The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for authenticator with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1984-2003 (16) 2004-2005 (20) 2006-2007 (16) 2008-2014 (15) 2015-2021 (16) 2022-2023 (9)
Publication types (Num. hits)
article(24) inproceedings(68)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 82 occurrences of 64 keywords

Results
Found 92 publication records. Showing 92 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
125Xiaojian Tian, Duncan S. Wong Session Corruption Attack and Improvements on Encryption Based MT-Authenticators. Search on Bibsonomy CT-RSA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF MT-authenticator, BCK-model, CK-model, Verifiable Encryption
92Yvonne Hitchcock, Yiu Shing Terry Tin, Juan Manuel González Nieto, Colin Boyd, Paul Montague A Password-Based Authenticator: Security Proof and Applications. Search on Bibsonomy INDOCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF key agreement, password authentication, Key management protocols
75Ying-Han Pang, Andrew Teoh Beng Jin, David Ngo Chek Ling Personal Authenticator on the Basis of Two-Factors: Palmprint Features and Tokenized Random Data. Search on Bibsonomy Australian Conference on Artificial Intelligence The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
64Peng Ning, An Liu, Wenliang Du Mitigating DoS attacks against broadcast authentication in wireless sensor networks. Search on Bibsonomy ACM Trans. Sens. Networks The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security, Sensor networks, broadcast authentication, DoS attacks
64Katelin Bailey, Apu Kapadia, Linden Vongsathorn, Sean W. Smith TwoKind authentication: protecting private information in untrustworthy environments. Search on Bibsonomy WPES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF principle of least privilege, authenticators, passwords
64You Sung Kang, KyungHee Oh, Byung-Ho Chung, Kyoil Chung, DaeHun Nyang Analysis and Countermeasure on Vulnerability of WPA Key Exchange Mechanism. Search on Bibsonomy ICOIN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF 802.11i, 802.1X, WPA, WLAN security
54Aleck Nash, Hudan Studiawan, George Grispos, Kim-Kwang Raymond Choo Security Analysis of Google Authenticator, Microsoft Authenticator, and Authy. Search on Bibsonomy ICDF2C (2) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
48Huawei Zhao, Jing Qin 0002, Zhifeng Fang Converters for Designing Applied Cryptographic Protocols. Search on Bibsonomy EUC (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
48Shaoquan Jiang Deniable Authentication on the Internet. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Authentication, Protocol, Key Exchange, Deniability
48Shaoquan Jiang, Guang Gong Efficient Authenticators with Application to Key Exchange. Search on Bibsonomy ICISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
48Changhua He, John C. Mitchell Analysis of the 802.11i 4-way handshake. Search on Bibsonomy Workshop on Wireless Security The full citation details ... 2004 DBLP  DOI  BibTeX  RDF 4-way handshake, authentication, WLAN, key management, denial-of-service, 802.11i
44Tetsuo Kamina, Toshinori Aoki, Yoshiteru Eto, Noboru Koshizuka, Jun Yamada, Ken Sakamura Verifying Identifier-Authenticity in Ubiquitous Computing Environment. Search on Bibsonomy AINA Workshops (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF 2-D code, ucode, authenticator, infrastructure, QR Code
44Yiu Shing Terry Tin, Harikrishna Vasanta, Colin Boyd, Juan Manuel González Nieto Protocols with Security Proofs for Mobile Applications. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF secure key exchange, authenticator, Provable security, mobile security
43Ying-Han Pang, Andrew Teoh Beng Jin, David Ngo Chek Ling Two-Factor Cancelable Biometrics Authenticator. Search on Bibsonomy J. Comput. Sci. Technol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF face recognition, Geometric moments, cancelable biometrics, pseudo Zernike moment
43Andrew Teoh Beng Jin, David Ngo Chek Ling, Alwyn Goh An Integrated Dual Factor Authenticator Based on the Face Data and Tokenised Random Number. Search on Bibsonomy ICBA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
43Donald W. Davies A Message Authenticator Algorithm Suitable for A Mainframe Computer. Search on Bibsonomy CRYPTO The full citation details ... 1984 DBLP  DOI  BibTeX  RDF
32Manuel Barbosa, Pooya Farshim Security Analysis of Standard Authentication and Key Agreement Protocols Utilising Timestamps. Search on Bibsonomy AFRICACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Key Agreement, Timestamp, Entity Authentication
32M. Abdul Alim, Behçet Sarikaya EAP-Sens: a security architecture for wireless sensor networks. Search on Bibsonomy WICON The full citation details ... 2008 DBLP  DOI  BibTeX  RDF GPSK, security, wireless sensor network, WPAN, EAP
32Yunlei Zhao, Chan H. Lee, Yiming Zhao, Hong Zhu 0004 Some Observations on Zap and Its Applications. Search on Bibsonomy ACNS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Zap, public-coin honest verifier zero-knowledge, deniable authentication, timed commitment, witness indistinguishability
32Yvo Desmedt, Yair Frankel Shared Generation of Authenticators and Signatures (Extended Abstract). Search on Bibsonomy CRYPTO The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
32Albrecht Beutelspacher Perfect and Essentially Perfect Authentication Schemes. Search on Bibsonomy EUROCRYPT The full citation details ... 1987 DBLP  DOI  BibTeX  RDF
28Yang Zhang Effective Attacks in the Tor Authentication Protocol. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Tor Authentication Protocol, Onion Routing Protocol, Authenticator, Tor, Universally Composable Security
28Qing Li 0034, Yih-Chun Hu, Meiyuan Zhao, Adrian Perrig, Jesse Walker, Wade Trappe SEAR: a secure efficient ad hoc on demand routing protocol for wireless networks. Search on Bibsonomy AsiaCCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF SEAR, authenticator, one-way hash function
27Vassilis Papaspirou, Maria Papathanasaki, Leandros A. Maglaras, Ioanna Kantzavelou, Christos Douligeris, Mohamed Amine Ferrag, Helge Janicke A Novel Authentication Method That Combines Honeytokens and Google Authenticator. Search on Bibsonomy Inf. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
27Shay Gueron A New Interpretation for the GHASH Authenticator of AES-GCM. Search on Bibsonomy CSCML The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
27Michal Kepkowski, Lucjan Hanzlik, Ian D. Wood, Mohamed Ali Kâafar How Not to Handle Keys: Timing Attacks on FIDO Authenticator Privacy. Search on Bibsonomy Proc. Priv. Enhancing Technol. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
27Michal Kepkowski, Lucjan Hanzlik, Ian D. Wood, Mohamed Ali Kâafar How Not to Handle Keys: Timing Attacks on FIDO Authenticator Privacy. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
27Narla John Metilda Sagaya Mary, Srinivasan Umesh, Sandesh Varadaraju Katta S-Vectors and TESA: Speaker Embeddings and a Speaker Authenticator Based on Transformer Encoder. Search on Bibsonomy IEEE ACM Trans. Audio Speech Lang. Process. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
27Harshat Kumar, Hojjat Seyed Mousavi, Behrooz Shahsavari Fusion-Id: A Photoplethysmography and Motion Sensor Fusion Biometric Authenticator With Few-Shot on-Boarding. Search on Bibsonomy ICASSP The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
27Vassilis Papaspirou, Maria Papathanasaki, Leandros A. Maglaras, Ioanna Kantzavelou, Christos Douligeris, Mohamed Amine Ferrag, Helge Janicke Security Revisited: Honeytokens meet Google Authenticator. Search on Bibsonomy SEEDA-CECNSM The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
27Markus Keil, Philipp Markert, Markus Dürmuth "It's Just a Lot of Prerequisites": A User Perception and Usability Analysis of the German ID Card as a FIDO2 Authenticator. Search on Bibsonomy EuroUSEC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
27Xiang Gao, Jia Yu 0005, Wenting Shen, Yan Chang, Shibin Zhang, Ming Yang 0023, Bin Wu Achieving low-entropy secure cloud data auditing with file and authenticator deduplication. Search on Bibsonomy Inf. Sci. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
27Vassilis Papaspirou, Maria Papathanasaki, Leandros A. Maglaras, Ioanna Kantzavelou, Christos Douligeris, Mohamed Amine Ferrag, Helge Janicke Cybersecurity Revisited: Honeytokens meet Google Authenticator. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
27Chris Culnane, Christopher J. P. Newton, Helen Treharne Technical Report on a Virtual CTAP2 WebAuthn Authenticator. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
27Yuto Okawa, Shuji Yamaguchi, Hidehito Gomi, Tetsutaro Uehara Implementation of an extended FIDO2 authenticator using Attribute-Based Signatures. Search on Bibsonomy QRS Companion The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
27Yan Xu 0007, Song Sun, Jie Cui 0004, Hong Zhong 0001 Intrusion-resilient public cloud auditing scheme with authenticator update. Search on Bibsonomy Inf. Sci. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
27Bikash Debnath, Jadav Chandra Das, Debashis De, Ferial Ghaemi, Ali Ahmadian, Norazak Senu Reversible Palm Vein Authenticator Design With Quantum Dot Cellular Automata for Information Security in Nanocommunication Network. Search on Bibsonomy IEEE Access The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
27Hui Li 0070, Xuesong Pan, Xinluo Wang, Haonan Feng, Chengjie Shi Authenticator Rebinding Attack of the UAF Protocol on Mobile Devices. Search on Bibsonomy Wirel. Commun. Mob. Comput. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
27Chengqian Guo, Quanwei Cai 0001, Qiongxiao Wang, Jingqiang Lin Extending Registration and Authentication Processes of FIDO2 External Authenticator with QR Codes. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
27Jin Wook Byun On the Secure Design of Hash-Based Authenticator in the Smartcard Authentication System. Search on Bibsonomy Wirel. Pers. Commun. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
27Yun-Tai Chang, Marc J. Dupuis My Voiceprint Is My Authenticator: A Two-Layer Authentication Approach Using Voiceprint for Voice Assistants. Search on Bibsonomy SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
27Nikola K. Blanchard, Siargey Kachanovich, Ted Selker, Florentin Waligorski Reflexive Memory Authenticator: A Proposal for Effortless Renewable Biometrics. Search on Bibsonomy ETAA@ESORICS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
27Hubert Garavel, Lina Marsso Comparative Study of Eight Formal Specifications of the Message Authenticator Algorithm. Search on Bibsonomy MARS/VPT@ETAPS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
27Florian Reimair, Christian Kollmann, Alexander Marsalek Emulating U2F authenticator devices. Search on Bibsonomy CNS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
27Roland H. Steinegger, Daniel Deckers, Pascal Giessler, Sebastian Abeck Risk-based authenticator for web applications. Search on Bibsonomy EuroPLoP The full citation details ... 2016 DBLP  BibTeX  RDF
27Wenting Shen, Jia Yu 0005, Rong Hao, Xu An Wang 0001 A Public Cloud Storage Auditing Scheme with Lightweight Authenticator Generation. Search on Bibsonomy 3PGCIC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
27Guangdong Bai, Jun Sun 0001, Jianliang Wu, Quanqi Ye, Li Li 0044, Jin Song Dong, Shanqing Guo All Your Sessions Are Belong to Us: Investigating Authenticator Leakage through Backup Channels on Android. Search on Bibsonomy ICECCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
27Nikolaos Pitropakis, Nikolaos Yfantopoulos, Dimitris Geneiatakis, Costas Lambrinoudakis Towards an augmented authenticator in the Cloud. Search on Bibsonomy ISSPIT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
27Andrea Bartoli, Juan Hernández-Serrano, Olga León, Apostolos A. Kountouris, Dominique Barthel Energy-efficient physical layer packet authenticator for machine-to-machine networks. Search on Bibsonomy Trans. Emerg. Telecommun. Technol. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
27Klaus John, Stefan Taber, Andreas Ehringfeld Proxy Authenticator - Approach of a Signature-based Single Sign On Solution for E-Government Services. Search on Bibsonomy EGOV/ePart Ongoing Research The full citation details ... 2013 DBLP  BibTeX  RDF
27Haibo Tian Deniable message transmission authenticator based on weak signature schemes. Search on Bibsonomy IET Inf. Secur. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
27Chien-Yuan Chen, Cheng-Yuan Ku, David C. Yen Cryptographic relational algebra for databases using the field authenticator. Search on Bibsonomy Comput. Math. Appl. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Hyoungjoo Lee, Sungzoon Cho Retraining a keystroke dynamics-based authenticator with impostor patterns. Search on Bibsonomy Comput. Secur. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Pilsung Kang 0001, Seongseob Hwang, Sungzoon Cho Continual Retraining of Keystroke Dynamics Based Authenticator. Search on Bibsonomy ICB The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Nicolas Sklavos 0001, Costas Efstathiou SecurID Authenticator: On the Hardware Implementation Efficiency. Search on Bibsonomy ICECS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27John R. Vollbrecht, Pasi Eronen, Nick L. Petroni Jr., Yoshihiro Ohba State Machines for Extensible Authentication Protocol (EAP) Peer and Authenticator. Search on Bibsonomy RFC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27Raymond S. T. Lee iJADE Authenticator - An Intelligent Multiagent Based Facial Authentication System. Search on Bibsonomy Int. J. Pattern Recognit. Artif. Intell. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
27Bart Preneel, Vincent Rijmen, Paul C. van Oorschot Security analysis of the message authenticator algorithm (MAA). Search on Bibsonomy Eur. Trans. Telecommun. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
16Giuseppe Ateniese, Seny Kamara, Jonathan Katz Proofs of Storage from Homomorphic Identification Protocols. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Jing Liu 0003, Xinming Ye, Jun Zhang 0001, Jun Li 0002 Security Verification of 802.11i 4-Way Handshake Protocol. Search on Bibsonomy ICC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Hovav Shacham, Brent Waters Compact Proofs of Retrievability. Search on Bibsonomy ASIACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Ee-Chien Chang, Jia Xu 0006 Remote Integrity Check with Dishonest Storage Server. Search on Bibsonomy ESORICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Huijuan Yang, Alex ChiChung Kot Pattern-Based Data Hiding for Binary Image Authentication by Connectivity-Preserving. Search on Bibsonomy IEEE Trans. Multim. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Rafael Marín López, Pedro J. Fernández, Antonio Fernandez Gómez-Skarmeta 3-Party Approach for Fast Handover in EAP-Based Wireless Networks. Search on Bibsonomy OTM Conferences (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security, authentication, key distribution, Fast handover
16Matti Pöllä, Timo Honkela Probabilistic Text Change Detection Using an Immune Model. Search on Bibsonomy IJCNN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Liang Li, Wei-Qiang Jiang, Jie Tian 0001, Yixian Yang, Cai-Ping Jiang, Zhe Wu, Xin Yang 0001 A Networking Identity Authentication Scheme Combining Fingerprint Coding and Identity Based Encryption. Search on Bibsonomy ISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Chin-Chen Chang 0001, Chih-Chiang Tsou, Yung-Chen Chou A Remediable Image Authentication Scheme Based on Feature Extraction and Clustered VQ. Search on Bibsonomy PCM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF quad-tree segmentation, Image authentication, tampering detection
16Zinaida Benenson, Felix C. Freiling, Ernest Hammerschmidt, Stefan Lucks, Lexi Pimenidis Authenticated Query Flooding in Sensor Networks. Search on Bibsonomy SEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Seong-Pyo Hong, Jong-An Park, Seung Jo Han, Jae-Young Pyun, Joon Lee Design of WLAN Secure System Against Weaknesses of the IEEE 802.1x. Search on Bibsonomy ICHIT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF IEEE 802.1x, Privacy, Authentication, Wireless LAN Security
16Ravi Mukkamala, Vijayalakshmi Atluri, Janice Warner, Ranjit Abbadasari A Distributed Coalition Service Registry for Ad-Hoc Dynamic Coalitions: A Service-Oriented Approach. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Guomin Yang, Duncan S. Wong, Xiaotie Deng Efficient Anonymous Roaming and Its Security Analysis. Search on Bibsonomy ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Anonymous Roaming, Authenticated Key Exchange
16Virgil Griffith, Markus Jakobsson Messin' with Texas Deriving Mother's Maiden Names Using Public Records. Search on Bibsonomy ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock Errors in Computational Complexity Proofs for Protocols. Search on Bibsonomy ASIACRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Jun Jiang, Chen He 0001, Ling-ge Jiang On the Design of Provably Secure Identity-Based Authentication and Key Exchange Protocol for Heterogeneous Wireless Access. Search on Bibsonomy ICCNMC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Daniel J. Bernstein The Poly1305-AES Message-Authentication Code. Search on Bibsonomy FSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Shintaro Mizuno, Kohji Yamada, Kenji Takahashi Authentication using multiple communication channels. Search on Bibsonomy Digital Identity Management The full citation details ... 2005 DBLP  DOI  BibTeX  RDF internet, authentication, mobile phone, multiple channels
16Ying-Han Pang, Andrew Teoh Beng Jin, David Ngo Chek Ling Binarized Revocable Biometrics in Face Recognition. Search on Bibsonomy CIS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Ying-Han Pang, Andrew Teoh Beng Jin, David Ngo Chek Ling A Robust Face Recognition System. Search on Bibsonomy Australian Conference on Artificial Intelligence The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Tee Connie, Andrew Teoh Beng Jin, Michael Goh Kah Ong, David Ngo Chek Ling PalmHashing: a novel approach for dual-factor authentication. Search on Bibsonomy Pattern Anal. Appl. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF PalmHash, Security, Biometric, Token, Palmprint recognition, Two-factor authenticators
16Yang Zhao, Patrizio Campisi, Deepa Kundur Dual domain watermarking for authentication and compression of cultural heritage image. Search on Bibsonomy IEEE Trans. Image Process. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
16Erik Anderson, Cheryl L. Beaver, Timothy Draelos, Richard Schroeppel, Mark Torgerson ManTiCore: Encryption with Joint Cipher-State Authentication. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Encryption Mode, Inexpensive Authentication, Luby-Rackoff, Feistel, Middletext, Hash, Cipher
16Mi-Ae Kim, Geun-Sil Song, Won-Hyung Lee A Robust Image Authentication Method Surviving Acceptable Modifications. Search on Bibsonomy ICCSA (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
16Simson L. Garfinkel Email-Based Identification and Authentication: An Alternative to PKI? Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF EBIA, Email Security, Social Security Numbers (SSNs), PKI, Identity Theft
16Michelle S. Wangham, Joni da Silva Fraga, Rafael R. Obelheiro, Galeno A. Jung, Elizabeth Fernandes 0001 Security Mechanisms for Mobile Agent Platforms Based on SPKI/SDSI Chains of Trust. Search on Bibsonomy SELMAS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
16Michelle S. Wangham, Joni da Silva Fraga, Rafael R. Obelheiro A Security Scheme for Mobile Agent Platforms in Large-Scale Systems. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
16Alwyn Goh, Geong Sen Poh, David Ngo Chek Ling Loss-Tolerant Stream Authentication via Configurable Integration of One-Time Signatures and Hash-Graphs. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
16Tero Alamäki, Margareta Björksten, Péter Dornbach, Casper Gripenberg, Norbert Gyorbíró, Gábor Márton, Zoltán Németh, Timo Skyttä, Mikko Tarkiainen Privacy Enhancing Service Architectures. Search on Bibsonomy Privacy Enhancing Technologies The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
16Ching-Yung Lin, Shih-Fu Chang SARI: self-authentication-and-recovery image watermarking system. Search on Bibsonomy ACM Multimedia The full citation details ... 2001 DBLP  DOI  BibTeX  RDF authentication, watermarking, recovery, information hiding, multimedia security
16Maria Grazia Albanesi, Marco Ferretti, Federico Guerrini A Taxonomy for Image Authentication Techniques and its Application to the Current State of the Art. Search on Bibsonomy ICIAP The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
16Reihaneh Safavi-Naini, Huaxiong Wang, Chaoping Xing Linear Authentication Codes: Bounds and Constructions. Search on Bibsonomy INDOCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Linear Authentication Codes, Distributed Authentication Codes, Authentication Codes
16Stuart E. Schechter, Todd Parnell, Alexander J. Hartemink Anonymous Authentication of Membership in Dynamic Groups. Search on Bibsonomy Financial Cryptography The full citation details ... 1999 DBLP  DOI  BibTeX  RDF key replacement, verifiably common secret encoding, authentication, anonymity, identification
16Stefan Wolf 0001 Strong Security Against Active Attacks in Information-Theoretic Secret-Key Agreement. Search on Bibsonomy ASIACRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF unconditional secrecy, authentication, information theory, privacy amplification, Secret-key agreement
Displaying result #1 - #92 of 92 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license