The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for authenticators with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1984-2004 (15) 2005-2012 (15) 2013-2019 (17) 2020-2023 (6)
Publication types (Num. hits)
article(21) inproceedings(31) phdthesis(1)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 32 occurrences of 27 keywords

Results
Found 53 publication records. Showing 53 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
86Colin Boyd, Wenbo Mao, Kenneth G. Paterson Key Agreement Using Statically Keyed Authenticators. Search on Bibsonomy ACNS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
72Katelin Bailey, Apu Kapadia, Linden Vongsathorn, Sean W. Smith TwoKind authentication: protecting private information in untrustworthy environments. Search on Bibsonomy WPES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF principle of least privilege, authenticators, passwords
67Shaoquan Jiang, Guang Gong Efficient Authenticators with Application to Key Exchange. Search on Bibsonomy ICISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
67Yvo Desmedt, Yair Frankel Shared Generation of Authenticators and Signatures (Extended Abstract). Search on Bibsonomy CRYPTO The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
52Tee Connie, Andrew Teoh Beng Jin, Michael Goh Kah Ong, David Ngo Chek Ling PalmHashing: a novel approach for dual-factor authentication. Search on Bibsonomy Pattern Anal. Appl. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF PalmHash, Security, Biometric, Token, Palmprint recognition, Two-factor authenticators
47Xiaojian Tian, Duncan S. Wong Session Corruption Attack and Improvements on Encryption Based MT-Authenticators. Search on Bibsonomy CT-RSA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF MT-authenticator, BCK-model, CK-model, Verifiable Encryption
39Peng Ning, An Liu, Wenliang Du Mitigating DoS attacks against broadcast authentication in wireless sensor networks. Search on Bibsonomy ACM Trans. Sens. Networks The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security, Sensor networks, broadcast authentication, DoS attacks
39Yvonne Hitchcock, Colin Boyd, Juan Manuel González Nieto Modular proofs for key exchange: rigorous optimizations in the Canetti-Krawczyk model. Search on Bibsonomy Appl. Algebra Eng. Commun. Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Canetti, Krawczyk model, Security proofs, Key exchange protocols
39Donald W. Davies A Message Authenticator Algorithm Suitable for A Mainframe Computer. Search on Bibsonomy CRYPTO The full citation details ... 1984 DBLP  DOI  BibTeX  RDF
28Kodai Hatakeyama, Daisuke Kotani, Yasuo Okabe Key Management Based on Ownership of Multiple Authenticators in Public Key Authentication. Search on Bibsonomy SEC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
28Koudai Hatakeyama, Daisuke Kotani, Yasuo Okabe Key Management Based on Ownership of Multiple Authenticators in Public Key Authentication. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
28Nick Sullivan Exported Authenticators in TLS. Search on Bibsonomy RFC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
28Kentrell Owens, Olabode Anise, Amanda Krauss, Blase Ur User Perceptions of the Usability and Security of Smartphones as FIDO2 Roaming Authenticators. Search on Bibsonomy SOUPS @ USENIX Security Symposium The full citation details ... 2021 DBLP  BibTeX  RDF
28Lixue Sun, Chunxiang Xu, Yuan Zhang 0006, Kefei Chen Public data integrity auditing without homomorphic authenticators from indistinguishability obfuscation. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
28Shuaijianni Xu, Liang Feng Zhang A Homomorphic Proxy Re-authenticators based Efficient Multi-client Non-interactive Verifiable Computation Scheme. Search on Bibsonomy ICISSP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
28Dario Fiore 0001, Aikaterini Mitrokotsa, Luca Nizzardo, Elena Pagnin Multi-key homomorphic authenticators. Search on Bibsonomy IET Inf. Secur. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
28Lucas Schabhüser, Denis Butin, Johannes Buchmann 0001 Function-Dependent Commitments from Homomorphic Authenticators. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2019 DBLP  BibTeX  RDF
28Kirsten E. Richards Privacy and Power Implications of Web Location of Personal Data Authenticators. Search on Bibsonomy HCI (29) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
28Lucas Schabhüser, Denis Butin, Johannes Buchmann 0001 Function-Dependent Commitments from Homomorphic Authenticators. Search on Bibsonomy ACISP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
28Lucas Schabhüser, Denis Butin, Johannes Buchmann 0001 Context Hiding Multi-key Linearly Homomorphic Authenticators. Search on Bibsonomy CT-RSA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
28Alex Takakuwa Moving from Passwords to Authenticators. Search on Bibsonomy 2019   RDF
28Dario Catalano, Dario Fiore 0001 Practical Homomorphic Message Authenticators for Arithmetic Circuits. Search on Bibsonomy J. Cryptol. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Lucas Schabhüser, Denis Butin, Johannes Buchmann 0001 Context Hiding Multi-Key Linearly Homomorphic Authenticators. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2018 DBLP  BibTeX  RDF
28Wenting Shen, Guangyang Yang, Jia Yu 0003, Hanlin Zhang, Fanyu Kong, Rong Hao Remote data possession checking with privacy-preserving authenticators for cloud storage. Search on Bibsonomy Future Gener. Comput. Syst. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
28David Derler, Sebastian Ramacher, Daniel Slamanig Homomorphic Proxy Re-Authenticators and Applications to Verifiable Multi-User Data Aggregation. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2017 DBLP  BibTeX  RDF
28David Derler, Sebastian Ramacher, Daniel Slamanig Homomorphic Proxy Re-Authenticators and Applications to Verifiable Multi-User Data Aggregation. Search on Bibsonomy Financial Cryptography The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
28Yingjun Zhang, Yu Qin, Dengguo Feng, Bo Yang, Weijin Wang An Efficient Trustzone-Based In-application Isolation Schema for Mobile Authenticators. Search on Bibsonomy SecureComm The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
28Dario Fiore 0001, Aikaterini Mitrokotsa, Luca Nizzardo, Elena Pagnin Multi-Key Homomorphic Authenticators. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2016 DBLP  BibTeX  RDF
28Dario Fiore 0001, Aikaterini Mitrokotsa, Luca Nizzardo, Elena Pagnin Multi-key Homomorphic Authenticators. Search on Bibsonomy ASIACRYPT (2) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
28Alex Brown, Myriam Abramson Twitter Fingerprints as Active Authenticators. Search on Bibsonomy ICDM Workshops The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
28Dongxi Liu, John Zic Proofs of Encrypted Data Retrievability with Probabilistic and Homomorphic Message Authenticators. Search on Bibsonomy TrustCom/BigDataSE/ISPA (1) The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
28Rosario Gennaro, Daniel Wichs Fully Homomorphic Message Authenticators. Search on Bibsonomy ASIACRYPT (2) The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
28Rosario Gennaro, Daniel Wichs Fully Homomorphic Message Authenticators. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2012 DBLP  BibTeX  RDF
28Katelin Bailey, Linden Vongsathorn, Apu Kapadia, Chris Masone, Sean W. Smith TwoKind authentication: usable authenticators for untrustworthy environments. Search on Bibsonomy SOUPS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
28Daniel J. Bernstein Stronger Security Bounds for Wegman-Carter-Shoup Authenticators. Search on Bibsonomy EUROCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
28David D. Hwang, Ingrid Verbauwhede Design of portable biometric authenticators - energy, performance, and security tradeoffs. Search on Bibsonomy IEEE Trans. Consumer Electron. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
28Reihaneh Safavi-Naini, Huaxiong Wang Bounds and Constructions for Threshold Shared Generation of Authenticators. Search on Bibsonomy Int. J. Comput. Math. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
28Reihaneh Safavi-Naini Three Systems for Threshold Generation of Authenticators. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
28Ralph Spencer Poore Passwords: Obsolete Authenticators or Cutting Edge? Search on Bibsonomy Inf. Secur. J. A Glob. Perspect. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
28Reihaneh Safavi-Naini Three Systems for Shared Generation of Authenticators. Search on Bibsonomy COCOON The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
28C. Fernández, A. Vaquero, J. M. Troya, J. M. Sánchez Automating the computation of authenticators for interbank telex messages. Search on Bibsonomy Comput. Secur. The full citation details ... 1987 DBLP  DOI  BibTeX  RDF
20Sebastian Gajek, Mark Manulis, Ahmad-Reza Sadeghi, Jörg Schwenk Provably secure browser-based user-aware mutual authentication over TLS. Search on Bibsonomy AsiaCCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF browser-based protocols, phishing, user authentication, TLS
20M. Abdul Alim, Behçet Sarikaya EAP-Sens: a security architecture for wireless sensor networks. Search on Bibsonomy WICON The full citation details ... 2008 DBLP  DOI  BibTeX  RDF GPSK, security, wireless sensor network, WPAN, EAP
20Renwei Ge, Gonzalo R. Arce, Giovanni Di Crescenzo Approximate Message Authentication Codes for N-ary Alphabets. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20John G. Brainard, Ari Juels, Ronald L. Rivest, Michael Szydlo, Moti Yung Fourth-factor authentication: somebody you know. Search on Bibsonomy CCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF hardware tokens, vouchers, authentication
20Seong-Pyo Hong, Jong-An Park, Seung Jo Han, Jae-Young Pyun, Joon Lee Design of WLAN Secure System Against Weaknesses of the IEEE 802.1x. Search on Bibsonomy ICHIT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF IEEE 802.1x, Privacy, Authentication, Wireless LAN Security
20Ari Juels Strengthening EPC tags against cloning. Search on Bibsonomy Workshop on Wireless Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF track and trace, authentication, RFID, cloning, EPC, counterfeiting
20Kanako Yokota, Tatsuhiro Yonekura A Proposal of COMPASS (COMmunity Portrait Authentication SyStem). Search on Bibsonomy CW The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
20Valery I. Korzhik, Guillermo Morales-Luna Hybrid authentication based on noisy channels. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Key sharing, Information-theoretically secure authentication, Hash functions, Privacy amplification
20Alwyn Goh, Geong Sen Poh, David Ngo Chek Ling Loss-Tolerant Stream Authentication via Configurable Integration of One-Time Signatures and Hash-Graphs. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
20Shengli Liu, Yumin Wang An Authetnication Scheme over Non-Authentic Public Channel in Information-Theoretic Secret-Key Agreement. Search on Bibsonomy AAECC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
20Douglas R. Stinson Universal Hashing and Authentication Codes. Search on Bibsonomy CRYPTO The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
20Andrew J. Clark Physical Protection of Cryptographic Devices. Search on Bibsonomy EUROCRYPT The full citation details ... 1987 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #53 of 53 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license