The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for authentication with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1973-1981 (18) 1982-1984 (22) 1985-1986 (22) 1987 (21) 1988 (25) 1989 (33) 1990 (36) 1991 (31) 1992 (40) 1993 (50) 1994 (65) 1995 (55) 1996 (112) 1997 (145) 1998 (98) 1999 (167) 2000 (208) 2001 (294) 2002 (330) 2003 (618) 2004 (905) 2005 (1106) 2006 (1033) 2007 (1140) 2008 (1183) 2009 (1031) 2010 (805) 2011 (788) 2012 (820) 2013 (879) 2014 (955) 2015 (1035) 2016 (1133) 2017 (1173) 2018 (1332) 2019 (1500) 2020 (1379) 2021 (1410) 2022 (1499) 2023 (1523) 2024 (379)
Publication types (Num. hits)
article(10875) book(17) data(3) incollection(161) inproceedings(14078) phdthesis(247) proceedings(17)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 8079 occurrences of 2235 keywords

Results
Found 25398 publication records. Showing 25398 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
81Stuart E. Schechter, Robert W. Reeder 1 + 1 = you: measuring the comprehensibility of metaphors for configuring backup authentication. Search on Bibsonomy SOUPS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF backup authentication, password reset, authentication
77Jae-Woo Lee Security Agent Model Using Interactive Authentication Database. Search on Bibsonomy AIS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
71Jae-Woo Lee Client Authentication Model Using Duplicated Authentication Server Systems. Search on Bibsonomy AIS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
68Goce Jakimoski Unconditionally Secure Information Authentication in Presence of Erasures. Search on Bibsonomy IMACC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF erasure- resilient codes, erasure-tolerant authentication, message authentication, authentication codes
64David Q. Liu, Mark Coslow Extensible authentication protocols for IEEE standards 802.11 and 802.16. Search on Bibsonomy Mobility Conference The full citation details ... 2008 DBLP  DOI  BibTeX  RDF extensible authentication protocol, wireless, IEEE 802.11, EAP
64Guojun Wang 0001, Qiong Wang, Jiannong Cao 0001, Minyi Guo An Effective Trust Establishment Scheme for Authentication in Mobile Ad Hoc Networks. Search on Bibsonomy CIT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Trust Transfer, Mobile Ad-Hoc Networks, Authentication, Cryptography, Secret Sharing
64Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciarini, Elisa Bertino Privacy preserving multi-factor authentication with biometrics. Search on Bibsonomy Digital Identity Management The full citation details ... 2006 DBLP  DOI  BibTeX  RDF identity theft prevention, privacy, authentication, biometrics
60Youngsook Lee, Junghyun Nam, Seungjoo Kim, Dongho Won Two Efficient and Secure Authentication Schemes Using Smart Cards. Search on Bibsonomy ICCSA (5) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF smart card, password, mutual authentication, Authentication scheme
56Lunwei Wang, Lianyue He, Xiangke Liao, Huaimin Wang Research on Control Flags-based Weighted Authentication Trustworthiness Model. Search on Bibsonomy PRDC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
56Lunwei Wang, Lifeng Wei, Xiangke Liao, Huaimin Wang AT-RBAC: An Authentication Trustworthiness-Based RBAC Model. Search on Bibsonomy GCC Workshops The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
56Peng Ning, An Liu, Wenliang Du Mitigating DoS attacks against broadcast authentication in wireless sensor networks. Search on Bibsonomy ACM Trans. Sens. Networks The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security, Sensor networks, broadcast authentication, DoS attacks
56Heesun Park, Stan Redford Client certificate and IP address based multi-factor authentication for J2EE web applications. Search on Bibsonomy CASCON The full citation details ... 2007 DBLP  DOI  BibTeX  RDF IP address checking, J2EE web application, SSL client certificate, certificate based authentication, multi-factor authentication
56Reihaneh Safavi-Naini, Huaxiong Wang, Chaoping Xing Linear Authentication Codes: Bounds and Constructions. Search on Bibsonomy INDOCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Linear Authentication Codes, Distributed Authentication Codes, Authentication Codes
52Yatao Yang, Yonghao Gu, Xi Tan, Lina Ma A New Wireless Mesh Network Authentication Scheme Based on Threshold Method. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
52Chung-Ming Huang, Jian-Wei Li One-Pass Authentication and Key Agreement Procedure in IP Multimedia Subsystem for UMTS. Search on Bibsonomy AINA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
52Qing Li 0034, Wade Trappe Reducing delay and enhancing DoS resistance in multicast authentication through multigrade security. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
52Jaeduck Choi, Souhwan Jung, Younghan Kim 0002, Myungsik Yoo A Fast and Efficient Handover Authentication Achieving Conditional Privacy in V2I Networks. Search on Bibsonomy NEW2AN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF V2I, Handover Authentication, Conditional Privacy, VANET
52Takeyuki Uehara, Reihaneh Safavi-Naini, Philip Ogunbona A secure and flexible authentication system for digital images. Search on Bibsonomy Multim. Syst. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Compression tolerance, JPEG, Image authentication
52Hao Chen 0095 Efficient compromising resilient authentication schemes for large scale wireless sensor networks. Search on Bibsonomy WISEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF code and function based authentication schemes, polynomial based authentication scheme, wireless sensor netowork
48Jung-Muk Lim, Hyung-Jin Lim, Tai-Myoung Chung Performance Evaluation of Public Key Based Mechanisms for Mobile IPv4 Authentication in AAA Environments. Search on Bibsonomy ICOIN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
48Jiayang Liu, Lin Zhong 0001, Jehan Wickramasuriya, Venu Vasudevan User evaluation of lightweight user authentication with a single tri-axis accelerometer. Search on Bibsonomy Mobile HCI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF authentication, user study, gesture, accelerometer
48Seong-Soo Park 0001, Jong-Hyouk Lee, Tai-Myoung Chung Authentication Analysis Based on Certificate for Proxy Mobile IPv6 Environment. Search on Bibsonomy ICCSA (1) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Proxy MIPv6, EAP-TLS, Authentication, Certificate, BAN Logic
48Ivonne Thomas, Michael Menzel 0001, Christoph Meinel Using quantified trust levels to describe authentication requirements in federated identity management. Search on Bibsonomy SWS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF authentication and access control, trust levels, web service federation, trust management, federated identity management
48Su Jung Yu, Joo-Seok Song A New Authentication and Key Agreement Protocol Scheme in Convergence of UMTS and DVB-H Networks. Search on Bibsonomy KES (3) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security, authentication, UMTS, DVB-H, convergence networks
48Haifeng Qian, Zhenfu Cao, Lichen Wang, Qingshui Xue Efficient Non-interactive Deniable Authentication Protocols. Search on Bibsonomy CIT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Tight security, Authentication, Digital signature, MAC, Deniablity, Impersonation attack, Trapdoor permutations
48IkSu Park, Seung Bae Park, ByeongKyun Oh User Authentication Protocol Based on Human Memorable Password and Using RSA. Search on Bibsonomy ICCSA (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Password Dictionary, Authentication, Cryptography, public key cryptography, Password authentication
48IkSu Park, Seung Bae Park, ByeongKyun Oh User Authentication Protocol Based on Human Memorable Password and Using RSA. Search on Bibsonomy ICCSA (4) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Password Dictionary, Authentication, Cryptography, public key cryptography, Password authentication
46Saber Zrelli, Yoichi Shinoda Experimental Evaluation of EAP Performance in Roaming Scenarios. Search on Bibsonomy AINTEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
46Seo-Il Kang, Deok-Gyu Lee, Im-Yeong Lee A Study on Key Distribution and ID Registration in the AAA System for Ubiquitous Multimedia Environments. Search on Bibsonomy MMM (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF ID registration, Authentication, key distribution, Multimedia service
46Suguru Fujisawa, Makoto Otani, Kenzi Watanabe Implementation of PKI Authentication Functions for Network User Authentication System "Opengate". Search on Bibsonomy SAINT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF UPKI, Network User Authentication, Opengate, PKI
45Leonid Kompanets, Janusz Bobulski, Roman Wyrzykowski Pseudo-entropy Similarity for Human Biometrics. Search on Bibsonomy Biometric Authentication The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
44Jae-Woo Lee A Policy of Copyright Protection Using Authentication Key Based on Digital Watermarking. Search on Bibsonomy MUE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
44Chuhong Fei, Deepa Kundur, Raymond H. Kwong Analysis and design of secure watermark-based authentication systems. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
44Takamichi Saito, Ryosuke Hatsugai, Toshiyuki Kito On Compromising Password-Based Authentication over HTTPS. Search on Bibsonomy AINA (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
44Kihun Hong, Souhwan Jung, Shyhtsun Felix Wu A Hash-Chain Based Authentication Scheme for Fast Handover in Wireless Network. Search on Bibsonomy WISA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
44Koji Iwano, Taro Miyazaki, Sadaoki Furui Multimodal Speaker Verification Using Ear Image Features Extracted by PCA and ICA. Search on Bibsonomy AVBPA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
44Hea Suk Jo, Hee Yong Youn A New Synchronization Protocol for Authentication in Wireless LAN Environment. Search on Bibsonomy ICCSA (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
44Hea Suk Jo, Hee Yong Youn A New Synchronization Protocol for Authentication in Wireless LAN Environment. Search on Bibsonomy ICCSA (3) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
44Michael J. Covington, Mustaque Ahamad, Irfan A. Essa, H. Venkateswaran Parameterized Authentication. Search on Bibsonomy ESORICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
44Ji Ma 0001, Mehmet A. Orgun Formalising theories of trust for authentication protocols. Search on Bibsonomy Inf. Syst. Frontiers The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Trust theory, Agents, Authentication protocols, Belief logic
44Jihwan Lim, Heekuck Oh, Sangjin Kim A New Hash-Based RFID Mutual Authentication Protocol Providing Enhanced User Privacy Protection. Search on Bibsonomy ISPEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Authentication, RFID, User Privacy
44Youngsook Lee, Junghyun Nam, Dongho Won Vulnerabilities in a Remote Agent Authentication Scheme Using Smart Cards. Search on Bibsonomy KES-AMSTA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF distributed system, smart card, impersonation attack, authentication scheme
44Kui Ren 0001, Wenjing Lou Privacy-enhanced, Attack-resilient Access Control in Pervasive Computing Environments with Optional Context Authentication Capability. Search on Bibsonomy Mob. Networks Appl. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF pervasive computing environment (PCE), context authentication, security, privacy, access control
44Giovanni Di Crescenzo, Munir Cochinwala, Hyong Sop Shim Modeling cryptographic properties of voice and voice-based entity authentication. Search on Bibsonomy Digital Identity Management The full citation details ... 2007 DBLP  DOI  BibTeX  RDF modeling human factors, biometrics, voice, entity authentication
44Kai Chen 0007, Xinglei Zhu, Zhishou Zhang A Hybrid Content-Based Image Authentication Scheme. Search on Bibsonomy PCM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Content hash, Watermarking, Digital Signature, ECC, Image Authentication
44Cástor Mariño, Manuel G. Penedo, Marta Penas, María J. Carreira, F. González Personal authentication using digital retinal images. Search on Bibsonomy Pattern Anal. Appl. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Digital retinal images, Registration, Personal authentication, Creases
44Byungkwan Park, Daesung Moon, Yongwha Chung, Jin-Won Park Capacity Planning for Scalable Fingerprint Authentication. Search on Bibsonomy KES (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Performance Evaluation, Authentication Protocol, Fingerprint Verification
44Hea Suk Jo, Hee Yong Youn A Secure User Authentication Protocol Based on One-Time-Password for Home Network. Search on Bibsonomy ICCSA (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF three-way handshake, security, Authentication, home network, one-time password
44Shiqun Li, Jianying Zhou 0001, Xiangxue Li, Kefei Chen An Authentication Protocol for Pervasive Computing. Search on Bibsonomy ISPA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Pervasive Computing Security, Authentication, E-Commerce, Public Key Infrastructure
44Zheng Liu, Xue Li 0001, Zhaoyang Dong Multimedia authentication with sensor-based watermarking. Search on Bibsonomy MM&Sec The full citation details ... 2004 DBLP  DOI  BibTeX  RDF fuzzy identification system, authentication, fragile watermarking
44Michael Kaminsky, George Savvides, David Mazières, M. Frans Kaashoek Decentralized user authentication in a global file system. Search on Bibsonomy SOSP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF authentication, authorization, file system, groups, users, credentials, ACL, SFS
44Willy Susilo, Yi Mu 0001 Non-interactive Deniable Ring Authentication. Search on Bibsonomy ICISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Ring signature schemes, non-interactive, ring-to-ring authentication, deniable
43Xiehua Li, ShuTang Yang, Jian-Hua Li, HongWen Zhu Security Protocol Analysis with Improved Authentication Tests. Search on Bibsonomy ISPEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Authentication tests, Message type, Neuman-Stubblebine protocol, Improved authentication tests
43Kee-Won Kim, Jun-Cheol Jeon, Kee-Young Yoo Efficient and Secure Password Authentication Schemes for Low-Power Devices. Search on Bibsonomy MSN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF low-power device, wireless network, password authentication, mutual authentication
43Adrian Perrig The BiBa one-time signature and broadcast authentication protocol. Search on Bibsonomy CCS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF signature based on a one-way function without trapdoor, source authentication for multicast, broadcast authentication, one-time signature
43Reihaneh Safavi-Naini, Huaxiong Wang New Results on Multi-Receiver Authentication Codes. Search on Bibsonomy EUROCRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Multi-receiver authentication code, Authentication code
43Taekyoung Kwon 0002, JooSeok Song Security and efficiency in authentication protocols resistant to password guessing attack. Search on Bibsonomy LCN The full citation details ... 1997 DBLP  DOI  BibTeX  RDF password guessing attack resistance, secret, user-chosen weak secret, security-oriented protocols, cipher operations, protocol steps, poorly-chosen weak secret protection, security, efficiency, cryptographic protocols, key exchange, message authentication, authentication protocols, secure communications, random numbers, dictionary attacks
43Antonio Izquierdo, Nada Golmie, Katrin Hoeper, Lidong Chen Using the EAP framework for fast media independent handover authentication. Search on Bibsonomy WICON The full citation details ... 2008 DBLP  DOI  BibTeX  RDF pre-authentication, re-authentication, performance, authentication, handover, EAP
42Jochen Liedtke A Short Note on Small Virtually-Addresses Control Blocks. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
42Jiafen Liu, Mingtian Zhou Designing an Authentication Protocol via Authentication Test. Search on Bibsonomy ISCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
42Qinghan Xiao Biometric User Authentication for Heightened Information Security. Search on Bibsonomy ICBA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
42Jae-Woo Lee, Doo-Kwon Baik Improved Client Authentication Using Session Authentication in the Internet. Search on Bibsonomy Human.Society@Internet 2003 The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
42Kenta Matsumiya, Soko Aoki, Masana Murase, Hideyuki Tokuda Zero-Stop Authentication: Sensor-Based Real-Time Authentication System. Search on Bibsonomy RTCSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
41Deok-Gyu Lee, Yun-kyung Lee, Jong Wook Han, Jong Hyuk Park, Im-Yeong Lee Intelligent Home Network Authentication: Home Device Authentication Using Device Certification. Search on Bibsonomy OTM Conferences (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF home device authentication, home device certificate
41Yun-kyung Lee, Deok-Gyu Lee, Jong Wook Han, Kyo-Il Chung Home Network Device Authentication: Device Authentication Framework and Device Certificate Profile. Search on Bibsonomy APWeb/WAIM Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF home network security, home device authentication, home device certificate
41Ruud M. Bolle, Andrew W. Senior, Nalini K. Ratha, Sharath Pankanti Fingerprint Minutiae: A Constructive Definition. Search on Bibsonomy Biometric Authentication The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
41Massimo Tistarelli, Andrea Lagorio, Enrico Grosso Understanding Iconic Image-Based Face Biometrics. Search on Bibsonomy Biometric Authentication The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
41Tetiana Valchuk, Roman Wyrzykowski, Leonid Kompanets Mental Characteristics of Person as Basic Biometrics Search on Bibsonomy Biometric Authentication The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
40Paul L. Yu, John S. Baras, Brian M. Sadler Physical-Layer Authentication. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
40Patryk Chamuczynski, Omar Alfandi, Henrik Brosenne, Constantin Werner, Dieter Hogrefe Enabling Pervasiveness by Seamless Inter-domain Handover: Performance Study of PANA Pre-authentication. Search on Bibsonomy PerCom The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Pervasive Computing
40Cástor Mariño, Manuel G. Penedo, Marta Penas Retinal Based Authentication via Distributed Web Application. Search on Bibsonomy EUROCAST The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
40Jong-hu Lee, Jae-Cheol Ryou 0001 Strong User Authentication in IEEE802.11 Wireless LAN. Search on Bibsonomy Human.Society@Internet 2003 The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
40Muxiang Zhang Adaptive Protocol for Entity Authentication and Key Agreement in Mobile Networks. Search on Bibsonomy ICISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
39Hassnaa Moustafa, Jacky Forestier, Mohamed Chaari Distributed authentication for services commercialization in ad hoc networks. Search on Bibsonomy Mobility Conference The full citation details ... 2009 DBLP  DOI  BibTeX  RDF authentication access controls, services commercialization using ad hoc networks, ad hoc networks
39Zhimin Yang, Adam C. Champion, Boxuan Gu, Xiaole Bai, Dong Xuan Link-layer protection in 802.11i WLANS with dummy authentication. Search on Bibsonomy WISEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF dummy authentication, security, wlan, open access
39Ralph Holz, Heiko Niedermayer, Peter Hauck, Georg Carle Trust-Rated Authentication for Domain-Structured Distributed Systems. Search on Bibsonomy EuroPKI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Trust-Rating, Distributed Systems, Peer-to-Peer, Authentication, Protocols, PKI, Multi-Domain
39Debasis Giri, Parmeshwary Dayal Srivastava Cryptanalysis and the Improvement of Kim et al.'s Password Authentication Schemes. Search on Bibsonomy ICISS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Authentication, Smart card, Attack, Timestamp, Nonce
39Maryna Komarova, Michel Riguidel Optimized ticket distribution scheme for fast re-authentication protocol (fap). Search on Bibsonomy Q2SWinet The full citation details ... 2007 DBLP  DOI  BibTeX  RDF inter-domain roaming, authentication, authorization, wireless security
39Hui-Feng Huang An Efficient Mutual Authentication Protocol on RFID Tags. Search on Bibsonomy EUC Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security, authentication, RFID system
39Young-Soo Kim, Sung-Ja Choi, Gang-Soo Lee, Geuk Lee Entity Based Message Authentication System. Search on Bibsonomy KES-AMSTA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF entity based cryptosystem, security, authentication, agent, public key cryptosystem
39John G. Brainard, Ari Juels, Ronald L. Rivest, Michael Szydlo, Moti Yung Fourth-factor authentication: somebody you know. Search on Bibsonomy CCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF hardware tokens, vouchers, authentication
39Ralf Wienzek, Rajendra Persaud Fast Re-authentication for Handovers in Wireless Communication Networks. Search on Bibsonomy Networking The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Wireless Networks, Authentication, Handover
39Youngsook Lee, Junghyun Nam, Dongho Won Security Enhancement of a Remote User Authentication Scheme Using Smart Cards. Search on Bibsonomy OTM Workshops (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF parallel session attack, smart card, password, Authentication scheme, reflection attack
39Yongjian Li, Jun Pang 0001 Generalized Unsolicited Tests for Authentication Protocol Analysis. Search on Bibsonomy PDCAT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF the Otway-Rees protocol, authentication, cryptographic protocols, strand space
39Ana Sanz Merino, Yasuhiko Matsunaga, Manish Shah, Takashi Suzuki, Randy H. Katz Secure Authentication System for Public WLAN Roaming. Search on Bibsonomy Mob. Networks Appl. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF policy control, authentication, wireless LAN, roaming, link layer security
39Jun Li 0025, Bruce Christianson, Martin J. Loomes "Fair" Authentication in Pervasive Computing. Search on Bibsonomy MADNES The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Human self-determination, Mobile ad-hoc Networks, Authentication, Trust, Pervasive Computing
39Makoto Otani, Katsuhiko Eguchi, Hirofumi Eto, Kenzi Watanabe, Shin-ichi Tadaki, Yoshiaki Watanabe Implementation of IPv6 functions for a network user authentication system opengate. Search on Bibsonomy SIGUCCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF network user authentication system, opengate, internet, IPv6
39Nidal Aboudagga, M. Tamer Refaei, Mohamed Eltoweissy, Luiz A. DaSilva, Jean-Jacques Quisquater Authentication protocols for ad hoc networks: taxonomy and research issues. Search on Bibsonomy Q2SWinet The full citation details ... 2005 DBLP  DOI  BibTeX  RDF protocol taxonomy, ad hoc networks, authentication, network security, credentials, identity verification
39Chin-Chen Chang 0001, Jui-Yi Kuo, Jung-San Lee Time-bounded Based Password Authentication Scheme. Search on Bibsonomy CW The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Resource access, Authentication, Time-bounded
39Pallav Gupta, Srivaths Ravi 0001, Anand Raghunathan, Niraj K. Jha Efficient fingerprint-based user authentication for embedded systems. Search on Bibsonomy DAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF embedded systems, fingerprint, user authentication, extensible processors
39Erik Anderson, Cheryl L. Beaver, Timothy Draelos, Richard Schroeppel, Mark Torgerson ManTiCore: Encryption with Joint Cipher-State Authentication. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Encryption Mode, Inexpensive Authentication, Luby-Rackoff, Feistel, Middletext, Hash, Cipher
39Valery I. Korzhik, Guillermo Morales-Luna Hybrid authentication based on noisy channels. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Key sharing, Information-theoretically secure authentication, Hash functions, Privacy amplification
39Yasuhiko Matsunaga, Ana Sanz Merino, Takashi Suzuki, Randy H. Katz Secure authentication system for public WLAN roaming. Search on Bibsonomy WMASH The full citation details ... 2003 DBLP  DOI  BibTeX  RDF policy control, authentication, wireless LAN, roaming, single sign-on, hotspot, link layer security
39Yong Lee, H. K. Lee, Goo Yeon Lee, Hwa Jong Kim, Choong Kyo Jeong Design of hybrid authentication scheme and key distribution for mobile multi-hop relay in IEEE 802.16j. Search on Bibsonomy EATIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF hybrid authentication, mutual authentication, mobile wireless network, multi hop relay, IEEE 802.16j
39Jahan Hassan, Harsha R. Sirisena, Björn Landfeldt Trust-Based Fast Authentication for Multiowner Wireless Networks. Search on Bibsonomy IEEE Trans. Mob. Comput. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Fast authentication, inter-domain authentication, Markov Models, handoff, IEEE802.11
39Roman Weiss, Alexander De Luca PassShapes: utilizing stroke based authentication to increase password memorability. Search on Bibsonomy NordiCHI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF PassShapes, graphical authentication, shape passwords, security, authentication
39Mohamed Kassab, Abdelfattah Belghith, Jean-Marie Bonnin, Sahbi Sassi Fast pre-authentication based on proactive key distribution for 802.11 infrastructure networks. Search on Bibsonomy WMuNeP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF IAPP, pre-authentication, re-authentication, handover, WiFi, IEEE 802.11i
39Ya-Fen Chang, Chin-Chen Chang 0001 A secure and efficient strong-password authentication protocol. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF strong password, smart card, password authentication, mutual authentication, denial-of-service attack, stolen-verifier attack
39Michael K. Reiter, Stuart G. Stubblebine Toward Acceptable Metrics of Authentication. Search on Bibsonomy S&P The full citation details ... 1997 DBLP  DOI  BibTeX  RDF authentication metrics design, trusted intermediaries, intersecting paths, key interdependencies, certificates, ambiguities, message authentication, large-scale system, confidence, acceptability, multiple paths
39Stuart G. Stubblebine, Rebecca N. Wright An Authentication Logic with Formal Semantics Supporting Synchronization, Revocation, and Recency. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF authentication logic, recent-secure authentication, reasoning about time, authentication, formal methods, computer security, security policies, clock synchronization, revocation, security analysis, protocol analysis, distributed systems security
Displaying result #1 - #100 of 25398 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license