Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
86 | Colin Boyd, Wenbo Mao, Kenneth G. Paterson |
Key Agreement Using Statically Keyed Authenticators. |
ACNS |
2004 |
DBLP DOI BibTeX RDF |
|
72 | Katelin Bailey, Apu Kapadia, Linden Vongsathorn, Sean W. Smith |
TwoKind authentication: protecting private information in untrustworthy environments. |
WPES |
2008 |
DBLP DOI BibTeX RDF |
principle of least privilege, authenticators, passwords |
67 | Shaoquan Jiang, Guang Gong |
Efficient Authenticators with Application to Key Exchange. |
ICISC |
2005 |
DBLP DOI BibTeX RDF |
|
67 | Yvo Desmedt, Yair Frankel |
Shared Generation of Authenticators and Signatures (Extended Abstract). |
CRYPTO |
1991 |
DBLP DOI BibTeX RDF |
|
52 | Tee Connie, Andrew Teoh Beng Jin, Michael Goh Kah Ong, David Ngo Chek Ling |
PalmHashing: a novel approach for dual-factor authentication. |
Pattern Anal. Appl. |
2004 |
DBLP DOI BibTeX RDF |
PalmHash, Security, Biometric, Token, Palmprint recognition, Two-factor authenticators |
47 | Xiaojian Tian, Duncan S. Wong |
Session Corruption Attack and Improvements on Encryption Based MT-Authenticators. |
CT-RSA |
2006 |
DBLP DOI BibTeX RDF |
MT-authenticator, BCK-model, CK-model, Verifiable Encryption |
39 | Peng Ning, An Liu, Wenliang Du |
Mitigating DoS attacks against broadcast authentication in wireless sensor networks. |
ACM Trans. Sens. Networks |
2008 |
DBLP DOI BibTeX RDF |
security, Sensor networks, broadcast authentication, DoS attacks |
39 | Yvonne Hitchcock, Colin Boyd, Juan Manuel González Nieto |
Modular proofs for key exchange: rigorous optimizations in the Canetti-Krawczyk model. |
Appl. Algebra Eng. Commun. Comput. |
2006 |
DBLP DOI BibTeX RDF |
Canetti, Krawczyk model, Security proofs, Key exchange protocols |
39 | Donald W. Davies |
A Message Authenticator Algorithm Suitable for A Mainframe Computer. |
CRYPTO |
1984 |
DBLP DOI BibTeX RDF |
|
28 | Kodai Hatakeyama, Daisuke Kotani, Yasuo Okabe |
Key Management Based on Ownership of Multiple Authenticators in Public Key Authentication. |
SEC |
2023 |
DBLP DOI BibTeX RDF |
|
28 | Koudai Hatakeyama, Daisuke Kotani, Yasuo Okabe |
Key Management Based on Ownership of Multiple Authenticators in Public Key Authentication. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
28 | Nick Sullivan |
Exported Authenticators in TLS. |
RFC |
2022 |
DBLP DOI BibTeX RDF |
|
28 | Kentrell Owens, Olabode Anise, Amanda Krauss, Blase Ur |
User Perceptions of the Usability and Security of Smartphones as FIDO2 Roaming Authenticators. |
SOUPS @ USENIX Security Symposium |
2021 |
DBLP BibTeX RDF |
|
28 | Lixue Sun, Chunxiang Xu, Yuan Zhang 0006, Kefei Chen |
Public data integrity auditing without homomorphic authenticators from indistinguishability obfuscation. |
Int. J. Inf. Sec. |
2020 |
DBLP DOI BibTeX RDF |
|
28 | Shuaijianni Xu, Liang Feng Zhang |
A Homomorphic Proxy Re-authenticators based Efficient Multi-client Non-interactive Verifiable Computation Scheme. |
ICISSP |
2020 |
DBLP DOI BibTeX RDF |
|
28 | Dario Fiore 0001, Aikaterini Mitrokotsa, Luca Nizzardo, Elena Pagnin |
Multi-key homomorphic authenticators. |
IET Inf. Secur. |
2019 |
DBLP DOI BibTeX RDF |
|
28 | Lucas Schabhüser, Denis Butin, Johannes Buchmann 0001 |
Function-Dependent Commitments from Homomorphic Authenticators. |
IACR Cryptol. ePrint Arch. |
2019 |
DBLP BibTeX RDF |
|
28 | Kirsten E. Richards |
Privacy and Power Implications of Web Location of Personal Data Authenticators. |
HCI (29) |
2019 |
DBLP DOI BibTeX RDF |
|
28 | Lucas Schabhüser, Denis Butin, Johannes Buchmann 0001 |
Function-Dependent Commitments from Homomorphic Authenticators. |
ACISP |
2019 |
DBLP DOI BibTeX RDF |
|
28 | Lucas Schabhüser, Denis Butin, Johannes Buchmann 0001 |
Context Hiding Multi-key Linearly Homomorphic Authenticators. |
CT-RSA |
2019 |
DBLP DOI BibTeX RDF |
|
28 | Alex Takakuwa |
Moving from Passwords to Authenticators. |
|
2019 |
RDF |
|
28 | Dario Catalano, Dario Fiore 0001 |
Practical Homomorphic Message Authenticators for Arithmetic Circuits. |
J. Cryptol. |
2018 |
DBLP DOI BibTeX RDF |
|
28 | Lucas Schabhüser, Denis Butin, Johannes Buchmann 0001 |
Context Hiding Multi-Key Linearly Homomorphic Authenticators. |
IACR Cryptol. ePrint Arch. |
2018 |
DBLP BibTeX RDF |
|
28 | Wenting Shen, Guangyang Yang, Jia Yu 0003, Hanlin Zhang, Fanyu Kong, Rong Hao |
Remote data possession checking with privacy-preserving authenticators for cloud storage. |
Future Gener. Comput. Syst. |
2017 |
DBLP DOI BibTeX RDF |
|
28 | David Derler, Sebastian Ramacher, Daniel Slamanig |
Homomorphic Proxy Re-Authenticators and Applications to Verifiable Multi-User Data Aggregation. |
IACR Cryptol. ePrint Arch. |
2017 |
DBLP BibTeX RDF |
|
28 | David Derler, Sebastian Ramacher, Daniel Slamanig |
Homomorphic Proxy Re-Authenticators and Applications to Verifiable Multi-User Data Aggregation. |
Financial Cryptography |
2017 |
DBLP DOI BibTeX RDF |
|
28 | Yingjun Zhang, Yu Qin, Dengguo Feng, Bo Yang, Weijin Wang |
An Efficient Trustzone-Based In-application Isolation Schema for Mobile Authenticators. |
SecureComm |
2017 |
DBLP DOI BibTeX RDF |
|
28 | Dario Fiore 0001, Aikaterini Mitrokotsa, Luca Nizzardo, Elena Pagnin |
Multi-Key Homomorphic Authenticators. |
IACR Cryptol. ePrint Arch. |
2016 |
DBLP BibTeX RDF |
|
28 | Dario Fiore 0001, Aikaterini Mitrokotsa, Luca Nizzardo, Elena Pagnin |
Multi-key Homomorphic Authenticators. |
ASIACRYPT (2) |
2016 |
DBLP DOI BibTeX RDF |
|
28 | Alex Brown, Myriam Abramson |
Twitter Fingerprints as Active Authenticators. |
ICDM Workshops |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Dongxi Liu, John Zic |
Proofs of Encrypted Data Retrievability with Probabilistic and Homomorphic Message Authenticators. |
TrustCom/BigDataSE/ISPA (1) |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Rosario Gennaro, Daniel Wichs |
Fully Homomorphic Message Authenticators. |
ASIACRYPT (2) |
2013 |
DBLP DOI BibTeX RDF |
|
28 | Rosario Gennaro, Daniel Wichs |
Fully Homomorphic Message Authenticators. |
IACR Cryptol. ePrint Arch. |
2012 |
DBLP BibTeX RDF |
|
28 | Katelin Bailey, Linden Vongsathorn, Apu Kapadia, Chris Masone, Sean W. Smith |
TwoKind authentication: usable authenticators for untrustworthy environments. |
SOUPS |
2007 |
DBLP DOI BibTeX RDF |
|
28 | Daniel J. Bernstein |
Stronger Security Bounds for Wegman-Carter-Shoup Authenticators. |
EUROCRYPT |
2005 |
DBLP DOI BibTeX RDF |
|
28 | David D. Hwang, Ingrid Verbauwhede |
Design of portable biometric authenticators - energy, performance, and security tradeoffs. |
IEEE Trans. Consumer Electron. |
2004 |
DBLP DOI BibTeX RDF |
|
28 | Reihaneh Safavi-Naini, Huaxiong Wang |
Bounds and Constructions for Threshold Shared Generation of Authenticators. |
Int. J. Comput. Math. |
2002 |
DBLP DOI BibTeX RDF |
|
28 | Reihaneh Safavi-Naini |
Three Systems for Threshold Generation of Authenticators. |
Des. Codes Cryptogr. |
1998 |
DBLP DOI BibTeX RDF |
|
28 | Ralph Spencer Poore |
Passwords: Obsolete Authenticators or Cutting Edge? |
Inf. Secur. J. A Glob. Perspect. |
1997 |
DBLP DOI BibTeX RDF |
|
28 | Reihaneh Safavi-Naini |
Three Systems for Shared Generation of Authenticators. |
COCOON |
1996 |
DBLP DOI BibTeX RDF |
|
28 | C. Fernández, A. Vaquero, J. M. Troya, J. M. Sánchez |
Automating the computation of authenticators for interbank telex messages. |
Comput. Secur. |
1987 |
DBLP DOI BibTeX RDF |
|
20 | Sebastian Gajek, Mark Manulis, Ahmad-Reza Sadeghi, Jörg Schwenk |
Provably secure browser-based user-aware mutual authentication over TLS. |
AsiaCCS |
2008 |
DBLP DOI BibTeX RDF |
browser-based protocols, phishing, user authentication, TLS |
20 | M. Abdul Alim, Behçet Sarikaya |
EAP-Sens: a security architecture for wireless sensor networks. |
WICON |
2008 |
DBLP DOI BibTeX RDF |
GPSK, security, wireless sensor network, WPAN, EAP |
20 | Renwei Ge, Gonzalo R. Arce, Giovanni Di Crescenzo |
Approximate Message Authentication Codes for N-ary Alphabets. |
IEEE Trans. Inf. Forensics Secur. |
2006 |
DBLP DOI BibTeX RDF |
|
20 | John G. Brainard, Ari Juels, Ronald L. Rivest, Michael Szydlo, Moti Yung |
Fourth-factor authentication: somebody you know. |
CCS |
2006 |
DBLP DOI BibTeX RDF |
hardware tokens, vouchers, authentication |
20 | Seong-Pyo Hong, Jong-An Park, Seung Jo Han, Jae-Young Pyun, Joon Lee |
Design of WLAN Secure System Against Weaknesses of the IEEE 802.1x. |
ICHIT |
2006 |
DBLP DOI BibTeX RDF |
IEEE 802.1x, Privacy, Authentication, Wireless LAN Security |
20 | Ari Juels |
Strengthening EPC tags against cloning. |
Workshop on Wireless Security |
2005 |
DBLP DOI BibTeX RDF |
track and trace, authentication, RFID, cloning, EPC, counterfeiting |
20 | Kanako Yokota, Tatsuhiro Yonekura |
A Proposal of COMPASS (COMmunity Portrait Authentication SyStem). |
CW |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Valery I. Korzhik, Guillermo Morales-Luna |
Hybrid authentication based on noisy channels. |
Int. J. Inf. Sec. |
2003 |
DBLP DOI BibTeX RDF |
Key sharing, Information-theoretically secure authentication, Hash functions, Privacy amplification |
20 | Alwyn Goh, Geong Sen Poh, David Ngo Chek Ling |
Loss-Tolerant Stream Authentication via Configurable Integration of One-Time Signatures and Hash-Graphs. |
Communications and Multimedia Security |
2003 |
DBLP DOI BibTeX RDF |
|
20 | Shengli Liu, Yumin Wang |
An Authetnication Scheme over Non-Authentic Public Channel in Information-Theoretic Secret-Key Agreement. |
AAECC |
1999 |
DBLP DOI BibTeX RDF |
|
20 | Douglas R. Stinson |
Universal Hashing and Authentication Codes. |
CRYPTO |
1991 |
DBLP DOI BibTeX RDF |
|
20 | Andrew J. Clark |
Physical Protection of Cryptographic Devices. |
EUROCRYPT |
1987 |
DBLP DOI BibTeX RDF |
|