | Peng Ning, An Liu, Wenliang Du |
Mitigating DoS attacks against broadcast authentication in wireless sensor networks.  |
ACM Trans. Sens. Networks  |
2008 |
DBLP DOI BibTeX RDF |
security, Sensor networks, broadcast authentication, DoS attacks |
56 | Heesun Park, Stan Redford |
Client certificate and IP address based multi-factor authentication for J2EE web applications.  |
CASCON  |
2007 |
DBLP DOI BibTeX RDF |
IP address checking, J2EE web application, SSL client certificate, certificate based authentication, multi-factor authentication |
56 | Reihaneh Safavi-Naini, Huaxiong Wang, Chaoping Xing |
Linear Authentication Codes: Bounds and Constructions.  |
INDOCRYPT  |
2001 |
DBLP DOI BibTeX RDF |
Linear Authentication Codes, Distributed Authentication Codes, Authentication Codes |
52 | Yatao Yang, Yonghao Gu, Xi Tan, Lina Ma |
A New Wireless Mesh Network Authentication Scheme Based on Threshold Method.  |
ICYCS  |
2008 |
DBLP DOI BibTeX RDF |
|
52 | Chung-Ming Huang, Jian-Wei Li |
One-Pass Authentication and Key Agreement Procedure in IP Multimedia Subsystem for UMTS.  |
AINA  |
2007 |
DBLP DOI BibTeX RDF |
|
52 | Qing Li 0034, Wade Trappe |
Reducing delay and enhancing DoS resistance in multicast authentication through multigrade security.  |
IEEE Trans. Inf. Forensics Secur.  |
2006 |
DBLP DOI BibTeX RDF |
|
52 | Jaeduck Choi, Souhwan Jung, Younghan Kim 0002, Myungsik Yoo |
A Fast and Efficient Handover Authentication Achieving Conditional Privacy in V2I Networks.  |
NEW2AN  |
2009 |
DBLP DOI BibTeX RDF |
V2I, Handover Authentication, Conditional Privacy, VANET |
52 | Takeyuki Uehara, Reihaneh Safavi-Naini, Philip Ogunbona |
A secure and flexible authentication system for digital images.  |
Multim. Syst.  |
2004 |
DBLP DOI BibTeX RDF |
Compression tolerance, JPEG, Image authentication |
52 | Hao Chen 0095 |
Efficient compromising resilient authentication schemes for large scale wireless sensor networks.  |
WISEC  |
2010 |
DBLP DOI BibTeX RDF |
code and function based authentication schemes, polynomial based authentication scheme, wireless sensor netowork |
48 | Jung-Muk Lim, Hyung-Jin Lim, Tai-Myoung Chung |
Performance Evaluation of Public Key Based Mechanisms for Mobile IPv4 Authentication in AAA Environments.  |
ICOIN  |
2006 |
DBLP DOI BibTeX RDF |
|
48 | Jiayang Liu, Lin Zhong 0001, Jehan Wickramasuriya, Venu Vasudevan |
User evaluation of lightweight user authentication with a single tri-axis accelerometer.  |
Mobile HCI  |
2009 |
DBLP DOI BibTeX RDF |
authentication, user study, gesture, accelerometer |
48 | Seong-Soo Park 0001, Jong-Hyouk Lee, Tai-Myoung Chung |
Authentication Analysis Based on Certificate for Proxy Mobile IPv6 Environment.  |
ICCSA (1)  |
2009 |
DBLP DOI BibTeX RDF |
Proxy MIPv6, EAP-TLS, Authentication, Certificate, BAN Logic |
48 | Ivonne Thomas, Michael Menzel 0001, Christoph Meinel |
Using quantified trust levels to describe authentication requirements in federated identity management.  |
SWS  |
2008 |
DBLP DOI BibTeX RDF |
authentication and access control, trust levels, web service federation, trust management, federated identity management |
48 | Su Jung Yu, Joo-Seok Song |
A New Authentication and Key Agreement Protocol Scheme in Convergence of UMTS and DVB-H Networks.  |
KES (3)  |
2007 |
DBLP DOI BibTeX RDF |
security, authentication, UMTS, DVB-H, convergence networks |
48 | Haifeng Qian, Zhenfu Cao, Lichen Wang, Qingshui Xue |
Efficient Non-interactive Deniable Authentication Protocols.  |
CIT  |
2005 |
DBLP DOI BibTeX RDF |
Tight security, Authentication, Digital signature, MAC, Deniablity, Impersonation attack, Trapdoor permutations |
48 | IkSu Park, Seung Bae Park, ByeongKyun Oh |
User Authentication Protocol Based on Human Memorable Password and Using RSA.  |
ICCSA (1)  |
2004 |
DBLP DOI BibTeX RDF |
Password Dictionary, Authentication, Cryptography, public key cryptography, Password authentication |
48 | IkSu Park, Seung Bae Park, ByeongKyun Oh |
User Authentication Protocol Based on Human Memorable Password and Using RSA.  |
ICCSA (4)  |
2004 |
DBLP DOI BibTeX RDF |
Password Dictionary, Authentication, Cryptography, public key cryptography, Password authentication |
46 | Saber Zrelli, Yoichi Shinoda |
Experimental Evaluation of EAP Performance in Roaming Scenarios.  |
AINTEC  |
2007 |
DBLP DOI BibTeX RDF |
|
46 | Seo-Il Kang, Deok-Gyu Lee, Im-Yeong Lee |
A Study on Key Distribution and ID Registration in the AAA System for Ubiquitous Multimedia Environments.  |
MMM (2)  |
2007 |
DBLP DOI BibTeX RDF |
ID registration, Authentication, key distribution, Multimedia service |
46 | Suguru Fujisawa, Makoto Otani, Kenzi Watanabe |
Implementation of PKI Authentication Functions for Network User Authentication System "Opengate".  |
SAINT  |
2008 |
DBLP DOI BibTeX RDF |
UPKI, Network User Authentication, Opengate, PKI |
45 | Leonid Kompanets, Janusz Bobulski, Roman Wyrzykowski |
Pseudo-entropy Similarity for Human Biometrics.  |
Biometric Authentication  |
2002 |
DBLP DOI BibTeX RDF |
|
44 | Jae-Woo Lee |
A Policy of Copyright Protection Using Authentication Key Based on Digital Watermarking.  |
MUE  |
2007 |
DBLP DOI BibTeX RDF |
|
44 | Chuhong Fei, Deepa Kundur, Raymond H. Kwong |
Analysis and design of secure watermark-based authentication systems.  |
IEEE Trans. Inf. Forensics Secur.  |
2006 |
DBLP DOI BibTeX RDF |
|
44 | Takamichi Saito, Ryosuke Hatsugai, Toshiyuki Kito |
On Compromising Password-Based Authentication over HTTPS.  |
AINA (1)  |
2006 |
DBLP DOI BibTeX RDF |
|
44 | Kihun Hong, Souhwan Jung, Shyhtsun Felix Wu |
A Hash-Chain Based Authentication Scheme for Fast Handover in Wireless Network.  |
WISA  |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Koji Iwano, Taro Miyazaki, Sadaoki Furui |
Multimodal Speaker Verification Using Ear Image Features Extracted by PCA and ICA.  |
AVBPA  |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Hea Suk Jo, Hee Yong Youn |
A New Synchronization Protocol for Authentication in Wireless LAN Environment.  |
ICCSA (1)  |
2004 |
DBLP DOI BibTeX RDF |
|
44 | Hea Suk Jo, Hee Yong Youn |
A New Synchronization Protocol for Authentication in Wireless LAN Environment.  |
ICCSA (3)  |
2004 |
DBLP DOI BibTeX RDF |
|
44 | Michael J. Covington, Mustaque Ahamad, Irfan A. Essa, H. Venkateswaran |
Parameterized Authentication.  |
ESORICS  |
2004 |
DBLP DOI BibTeX RDF |
|
44 | Ji Ma 0001, Mehmet A. Orgun |
Formalising theories of trust for authentication protocols.  |
Inf. Syst. Frontiers  |
2008 |
DBLP DOI BibTeX RDF |
Trust theory, Agents, Authentication protocols, Belief logic |
44 | Jihwan Lim, Heekuck Oh, Sangjin Kim |
A New Hash-Based RFID Mutual Authentication Protocol Providing Enhanced User Privacy Protection.  |
ISPEC  |
2008 |
DBLP DOI BibTeX RDF |
Authentication, RFID, User Privacy |
44 | Youngsook Lee, Junghyun Nam, Dongho Won |
Vulnerabilities in a Remote Agent Authentication Scheme Using Smart Cards.  |
KES-AMSTA  |
2008 |
DBLP DOI BibTeX RDF |
distributed system, smart card, impersonation attack, authentication scheme |
44 | Kui Ren 0001, Wenjing Lou |
Privacy-enhanced, Attack-resilient Access Control in Pervasive Computing Environments with Optional Context Authentication Capability.  |
Mob. Networks Appl.  |
2007 |
DBLP DOI BibTeX RDF |
pervasive computing environment (PCE), context authentication, security, privacy, access control |
44 | Giovanni Di Crescenzo, Munir Cochinwala, Hyong Sop Shim |
Modeling cryptographic properties of voice and voice-based entity authentication.  |
Digital Identity Management  |
2007 |
DBLP DOI BibTeX RDF |
modeling human factors, biometrics, voice, entity authentication |
44 | Kai Chen 0007, Xinglei Zhu, Zhishou Zhang |
A Hybrid Content-Based Image Authentication Scheme.  |
PCM  |
2007 |
DBLP DOI BibTeX RDF |
Content hash, Watermarking, Digital Signature, ECC, Image Authentication |
44 | Cástor Mariño, Manuel G. Penedo, Marta Penas, María J. Carreira, F. González |
Personal authentication using digital retinal images.  |
Pattern Anal. Appl.  |
2006 |
DBLP DOI BibTeX RDF |
Digital retinal images, Registration, Personal authentication, Creases |
44 | Byungkwan Park, Daesung Moon, Yongwha Chung, Jin-Won Park |
Capacity Planning for Scalable Fingerprint Authentication.  |
KES (1)  |
2006 |
DBLP DOI BibTeX RDF |
Performance Evaluation, Authentication Protocol, Fingerprint Verification |
44 | Hea Suk Jo, Hee Yong Youn |
A Secure User Authentication Protocol Based on One-Time-Password for Home Network.  |
ICCSA (1)  |
2005 |
DBLP DOI BibTeX RDF |
three-way handshake, security, Authentication, home network, one-time password |
44 | Shiqun Li, Jianying Zhou 0001, Xiangxue Li, Kefei Chen |
An Authentication Protocol for Pervasive Computing.  |
ISPA  |
2005 |
DBLP DOI BibTeX RDF |
Pervasive Computing Security, Authentication, E-Commerce, Public Key Infrastructure |
44 | Zheng Liu, Xue Li 0001, Zhaoyang Dong |
Multimedia authentication with sensor-based watermarking.  |
MM&Sec  |
2004 |
DBLP DOI BibTeX RDF |
fuzzy identification system, authentication, fragile watermarking |
44 | Michael Kaminsky, George Savvides, David Mazières, M. Frans Kaashoek |
Decentralized user authentication in a global file system.  |
SOSP  |
2003 |
DBLP DOI BibTeX RDF |
authentication, authorization, file system, groups, users, credentials, ACL, SFS |
44 | Willy Susilo, Yi Mu 0001 |
Non-interactive Deniable Ring Authentication.  |
ICISC  |
2003 |
DBLP DOI BibTeX RDF |
Ring signature schemes, non-interactive, ring-to-ring authentication, deniable |
43 | Xiehua Li, ShuTang Yang, Jian-Hua Li, HongWen Zhu |
Security Protocol Analysis with Improved Authentication Tests.  |
ISPEC  |
2006 |
DBLP DOI BibTeX RDF |
Authentication tests, Message type, Neuman-Stubblebine protocol, Improved authentication tests |
43 | Kee-Won Kim, Jun-Cheol Jeon, Kee-Young Yoo |
Efficient and Secure Password Authentication Schemes for Low-Power Devices.  |
MSN  |
2005 |
DBLP DOI BibTeX RDF |
low-power device, wireless network, password authentication, mutual authentication |
43 | Adrian Perrig |
The BiBa one-time signature and broadcast authentication protocol.  |
CCS  |
2001 |
DBLP DOI BibTeX RDF |
signature based on a one-way function without trapdoor, source authentication for multicast, broadcast authentication, one-time signature |
43 | Reihaneh Safavi-Naini, Huaxiong Wang |
New Results on Multi-Receiver Authentication Codes.  |
EUROCRYPT  |
1998 |
DBLP DOI BibTeX RDF |
Multi-receiver authentication code, Authentication code |
43 | Taekyoung Kwon 0002, JooSeok Song |
Security and efficiency in authentication protocols resistant to password guessing attack.  |
LCN  |
1997 |
DBLP DOI BibTeX RDF |
password guessing attack resistance, secret, user-chosen weak secret, security-oriented protocols, cipher operations, protocol steps, poorly-chosen weak secret protection, security, efficiency, cryptographic protocols, key exchange, message authentication, authentication protocols, secure communications, random numbers, dictionary attacks |
43 | Antonio Izquierdo, Nada Golmie, Katrin Hoeper, Lidong Chen |
Using the EAP framework for fast media independent handover authentication.  |
WICON  |
2008 |
DBLP DOI BibTeX RDF |
pre-authentication, re-authentication, performance, authentication, handover, EAP |
42 | Jochen Liedtke |
A Short Note on Small Virtually-Addresses Control Blocks.  |
ACM SIGOPS Oper. Syst. Rev.  |
1995 |
DBLP DOI BibTeX RDF |
|
42 | Jiafen Liu, Mingtian Zhou |
Designing an Authentication Protocol via Authentication Test.  |
ISCC  |
2007 |
DBLP DOI BibTeX RDF |
|
42 | Qinghan Xiao |
Biometric User Authentication for Heightened Information Security.  |
ICBA  |
2004 |
DBLP DOI BibTeX RDF |
|
42 | Jae-Woo Lee, Doo-Kwon Baik |
Improved Client Authentication Using Session Authentication in the Internet.  |
Human.Society@Internet 2003  |
2003 |
DBLP DOI BibTeX RDF |
|
42 | Kenta Matsumiya, Soko Aoki, Masana Murase, Hideyuki Tokuda |
Zero-Stop Authentication: Sensor-Based Real-Time Authentication System.  |
RTCSA  |
2003 |
DBLP DOI BibTeX RDF |
|
41 | Deok-Gyu Lee, Yun-kyung Lee, Jong Wook Han, Jong Hyuk Park, Im-Yeong Lee |
Intelligent Home Network Authentication: Home Device Authentication Using Device Certification.  |
OTM Conferences (2)  |
2007 |
DBLP DOI BibTeX RDF |
home device authentication, home device certificate |
41 | Yun-kyung Lee, Deok-Gyu Lee, Jong Wook Han, Kyo-Il Chung |
Home Network Device Authentication: Device Authentication Framework and Device Certificate Profile.  |
APWeb/WAIM Workshops  |
2007 |
DBLP DOI BibTeX RDF |
home network security, home device authentication, home device certificate |
41 | Ruud M. Bolle, Andrew W. Senior, Nalini K. Ratha, Sharath Pankanti |
Fingerprint Minutiae: A Constructive Definition.  |
Biometric Authentication  |
2002 |
DBLP DOI BibTeX RDF |
|
41 | Massimo Tistarelli, Andrea Lagorio, Enrico Grosso |
Understanding Iconic Image-Based Face Biometrics.  |
Biometric Authentication  |
2002 |
DBLP DOI BibTeX RDF |
|
41 | Tetiana Valchuk, Roman Wyrzykowski, Leonid Kompanets |
Mental Characteristics of Person as Basic Biometrics  |
Biometric Authentication  |
2002 |
DBLP DOI BibTeX RDF |
|
40 | Paul L. Yu, John S. Baras, Brian M. Sadler |
Physical-Layer Authentication.  |
IEEE Trans. Inf. Forensics Secur.  |
2008 |
DBLP DOI BibTeX RDF |
|
40 | Patryk Chamuczynski, Omar Alfandi, Henrik Brosenne, Constantin Werner, Dieter Hogrefe |
Enabling Pervasiveness by Seamless Inter-domain Handover: Performance Study of PANA Pre-authentication.  |
PerCom  |
2008 |
DBLP DOI BibTeX RDF |
Pervasive Computing |
40 | Cástor Mariño, Manuel G. Penedo, Marta Penas |
Retinal Based Authentication via Distributed Web Application.  |
EUROCAST  |
2005 |
DBLP DOI BibTeX RDF |
|
40 | Jong-hu Lee, Jae-Cheol Ryou 0001 |
Strong User Authentication in IEEE802.11 Wireless LAN.  |
Human.Society@Internet 2003  |
2003 |
DBLP DOI BibTeX RDF |
|
40 | Muxiang Zhang |
Adaptive Protocol for Entity Authentication and Key Agreement in Mobile Networks.  |
ICISC  |
2003 |
DBLP DOI BibTeX RDF |
|
39 | Hassnaa Moustafa, Jacky Forestier, Mohamed Chaari |
Distributed authentication for services commercialization in ad hoc networks.  |
Mobility Conference  |
2009 |
DBLP DOI BibTeX RDF |
authentication access controls, services commercialization using ad hoc networks, ad hoc networks |
39 | Zhimin Yang, Adam C. Champion, Boxuan Gu, Xiaole Bai, Dong Xuan |
Link-layer protection in 802.11i WLANS with dummy authentication.  |
WISEC  |
2009 |
DBLP DOI BibTeX RDF |
dummy authentication, security, wlan, open access |
39 | Ralph Holz, Heiko Niedermayer, Peter Hauck, Georg Carle |
Trust-Rated Authentication for Domain-Structured Distributed Systems.  |
EuroPKI  |
2008 |
DBLP DOI BibTeX RDF |
Trust-Rating, Distributed Systems, Peer-to-Peer, Authentication, Protocols, PKI, Multi-Domain |
39 | Debasis Giri, Parmeshwary Dayal Srivastava |
Cryptanalysis and the Improvement of Kim et al.'s Password Authentication Schemes.  |
ICISS  |
2007 |
DBLP DOI BibTeX RDF |
Authentication, Smart card, Attack, Timestamp, Nonce |
39 | Maryna Komarova, Michel Riguidel |
Optimized ticket distribution scheme for fast re-authentication protocol (fap).  |
Q2SWinet  |
2007 |
DBLP DOI BibTeX RDF |
inter-domain roaming, authentication, authorization, wireless security |
39 | Hui-Feng Huang |
An Efficient Mutual Authentication Protocol on RFID Tags.  |
EUC Workshops  |
2007 |
DBLP DOI BibTeX RDF |
security, authentication, RFID system |
39 | Young-Soo Kim, Sung-Ja Choi, Gang-Soo Lee, Geuk Lee |
Entity Based Message Authentication System.  |
KES-AMSTA  |
2007 |
DBLP DOI BibTeX RDF |
entity based cryptosystem, security, authentication, agent, public key cryptosystem |
39 | John G. Brainard, Ari Juels, Ronald L. Rivest, Michael Szydlo, Moti Yung |
Fourth-factor authentication: somebody you know.  |
CCS  |
2006 |
DBLP DOI BibTeX RDF |
hardware tokens, vouchers, authentication |
39 | Ralf Wienzek, Rajendra Persaud |
Fast Re-authentication for Handovers in Wireless Communication Networks.  |
Networking  |
2006 |
DBLP DOI BibTeX RDF |
Wireless Networks, Authentication, Handover |
39 | Youngsook Lee, Junghyun Nam, Dongho Won |
Security Enhancement of a Remote User Authentication Scheme Using Smart Cards.  |
OTM Workshops (1)  |
2006 |
DBLP DOI BibTeX RDF |
parallel session attack, smart card, password, Authentication scheme, reflection attack |
39 | Yongjian Li, Jun Pang 0001 |
Generalized Unsolicited Tests for Authentication Protocol Analysis.  |
PDCAT  |
2006 |
DBLP DOI BibTeX RDF |
the Otway-Rees protocol, authentication, cryptographic protocols, strand space |
39 | Ana Sanz Merino, Yasuhiko Matsunaga, Manish Shah, Takashi Suzuki, Randy H. Katz |
Secure Authentication System for Public WLAN Roaming.  |
Mob. Networks Appl.  |
2005 |
DBLP DOI BibTeX RDF |
policy control, authentication, wireless LAN, roaming, link layer security |
39 | Jun Li 0025, Bruce Christianson, Martin J. Loomes |
"Fair" Authentication in Pervasive Computing.  |
MADNES  |
2005 |
DBLP DOI BibTeX RDF |
Human self-determination, Mobile ad-hoc Networks, Authentication, Trust, Pervasive Computing |
39 | Makoto Otani, Katsuhiko Eguchi, Hirofumi Eto, Kenzi Watanabe, Shin-ichi Tadaki, Yoshiaki Watanabe |
Implementation of IPv6 functions for a network user authentication system opengate.  |
SIGUCCS  |
2005 |
DBLP DOI BibTeX RDF |
network user authentication system, opengate, internet, IPv6 |
39 | Nidal Aboudagga, M. Tamer Refaei, Mohamed Eltoweissy, Luiz A. DaSilva, Jean-Jacques Quisquater |
Authentication protocols for ad hoc networks: taxonomy and research issues.  |
Q2SWinet  |
2005 |
DBLP DOI BibTeX RDF |
protocol taxonomy, ad hoc networks, authentication, network security, credentials, identity verification |
39 | Chin-Chen Chang 0001, Jui-Yi Kuo, Jung-San Lee |
Time-bounded Based Password Authentication Scheme.  |
CW  |
2005 |
DBLP DOI BibTeX RDF |
Resource access, Authentication, Time-bounded |
39 | Pallav Gupta, Srivaths Ravi 0001, Anand Raghunathan, Niraj K. Jha |
Efficient fingerprint-based user authentication for embedded systems.  |
DAC  |
2005 |
DBLP DOI BibTeX RDF |
embedded systems, fingerprint, user authentication, extensible processors |
39 | Erik Anderson, Cheryl L. Beaver, Timothy Draelos, Richard Schroeppel, Mark Torgerson |
ManTiCore: Encryption with Joint Cipher-State Authentication.  |
ACISP  |
2004 |
DBLP DOI BibTeX RDF |
Encryption Mode, Inexpensive Authentication, Luby-Rackoff, Feistel, Middletext, Hash, Cipher |
39 | Valery I. Korzhik, Guillermo Morales-Luna |
Hybrid authentication based on noisy channels.  |
Int. J. Inf. Sec.  |
2003 |
DBLP DOI BibTeX RDF |
Key sharing, Information-theoretically secure authentication, Hash functions, Privacy amplification |
39 | Yasuhiko Matsunaga, Ana Sanz Merino, Takashi Suzuki, Randy H. Katz |
Secure authentication system for public WLAN roaming.  |
WMASH  |
2003 |
DBLP DOI BibTeX RDF |
policy control, authentication, wireless LAN, roaming, single sign-on, hotspot, link layer security |
39 | Yong Lee, H. K. Lee, Goo Yeon Lee, Hwa Jong Kim, Choong Kyo Jeong |
Design of hybrid authentication scheme and key distribution for mobile multi-hop relay in IEEE 802.16j.  |
EATIS  |
2009 |
DBLP DOI BibTeX RDF |
hybrid authentication, mutual authentication, mobile wireless network, multi hop relay, IEEE 802.16j |
39 | Jahan Hassan, Harsha R. Sirisena, Björn Landfeldt |
Trust-Based Fast Authentication for Multiowner Wireless Networks.  |
IEEE Trans. Mob. Comput.  |
2008 |
DBLP DOI BibTeX RDF |
Fast authentication, inter-domain authentication, Markov Models, handoff, IEEE802.11 |
39 | Roman Weiss, Alexander De Luca |
PassShapes: utilizing stroke based authentication to increase password memorability.  |
NordiCHI  |
2008 |
DBLP DOI BibTeX RDF |
PassShapes, graphical authentication, shape passwords, security, authentication |
39 | Mohamed Kassab, Abdelfattah Belghith, Jean-Marie Bonnin, Sahbi Sassi |
Fast pre-authentication based on proactive key distribution for 802.11 infrastructure networks.  |
WMuNeP  |
2005 |
DBLP DOI BibTeX RDF |
IAPP, pre-authentication, re-authentication, handover, WiFi, IEEE 802.11i |
39 | Ya-Fen Chang, Chin-Chen Chang 0001 |
A secure and efficient strong-password authentication protocol.  |
ACM SIGOPS Oper. Syst. Rev.  |
2004 |
DBLP DOI BibTeX RDF |
strong password, smart card, password authentication, mutual authentication, denial-of-service attack, stolen-verifier attack |
39 | Michael K. Reiter, Stuart G. Stubblebine |
Toward Acceptable Metrics of Authentication.  |
S&P  |
1997 |
DBLP DOI BibTeX RDF |
authentication metrics design, trusted intermediaries, intersecting paths, key interdependencies, certificates, ambiguities, message authentication, large-scale system, confidence, acceptability, multiple paths |
39 | Stuart G. Stubblebine, Rebecca N. Wright |
An Authentication Logic with Formal Semantics Supporting Synchronization, Revocation, and Recency.  |
IEEE Trans. Software Eng.  |
2002 |
DBLP DOI BibTeX RDF |
authentication logic, recent-secure authentication, reasoning about time, authentication, formal methods, computer security, security policies, clock synchronization, revocation, security analysis, protocol analysis, distributed systems security |
Displaying result #1 - #100 of 25398 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|