Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
125 | Xiaojian Tian, Duncan S. Wong |
Session Corruption Attack and Improvements on Encryption Based MT-Authenticators. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2006, The Cryptographers' Track at the RSA Conference 2006, San Jose, CA, USA, February 13-17, 2006, Proceedings, pp. 34-51, 2006, Springer, 3-540-31033-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
MT-authenticator, BCK-model, CK-model, Verifiable Encryption |
92 | Yvonne Hitchcock, Yiu Shing Terry Tin, Juan Manuel González Nieto, Colin Boyd, Paul Montague |
A Password-Based Authenticator: Security Proof and Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2003, 4th International Conference on Cryptology in India, New Delhi, India, December 8-10, 2003, Proceedings, pp. 388-401, 2003, Springer, 3-540-20609-4. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
key agreement, password authentication, Key management protocols |
75 | Ying-Han Pang, Andrew Teoh Beng Jin, David Ngo Chek Ling |
Personal Authenticator on the Basis of Two-Factors: Palmprint Features and Tokenized Random Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Australian Conference on Artificial Intelligence ![In: AI 2004: Advances in Artificial Intelligence, 17th Australian Joint Conference on Artificial Intelligence, Cairns, Australia, December 4-6, 2004, Proceedings, pp. 227-236, 2004, Springer, 3-540-24059-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
64 | Peng Ning, An Liu, Wenliang Du |
Mitigating DoS attacks against broadcast authentication in wireless sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Sens. Networks ![In: ACM Trans. Sens. Networks 4(1), pp. 1:1-1:35, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
security, Sensor networks, broadcast authentication, DoS attacks |
64 | Katelin Bailey, Apu Kapadia, Linden Vongsathorn, Sean W. Smith |
TwoKind authentication: protecting private information in untrustworthy environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2008 ACM Workshop on Privacy in the Electronic Society, WPES 2008, Alexandria, VA, USA, October 27, 2008, pp. 39-44, 2008, ACM, 978-1-60558-289-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
principle of least privilege, authenticators, passwords |
64 | You Sung Kang, KyungHee Oh, Byung-Ho Chung, Kyoil Chung, DaeHun Nyang |
Analysis and Countermeasure on Vulnerability of WPA Key Exchange Mechanism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICOIN ![In: Information Networking, Networking Technologies for Broadband and Mobile Networks, International Conference ICOIN 2004, Busan, Korea, February 18-20, 2004, Revised Selected Papers, pp. 915-924, 2004, Springer, 3-540-23034-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
802.11i, 802.1X, WPA, WLAN security |
54 | Aleck Nash, Hudan Studiawan, George Grispos, Kim-Kwang Raymond Choo |
Security Analysis of Google Authenticator, Microsoft Authenticator, and Authy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDF2C (2) ![In: Digital Forensics and Cyber Crime - 14th EAI International Conference, ICDF2C 2023, New York City, NY, USA, November 30, 2023, Proceedings, Part II, pp. 197-206, 2023, Springer, 978-3-031-56582-3. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
48 | Huawei Zhao, Jing Qin 0002, Zhifeng Fang |
Converters for Designing Applied Cryptographic Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC (2) ![In: 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), Shanghai, China, December 17-20, 2008, Volume II: Workshops, pp. 139-143, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
48 | Shaoquan Jiang |
Deniable Authentication on the Internet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology, Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers, pp. 298-312, 2007, Springer, 978-3-540-79498-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Authentication, Protocol, Key Exchange, Deniability |
48 | Shaoquan Jiang, Guang Gong |
Efficient Authenticators with Application to Key Exchange. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2005, 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers, pp. 81-91, 2005, Springer, 3-540-33354-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
48 | Changhua He, John C. Mitchell |
Analysis of the 802.11i 4-way handshake. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Workshop on Wireless Security ![In: Proceedings of the 2004 ACM Workshop on Wireless Security, Philadelphia, PA, USA, October 1, 2004, pp. 43-50, 2004, ACM, 1-58113-925-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
4-way handshake, authentication, WLAN, key management, denial-of-service, 802.11i |
44 | Tetsuo Kamina, Toshinori Aoki, Yoshiteru Eto, Noboru Koshizuka, Jun Yamada, Ken Sakamura |
Verifying Identifier-Authenticity in Ubiquitous Computing Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA Workshops (2) ![In: 21st International Conference on Advanced Information Networking and Applications (AINA 2007), Workshops Proceedings, Volume 2, May 21-23, 2007, Niagara Falls, Canada, pp. 403-408, 2007, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
2-D code, ucode, authenticator, infrastructure, QR Code |
44 | Yiu Shing Terry Tin, Harikrishna Vasanta, Colin Boyd, Juan Manuel González Nieto |
Protocols with Security Proofs for Mobile Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy: 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004. Proceedings, pp. 358-369, 2004, Springer, 3-540-22379-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
secure key exchange, authenticator, Provable security, mobile security |
43 | Ying-Han Pang, Andrew Teoh Beng Jin, David Ngo Chek Ling |
Two-Factor Cancelable Biometrics Authenticator. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Sci. Technol. ![In: J. Comput. Sci. Technol. 22(1), pp. 54-59, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
face recognition, Geometric moments, cancelable biometrics, pseudo Zernike moment |
43 | Andrew Teoh Beng Jin, David Ngo Chek Ling, Alwyn Goh |
An Integrated Dual Factor Authenticator Based on the Face Data and Tokenised Random Number. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICBA ![In: Biometric Authentication, First International Conference, ICBA 2004, Hong Kong, China, July 15-17, 2004, Proceedings, pp. 117-123, 2004, Springer, 3-540-22146-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
43 | Donald W. Davies |
A Message Authenticator Algorithm Suitable for A Mainframe Computer. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology, Proceedings of CRYPTO '84, Santa Barbara, California, USA, August 19-22, 1984, Proceedings, pp. 393-400, 1984, Springer, 3-540-15658-5. The full citation details ...](Pics/full.jpeg) |
1984 |
DBLP DOI BibTeX RDF |
|
32 | Manuel Barbosa, Pooya Farshim |
Security Analysis of Standard Authentication and Key Agreement Protocols Utilising Timestamps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AFRICACRYPT ![In: Progress in Cryptology - AFRICACRYPT 2009, Second International Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25, 2009. Proceedings, pp. 235-253, 2009, Springer, 978-3-642-02383-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Key Agreement, Timestamp, Entity Authentication |
32 | M. Abdul Alim, Behçet Sarikaya |
EAP-Sens: a security architecture for wireless sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WICON ![In: Proceedings of the 4th Annual International Conference on Wireless Internet, WICON 2008, Maui, Hawaii, USA, November 17-19, 2008, pp. 29, 2008, ICST, 978-963-9799-36-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
GPSK, security, wireless sensor network, WPAN, EAP |
32 | Yunlei Zhao, Chan H. Lee, Yiming Zhao, Hong Zhu 0004 |
Some Observations on Zap and Its Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004, Proceedings, pp. 180-193, 2004, Springer, 3-540-22217-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Zap, public-coin honest verifier zero-knowledge, deniable authentication, timed commitment, witness indistinguishability |
32 | Yvo Desmedt, Yair Frankel |
Shared Generation of Authenticators and Signatures (Extended Abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '91, 11th Annual International Cryptology Conference, Santa Barbara, California, USA, August 11-15, 1991, Proceedings, pp. 457-469, 1991, Springer, 3-540-55188-3. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
32 | Albrecht Beutelspacher |
Perfect and Essentially Perfect Authentication Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '87, Workshop on the Theory and Application of of Cryptographic Techniques, Amsterdam, The Netherlands, April 13-15, 1987, Proceedings, pp. 167-170, 1987, Springer, 3-540-19102-X. The full citation details ...](Pics/full.jpeg) |
1987 |
DBLP DOI BibTeX RDF |
|
28 | Yang Zhang |
Effective Attacks in the Tor Authentication Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Third International Conference on Network and System Security, NSS 2009, Gold Coast, Queensland, Australia, October 19-21, 2009, pp. 81-86, 2009, IEEE Computer Society, 978-0-7695-3838-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Tor Authentication Protocol, Onion Routing Protocol, Authenticator, Tor, Universally Composable Security |
28 | Qing Li 0034, Yih-Chun Hu, Meiyuan Zhao, Adrian Perrig, Jesse Walker, Wade Trappe |
SEAR: a secure efficient ad hoc on demand routing protocol for wireless networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2008, Tokyo, Japan, March 18-20, 2008, pp. 201-204, 2008, ACM, 978-1-59593-979-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
SEAR, authenticator, one-way hash function |
27 | Vassilis Papaspirou, Maria Papathanasaki, Leandros A. Maglaras, Ioanna Kantzavelou, Christos Douligeris, Mohamed Amine Ferrag, Helge Janicke |
A Novel Authentication Method That Combines Honeytokens and Google Authenticator. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. ![In: Inf. 14(7), pp. 386, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Shay Gueron |
A New Interpretation for the GHASH Authenticator of AES-GCM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSCML ![In: Cyber Security, Cryptology, and Machine Learning - 7th International Symposium, CSCML 2023, Be'er Sheva, Israel, June 29-30, 2023, Proceedings, pp. 424-438, 2023, Springer, 978-3-031-34670-5. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Michal Kepkowski, Lucjan Hanzlik, Ian D. Wood, Mohamed Ali Kâafar |
How Not to Handle Keys: Timing Attacks on FIDO Authenticator Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Proc. Priv. Enhancing Technol. ![In: Proc. Priv. Enhancing Technol. 2022(4), pp. 705-726, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
27 | Michal Kepkowski, Lucjan Hanzlik, Ian D. Wood, Mohamed Ali Kâafar |
How Not to Handle Keys: Timing Attacks on FIDO Authenticator Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2205.08071, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
27 | Narla John Metilda Sagaya Mary, Srinivasan Umesh, Sandesh Varadaraju Katta |
S-Vectors and TESA: Speaker Embeddings and a Speaker Authenticator Based on Transformer Encoder. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE ACM Trans. Audio Speech Lang. Process. ![In: IEEE ACM Trans. Audio Speech Lang. Process. 30, pp. 404-413, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
27 | Harshat Kumar, Hojjat Seyed Mousavi, Behrooz Shahsavari |
Fusion-Id: A Photoplethysmography and Motion Sensor Fusion Biometric Authenticator With Few-Shot on-Boarding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICASSP ![In: IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2022, Virtual and Singapore, 23-27 May 2022, pp. 3983-3987, 2022, IEEE, 978-1-6654-0541-6. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
27 | Vassilis Papaspirou, Maria Papathanasaki, Leandros A. Maglaras, Ioanna Kantzavelou, Christos Douligeris, Mohamed Amine Ferrag, Helge Janicke |
Security Revisited: Honeytokens meet Google Authenticator. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEEDA-CECNSM ![In: 7th South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference, SEEDA-CECNSM 2022, Ioannina, Greece, September 23-25, 2022, pp. 1-8, 2022, IEEE, 979-8-3503-9858-8. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
27 | Markus Keil, Philipp Markert, Markus Dürmuth |
"It's Just a Lot of Prerequisites": A User Perception and Usability Analysis of the German ID Card as a FIDO2 Authenticator. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroUSEC ![In: EuroUSEC 2022: European Symposium on Usable Security, Karlsruhe, Germany, September 29 - 30, 2022, pp. 172-188, 2022, ACM, 978-1-4503-9700-1. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
27 | Xiang Gao, Jia Yu 0005, Wenting Shen, Yan Chang, Shibin Zhang, Ming Yang 0023, Bin Wu |
Achieving low-entropy secure cloud data auditing with file and authenticator deduplication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Sci. ![In: Inf. Sci. 546, pp. 177-191, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
27 | Vassilis Papaspirou, Maria Papathanasaki, Leandros A. Maglaras, Ioanna Kantzavelou, Christos Douligeris, Mohamed Amine Ferrag, Helge Janicke |
Cybersecurity Revisited: Honeytokens meet Google Authenticator. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2112.08431, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
27 | Chris Culnane, Christopher J. P. Newton, Helen Treharne |
Technical Report on a Virtual CTAP2 WebAuthn Authenticator. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2108.04131, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
27 | Yuto Okawa, Shuji Yamaguchi, Hidehito Gomi, Tetsutaro Uehara |
Implementation of an extended FIDO2 authenticator using Attribute-Based Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
QRS Companion ![In: 21st IEEE International Conference on Software Quality, Reliability and Security, QRS 2021 - Companion, Hainan, China, December 6-10, 2021, pp. 825-832, 2021, IEEE, 978-1-6654-7836-6. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
27 | Yan Xu 0007, Song Sun, Jie Cui 0004, Hong Zhong 0001 |
Intrusion-resilient public cloud auditing scheme with authenticator update. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Sci. ![In: Inf. Sci. 512, pp. 616-628, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
27 | Bikash Debnath, Jadav Chandra Das, Debashis De, Ferial Ghaemi, Ali Ahmadian, Norazak Senu |
Reversible Palm Vein Authenticator Design With Quantum Dot Cellular Automata for Information Security in Nanocommunication Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 8, pp. 174821-174832, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
27 | Hui Li 0070, Xuesong Pan, Xinluo Wang, Haonan Feng, Chengjie Shi |
Authenticator Rebinding Attack of the UAF Protocol on Mobile Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Commun. Mob. Comput. ![In: Wirel. Commun. Mob. Comput. 2020, pp. 8819790:1-8819790:14, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
27 | Chengqian Guo, Quanwei Cai 0001, Qiongxiao Wang, Jingqiang Lin |
Extending Registration and Authentication Processes of FIDO2 External Authenticator with QR Codes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020, Guangzhou, China, December 29, 2020 - January 1, 2021, pp. 518-529, 2020, IEEE, 978-1-6654-0392-4. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
27 | Jin Wook Byun |
On the Secure Design of Hash-Based Authenticator in the Smartcard Authentication System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Pers. Commun. ![In: Wirel. Pers. Commun. 109(4), pp. 2329-2352, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
27 | Yun-Tai Chang, Marc J. Dupuis |
My Voiceprint Is My Authenticator: A Two-Layer Authentication Approach Using Voiceprint for Voice Assistants. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI ![In: 2019 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation, SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2019, Leicester, United Kingdom, August 19-23, 2019, pp. 1318-1325, 2019, IEEE, 978-1-7281-4034-6. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
27 | Nikola K. Blanchard, Siargey Kachanovich, Ted Selker, Florentin Waligorski |
Reflexive Memory Authenticator: A Proposal for Effortless Renewable Biometrics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ETAA@ESORICS ![In: Emerging Technologies for Authorization and Authentication - Second International Workshop, ETAA 2019, Luxembourg City, Luxembourg, September 27, 2019, Proceedings, pp. 104-121, 2019, Springer, 978-3-030-39748-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
27 | Hubert Garavel, Lina Marsso |
Comparative Study of Eight Formal Specifications of the Message Authenticator Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MARS/VPT@ETAPS ![In: Proceedings Third Workshop on Models for Formal Analysis of Real Systems and Sixth International Workshop on Verification and Program Transformation, MARS/VPT@ETAPS 2018, Thessaloniki, Greece, 20th April 2018., pp. 41-87, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
27 | Florian Reimair, Christian Kollmann, Alexander Marsalek |
Emulating U2F authenticator devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CNS ![In: 2016 IEEE Conference on Communications and Network Security, CNS 2016, Philadelphia, PA, USA, October 17-19, 2016, pp. 543-551, 2016, IEEE, 978-1-5090-3065-1. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
27 | Roland H. Steinegger, Daniel Deckers, Pascal Giessler, Sebastian Abeck |
Risk-based authenticator for web applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPLoP ![In: Proceedings of the 21st European Conference on Pattern Languages of Programs, EuroPLoP 2016, Kaufbeuren, Germany, July 6-10, 2016, pp. 16, 2016, ACM, 978-1-4503-4074-8. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
27 | Wenting Shen, Jia Yu 0005, Rong Hao, Xu An Wang 0001 |
A Public Cloud Storage Auditing Scheme with Lightweight Authenticator Generation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
3PGCIC ![In: 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 3PGCIC 2015, Krakow, Poland, November 4-6, 2015, pp. 36-39, 2015, IEEE Computer Society, 978-1-4673-9473-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
27 | Guangdong Bai, Jun Sun 0001, Jianliang Wu, Quanqi Ye, Li Li 0044, Jin Song Dong, Shanqing Guo |
All Your Sessions Are Belong to Us: Investigating Authenticator Leakage through Backup Channels on Android. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICECCS ![In: 20th International Conference on Engineering of Complex Computer Systems, ICECCS 2015, Gold Coast, Australia, December 9-12, 2015, pp. 60-69, 2015, IEEE Computer Society, 978-1-4673-8581-7. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
27 | Nikolaos Pitropakis, Nikolaos Yfantopoulos, Dimitris Geneiatakis, Costas Lambrinoudakis |
Towards an augmented authenticator in the Cloud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSPIT ![In: 2014 IEEE International Symposium on Signal Processing and Information Technology, ISSPIT 2014, Noida, India, December 15-17, 2014, pp. 296-300, 2014, IEEE Computer Society, 978-1-4799-1812-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
27 | Andrea Bartoli, Juan Hernández-Serrano, Olga León, Apostolos A. Kountouris, Dominique Barthel |
Energy-efficient physical layer packet authenticator for machine-to-machine networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Trans. Emerg. Telecommun. Technol. ![In: Trans. Emerg. Telecommun. Technol. 24(4), pp. 401-412, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
27 | Klaus John, Stefan Taber, Andreas Ehringfeld |
Proxy Authenticator - Approach of a Signature-based Single Sign On Solution for E-Government Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EGOV/ePart Ongoing Research ![In: Electronic Government and Electronic Participation: Joint Proceedings of Ongoing Research of IFIP EGOV and IFIP ePart 2013, 16-19 September 2013, Koblenz, Germany, pp. 262-263, 2013, GI, 978-3-88579-615-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
27 | Haibo Tian |
Deniable message transmission authenticator based on weak signature schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IET Inf. Secur. ![In: IET Inf. Secur. 6(4), pp. 258-263, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
27 | Chien-Yuan Chen, Cheng-Yuan Ku, David C. Yen |
Cryptographic relational algebra for databases using the field authenticator. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Math. Appl. ![In: Comput. Math. Appl. 54(1), pp. 38-44, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Hyoungjoo Lee, Sungzoon Cho |
Retraining a keystroke dynamics-based authenticator with impostor patterns. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 26(4), pp. 300-310, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Pilsung Kang 0001, Seongseob Hwang, Sungzoon Cho |
Continual Retraining of Keystroke Dynamics Based Authenticator. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICB ![In: Advances in Biometrics, International Conference, ICB 2007, Seoul, Korea, August 27-29, 2007, Proceedings, pp. 1203-1211, 2007, Springer, 978-3-540-74548-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Nicolas Sklavos 0001, Costas Efstathiou |
SecurID Authenticator: On the Hardware Implementation Efficiency. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICECS ![In: 14th IEEE International Conference on Electronics, Circuits, and Systems, ICECS 2007, Marrakech, Morocco, December 11-14, 2007, pp. 589-592, 2007, IEEE, 978-1-4244-1377-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
27 | John R. Vollbrecht, Pasi Eronen, Nick L. Petroni Jr., Yoshihiro Ohba |
State Machines for Extensible Authentication Protocol (EAP) Peer and Authenticator. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 4137, pp. 1-51, August 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Raymond S. T. Lee |
iJADE Authenticator - An Intelligent Multiagent Based Facial Authentication System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Pattern Recognit. Artif. Intell. ![In: Int. J. Pattern Recognit. Artif. Intell. 16(4), pp. 481-500, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
27 | Bart Preneel, Vincent Rijmen, Paul C. van Oorschot |
Security analysis of the message authenticator algorithm (MAA). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Eur. Trans. Telecommun. ![In: Eur. Trans. Telecommun. 8(5), pp. 455-470, 1997. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
16 | Giuseppe Ateniese, Seny Kamara, Jonathan Katz |
Proofs of Storage from Homomorphic Identification Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings, pp. 319-333, 2009, Springer, 978-3-642-10365-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
16 | Jing Liu 0003, Xinming Ye, Jun Zhang 0001, Jun Li 0002 |
Security Verification of 802.11i 4-Way Handshake Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: Proceedings of IEEE International Conference on Communications, ICC 2008, Beijing, China, 19-23 May 2008, pp. 1642-1647, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Hovav Shacham, Brent Waters |
Compact Proofs of Retrievability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings, pp. 90-107, 2008, Springer, 978-3-540-89254-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Ee-Chien Chang, Jia Xu 0006 |
Remote Integrity Check with Dishonest Storage Server. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2008, 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings, pp. 223-237, 2008, Springer, 978-3-540-88312-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Huijuan Yang, Alex ChiChung Kot |
Pattern-Based Data Hiding for Binary Image Authentication by Connectivity-Preserving. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Multim. ![In: IEEE Trans. Multim. 9(3), pp. 475-486, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Rafael Marín López, Pedro J. Fernández, Antonio Fernandez Gómez-Skarmeta |
3-Party Approach for Fast Handover in EAP-Based Wireless Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OTM Conferences (2) ![In: On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE, GADA, and IS, OTM Confederated International Conferences CoopIS, DOA, ODBASE, GADA, and IS 2007, Vilamoura, Portugal, November 25-30, 2007, Proceedings, Part II, pp. 1734-1751, 2007, Springer, 978-3-540-76835-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
security, authentication, key distribution, Fast handover |
16 | Matti Pöllä, Timo Honkela |
Probabilistic Text Change Detection Using an Immune Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IJCNN ![In: Proceedings of the International Joint Conference on Neural Networks, IJCNN 2007, Celebrating 20 years of neural networks, Orlando, Florida, USA, August 12-17, 2007, pp. 1109-1114, 2007, IEEE, 978-1-4244-1379-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Liang Li, Wei-Qiang Jiang, Jie Tian 0001, Yixian Yang, Cai-Ping Jiang, Zhe Wu, Xin Yang 0001 |
A Networking Identity Authentication Scheme Combining Fingerprint Coding and Identity Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: IEEE International Conference on Intelligence and Security Informatics, ISI 2007, New Brunswick, New Jersey, USA, May 23-24, 2007, Proceedings, pp. 129-132, 2007, IEEE, 1-4244-1329-X. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Chin-Chen Chang 0001, Chih-Chiang Tsou, Yung-Chen Chou |
A Remediable Image Authentication Scheme Based on Feature Extraction and Clustered VQ. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PCM ![In: Advances in Multimedia Information Processing - PCM 2007, 8th Pacific Rim Conference on Multimedia, Hong Kong, China, December 11-14, 2007, Proceedings, pp. 446-449, 2007, Springer, 978-3-540-77254-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
quad-tree segmentation, Image authentication, tampering detection |
16 | Zinaida Benenson, Felix C. Freiling, Ernest Hammerschmidt, Stefan Lucks, Lexi Pimenidis |
Authenticated Query Flooding in Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Security and Privacy in Dynamic Environments, Proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22-24 May 2006, Karlstad, Sweden, pp. 38-49, 2006, Springer, 0-387-33405-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Seong-Pyo Hong, Jong-An Park, Seung Jo Han, Jae-Young Pyun, Joon Lee |
Design of WLAN Secure System Against Weaknesses of the IEEE 802.1x. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICHIT ![In: Advances in Hybrid Information Technology, First International Conference, ICHIT 2006, Jeju Island, Korea, November 9-11, 2006, Revised Selected Papers, pp. 617-627, 2006, Springer, 978-3-540-77367-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
IEEE 802.1x, Privacy, Authentication, Wireless LAN Security |
16 | Ravi Mukkamala, Vijayalakshmi Atluri, Janice Warner, Ranjit Abbadasari |
A Distributed Coalition Service Registry for Ad-Hoc Dynamic Coalitions: A Service-Oriented Approach. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
DBSec ![In: Data and Applications Security XX, 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Sophia Antipolis, France, July 31-August 2, 2006, Proceedings, pp. 209-223, 2006, Springer, 3-540-36796-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Guomin Yang, Duncan S. Wong, Xiaotie Deng |
Efficient Anonymous Roaming and Its Security Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005, Proceedings, pp. 334-349, 2005, 3-540-26223-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Anonymous Roaming, Authenticated Key Exchange |
16 | Virgil Griffith, Markus Jakobsson |
Messin' with Texas Deriving Mother's Maiden Names Using Public Records. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005, Proceedings, pp. 91-103, 2005, 3-540-26223-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock |
Errors in Computational Complexity Proofs for Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2005, 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings, pp. 624-643, 2005, Springer, 3-540-30684-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Jun Jiang, Chen He 0001, Ling-ge Jiang |
On the Design of Provably Secure Identity-Based Authentication and Key Exchange Protocol for Heterogeneous Wireless Access. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCNMC ![In: Networking and Mobile Computing, Third International Conference, ICCNMC 2005, Zhangjiajie, China, August 2-4, 2005, Proceedings, pp. 972-981, 2005, Springer, 3-540-28102-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Daniel J. Bernstein |
The Poly1305-AES Message-Authentication Code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption: 12th International Workshop, FSE 2005, Paris, France, February 21-23, 2005, Revised Selected Papers, pp. 32-49, 2005, Springer, 3-540-26541-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Shintaro Mizuno, Kohji Yamada, Kenji Takahashi |
Authentication using multiple communication channels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 2005 Workshop on Digital Identity Management, Fairfax, VA, USA, November 11, 2005, pp. 54-62, 2005, ACM, 1-59593-232-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
internet, authentication, mobile phone, multiple channels |
16 | Ying-Han Pang, Andrew Teoh Beng Jin, David Ngo Chek Ling |
Binarized Revocable Biometrics in Face Recognition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS (2) ![In: Computational Intelligence and Security, International Conference, CIS 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part II, pp. 788-795, 2005, Springer, 3-540-30819-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Ying-Han Pang, Andrew Teoh Beng Jin, David Ngo Chek Ling |
A Robust Face Recognition System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Australian Conference on Artificial Intelligence ![In: AI 2005: Advances in Artificial Intelligence, 18th Australian Joint Conference on Artificial Intelligence, Sydney, Australia, December 5-9, 2005, Proceedings, pp. 1217-1220, 2005, Springer, 3-540-30462-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Tee Connie, Andrew Teoh Beng Jin, Michael Goh Kah Ong, David Ngo Chek Ling |
PalmHashing: a novel approach for dual-factor authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Pattern Anal. Appl. ![In: Pattern Anal. Appl. 7(3), pp. 255-268, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
PalmHash, Security, Biometric, Token, Palmprint recognition, Two-factor authenticators |
16 | Yang Zhao, Patrizio Campisi, Deepa Kundur |
Dual domain watermarking for authentication and compression of cultural heritage image. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Image Process. ![In: IEEE Trans. Image Process. 13(3), pp. 430-448, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
16 | Erik Anderson, Cheryl L. Beaver, Timothy Draelos, Richard Schroeppel, Mark Torgerson |
ManTiCore: Encryption with Joint Cipher-State Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy: 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004. Proceedings, pp. 440-453, 2004, Springer, 3-540-22379-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Encryption Mode, Inexpensive Authentication, Luby-Rackoff, Feistel, Middletext, Hash, Cipher |
16 | Mi-Ae Kim, Geun-Sil Song, Won-Hyung Lee |
A Robust Image Authentication Method Surviving Acceptable Modifications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (1) ![In: Computational Science and Its Applications - ICCSA 2004, International Conference, Assisi, Italy, May 14-17, 2004, Proceedings, Part I, pp. 722-727, 2004, Springer, 3-540-22054-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
16 | Simson L. Garfinkel |
Email-Based Identification and Authentication: An Alternative to PKI? ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 1(6), pp. 20-26, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
EBIA, Email Security, Social Security Numbers (SSNs), PKI, Identity Theft |
16 | Michelle S. Wangham, Joni da Silva Fraga, Rafael R. Obelheiro, Galeno A. Jung, Elizabeth Fernandes 0001 |
Security Mechanisms for Mobile Agent Platforms Based on SPKI/SDSI Chains of Trust. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SELMAS ![In: Software Engineering for Multi-Agent Systems II, Research Issues and Practical Applications [the book is a result of SELMAS 2003], pp. 207-224, 2003, Springer, 3-540-21182-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
16 | Michelle S. Wangham, Joni da Silva Fraga, Rafael R. Obelheiro |
A Security Scheme for Mobile Agent Platforms in Large-Scale Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Communications and Multimedia Security ![In: Communications and Multimedia Security - Advanced Techniques for Network and Data Protection, 7th IFIP TC-6 TC-11 International Conference, CMS 2003, Torino, Italy, October 2-3, 2003, Proceedings, pp. 104-116, 2003, Springer, 3-540-20185-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
16 | Alwyn Goh, Geong Sen Poh, David Ngo Chek Ling |
Loss-Tolerant Stream Authentication via Configurable Integration of One-Time Signatures and Hash-Graphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Communications and Multimedia Security ![In: Communications and Multimedia Security - Advanced Techniques for Network and Data Protection, 7th IFIP TC-6 TC-11 International Conference, CMS 2003, Torino, Italy, October 2-3, 2003, Proceedings, pp. 239-251, 2003, Springer, 3-540-20185-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
16 | Tero Alamäki, Margareta Björksten, Péter Dornbach, Casper Gripenberg, Norbert Gyorbíró, Gábor Márton, Zoltán Németh, Timo Skyttä, Mikko Tarkiainen |
Privacy Enhancing Service Architectures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy Enhancing Technologies ![In: Privacy Enhancing Technologies, Second International Workshop, PET 2002, San Francisco, CA, USA, April 14-15, 2002, Revised Papers, pp. 99-109, 2002, Springer, 3-540-00565-X. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
16 | Ching-Yung Lin, Shih-Fu Chang |
SARI: self-authentication-and-recovery image watermarking system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Multimedia ![In: Proceedings of the 9th ACM International Conference on Multimedia 2001, Ottawa, Ontario, Canada, September 30 - October 5, 2001, pp. 628-629, 2001, ACM, 1-58113-394-4. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
authentication, watermarking, recovery, information hiding, multimedia security |
16 | Maria Grazia Albanesi, Marco Ferretti, Federico Guerrini |
A Taxonomy for Image Authentication Techniques and its Application to the Current State of the Art. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIAP ![In: 11th International Conference on Image Analysis and Processing (ICIAP 2001), 26-28 September 2001, Palermo, Italy, pp. 535-540, 2001, IEEE Computer Society, 0-7695-1183-X. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
16 | Reihaneh Safavi-Naini, Huaxiong Wang, Chaoping Xing |
Linear Authentication Codes: Bounds and Constructions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2001, Second International Conference on Cryptology in India, Chennai, India, December 16-20, 2001, Proceedings, pp. 127-135, 2001, Springer, 3-540-43010-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Linear Authentication Codes, Distributed Authentication Codes, Authentication Codes |
16 | Stuart E. Schechter, Todd Parnell, Alexander J. Hartemink |
Anonymous Authentication of Membership in Dynamic Groups. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography, Third International Conference, FC'99, Anguilla, British West Indies, February 1999, Proceedings, pp. 184-195, 1999, Springer, 3-540-66362-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
key replacement, verifiably common secret encoding, authentication, anonymity, identification |
16 | Stefan Wolf 0001 |
Strong Security Against Active Attacks in Information-Theoretic Secret-Key Agreement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT '98, International Conference on the Theory and Applications of Cryptology and Information Security, Beijing, China, October 18-22, 1998, Proceedings, pp. 405-419, 1998, Springer, 3-540-65109-8. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
unconditional secrecy, authentication, information theory, privacy amplification, Secret-key agreement |