Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
68 | Maurizio Adriano Strangio |
On the Resilience of Key Agreement Protocols to Key Compromise Impersonation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, Third European PKI Workshop: Theory and Practice, EuroPKI 2006, Turin, Italy, June 19-20, 2006, Proceedings, pp. 233-247, 2006, Springer, 3-540-35151-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
key agreement protocols, key compromise impersonation |
68 | Mark F. Vilardo |
Online Impersonation in Securities Scams. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 2(3), pp. 82-85, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
SEC, Securities and Exchange Commission, digital identity, fraud, impersonation |
58 | Ronald Cramer, Ivan Damgård |
Fast and Secure Immunization Against Adaptive Man-in-the-Middle Impersonation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '97, International Conference on the Theory and Application of Cryptographic Techniques, Konstanz, Germany, May 11-15, 1997, Proceeding, pp. 75-87, 1997, Springer, 3-540-62975-0. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
55 | M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto |
Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings, pp. 105-123, 2009, Springer, 978-3-642-00467-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Group Key Exchange, Insider Attacks, Key Compromise Impersonation |
55 | Reiner Dojen, Vladimir Pasca, Tom Coffey |
Impersonation Attacks on a Mobile Security Protocol for End-to-End Communications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiSec ![In: Security and Privacy in Mobile Information and Communication Systems, First International ICST Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009, Revised Selected Papers, pp. 278-287, 2009, Springer, 978-3-642-04433-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Mobile end-to-end communication, analysis of security protocols, authentication and secrecy protocol, impersonation attack |
50 | Wei-Min Shi |
ID-Based Non-interactive Deniable Authentication Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Fifth International Conference on Information Assurance and Security, IAS 2009, Xi'An, China, 18-20 August 2009, pp. 479-482, 2009, IEEE Computer Society, 978-0-7695-3744-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
47 | Kevser Karaca, Albert Levi |
Towards a framework for security analysis of multiple password schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROSEC ![In: Proceedings of the First European Workshop on System Security, EUROSEC 2008, Glasgow, Scotland, UK, March 31, 2008, pp. 16-21, 2008, ACM, 978-1-60558-119-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
multiple passwords, security analysis, password based authentication, impersonation |
47 | Youngsook Lee, Junghyun Nam, Dongho Won |
Vulnerabilities in a Remote Agent Authentication Scheme Using Smart Cards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES-AMSTA ![In: Agent and Multi-Agent Systems: Technologies and Applications, Second KES International Symposium, KES-AMSTA 2008, Incheon, Korea, March 26-28, 2008. Proceedings, pp. 850-857, 2008, Springer, 978-3-540-78581-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
distributed system, smart card, impersonation attack, authentication scheme |
47 | Eun-Jun Yoon, Kee-Young Yoo |
Improvement of an Efficient User Identification Scheme Based on ID-Based Cryptosystem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC Workshops ![In: Embedded and Ubiquitous Computing - EUC 2005 Workshops, EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Nagasaki, Japan, December 6-9, 2005, Proceedings, pp. 586-591, 2005, Springer, 3-540-30803-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Security, Mobile network, Impersonation attack, Identity-based cryptosystem, User identification |
47 | Claus-Peter Schnorr |
Security of 2^t-Root Identification and Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '96, 16th Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 1996, Proceedings, pp. 143-156, 1996, Springer, 3-540-61512-1. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
Fiat-Shamir scheme, active/passive impersonation attacks, adaptive chosen-message attack, factoring of integers, Identification, signature, random oracle model |
46 | Michael Okun |
On the Power of Impersonation Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DISC ![In: Distributed Computing, 21st International Symposium, DISC 2007, Lemesos, Cyprus, September 24-26, 2007, Proceedings, pp. 494-495, 2007, Springer, 978-3-540-75141-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
46 | Michel Barbeau, Jeyanthi Hall, Evangelos Kranakis |
Detecting Impersonation Attacks in Future Wireless and Mobile Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MADNES ![In: Secure Mobile Ad-hoc Networks and Sensors, First International Workshop, MADNES 2005, Singapore, September 20-22, 2005, Revised Selected Papers, pp. 80-95, 2005, Springer, 3-540-36646-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
46 | Mihir Bellare, Adriana Palacio |
GQ and Schnorr Identification Schemes: Proofs of Security against Impersonation under Active and Concurrent Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2002, 22nd Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 2002, Proceedings, pp. 162-177, 2002, Springer, 3-540-44050-X. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
42 | Michele Campobasso, Luca Allodi |
Impersonation-as-a-Service: Characterizing the Emerging Criminal Infrastructure for User Impersonation at Scale. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2009.04344, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
42 | Michele Campobasso, Luca Allodi |
Impersonation-as-a-Service: Characterizing the Emerging Criminal Infrastructure for User Impersonation at Scale. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, USA, November 9-13, 2020, pp. 1665-1680, 2020, ACM, 978-1-4503-7089-9. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
37 | Boris Danev, Heinrich Luecken, Srdjan Capkun, Karim M. El Defrawy |
Attacks on physical-layer identification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Third ACM Conference on Wireless Network Security, WISEC 2010, Hoboken, New Jersey, USA, March 22-24, 2010, pp. 89-98, 2010, ACM, 978-1-60558-923-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
identification, attacks, wireless security, physical layer |
37 | Giovanni Di Crescenzo |
On the Security of Beth's Identification Schemes against Active and Concurrent Adversaries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMICS ![In: Mathematical Methods in Computer Science, MMICS 2008, Karlsruhe, Germany, December 17-19, 2008 - Essays in Memory of Thomas Beth, pp. 1-17, 2008, Springer, 978-3-540-89993-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
37 | Soohyun Oh, Jin Kwak, Seungwoo Lee, Dongho Won |
Security Analysis and Applications of Standard Key Agreement Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (2) ![In: Computational Science and Its Applications - ICCSA 2003, International Conference, Montreal, Canada, May 18-21, 2003, Proceedings, Part II, pp. 191-200, 2003, Springer, 3-540-40161-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
35 | Youngsook Lee, Dongho Won |
Enhancing of a Password-Based Authentication Scheme Using Smart Cards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OTM Conferences (2) ![In: On the Move to Meaningful Internet Systems: OTM 2009, Confederated International Conferences, CoopIS, DOA, IS, and ODBASE 2009, Vilamoura, Portugal, November 1-6, 2009, Proceedings, Part II, pp. 879-886, 2009, Springer, 978-3-642-05150-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
two-factor security, smart card, dictionary attack, impersonation attack, Authentication scheme |
35 | Youngsook Lee, Dongho Won |
Security Vulnerabilities of a Remote User Authentication Scheme Using Smart Cards Suited for a Multi-server Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (2) ![In: Computational Science and Its Applications - ICCSA 2009, International Conference, Seoul, Korea, June 29-July 2, 2009, Proceedings, Part II, pp. 164-172, 2009, Springer, 978-3-642-02456-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
multi-server environments, remote user authentication scheme, smart card, impersonation attack, password security, password guessing attack |
35 | Ivan Martinovic, Frank A. Zdarsky, Matthias Wilhelm 0001, Christian Wegmann, Jens B. Schmitt |
Wireless client puzzles in IEEE 802.11 networks: security by wireless. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the First ACM Conference on Wireless Network Security, WISEC 2008, Alexandria, VA, USA, March 31 - April 02, 2008, pp. 36-45, 2008, ACM, 978-1-59593-814-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
denial-of-service (DoS), wireless security, impersonation attacks, client puzzles |
35 | Konstantinos Chalkias, Spyros T. Halkidis, Dimitrios Hristu-Varsakelis, George Stephanides, Anastasios Alexiadis |
A Provably Secure One-Pass Two-Party Key Establishment Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology, Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers, pp. 108-122, 2007, Springer, 978-3-540-79498-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
One-pass protocols, two-party key agreement, loss of information, key-compromise impersonation |
35 | Eun-Jun Yoon, Kee-Young Yoo |
Improving the ID-Based Key Exchange Protocol in Wireless Mobile Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ADHOC-NOW ![In: Ad-Hoc, Mobile, and Wireless Networks, 5th International Conference, ADHOC-NOW 2006, Ottawa, Canada, August 17-19, 2006, Proceedings, pp. 349-354, 2006, Springer, 3-540-37246-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Wireless mobile, Ad hoc networks, Cryptography, Network security, Key exchange, ID-based, Impersonation attack |
35 | Ik Rae Jeong, Jeong Ok Kwon, Dong Hoon Lee 0001 |
A Diffie-Hellman Key Exchange Protocol Without Random Oracles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 5th International Conference, CANS 2006, Suzhou, China, December 8-10, 2006, Proceedings, pp. 37-54, 2006, Springer, 3-540-49462-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Diffie-Hellman protocol, Strong forward secrecy, Unknown key share, Key exchange, Key compromise impersonation |
33 | Mete Akgün, M. Ufuk Çaglayan, Emin Anarim |
A new RFID authentication protocol with resistance to server impersonation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPDPS ![In: 23rd IEEE International Symposium on Parallel and Distributed Processing, IPDPS 2009, Rome, Italy, May 23-29, 2009, pp. 1-8, 2009, IEEE. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
33 | Xavier Boyen |
HPAKE : Password Authentication Secure against Cross-Site User Impersonation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 8th International Conference, CANS 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings, pp. 279-298, 2009, Springer, 978-3-642-10432-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
33 | Bartlomiej Sieka |
Using Radio Device Fingerprinting for the Detection of Impersonation and Sybil Attacks in Wireless Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESAS ![In: Security and Privacy in Ad-Hoc and Sensor Networks, Third European Workshop, ESAS 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers, pp. 179-192, 2006, Springer, 978-3-540-69172-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Dimitris Glynos, Panayiotis Kotzanikolaou, Christos Douligeris |
Preventing Impersonation Attacks in MANET with Multi-Factor Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WiOpt ![In: 3rd International Symposium on Modeling and Optimization in Mobile, Ad-Hoc and Wireless Networks (WiOpt 2005), 4-6 April 2005, Trentino, Italy, pp. 59-64, 2005, IEEE Computer Society, 0-7695-2267-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
33 | Lihua Wang 0001, Takeshi Okamoto, Tsuyoshi Takagi, Eiji Okamoto |
Insider Impersonation-MIM Attack to Tripartite Key Agreement Scheme and an Efficient Protocol for Multiple Keys. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS (2) ![In: Computational Intelligence and Security, International Conference, CIS 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part II, pp. 198-203, 2005, Springer, 3-540-30819-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
25 | Yanping Li, Liaojun Pang, Yuming Wang |
Attacks on a Universal Designated Verifier Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Fifth International Conference on Information Assurance and Security, IAS 2009, Xi'An, China, 18-20 August 2009, pp. 27-30, 2009, IEEE Computer Society, 978-0-7695-3744-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
25 | Wenting Jin, Jing Xu 0002 |
An Efficient and Provably Secure Cross-Realm Client-to-Client Password-Authenticated Key Agreement Protocol with Smart Cards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 8th International Conference, CANS 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings, pp. 299-314, 2009, Springer, 978-3-642-10432-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Password-authenticated key agreement, Client-to-client, Smart cards, Provable security, Cross-realm |
25 | Shaoying Cai, Yingjiu Li, Tieyan Li, Robert H. Deng |
Attacks and improvements to an RIFD mutual authentication protocol and its extensions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Second ACM Conference on Wireless Network Security, WISEC 2009, Zurich, Switzerland, March 16-19, 2009, pp. 51-58, 2009, ACM, 978-1-60558-460-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
security, privacy, authentication, rfid |
25 | Alfred Menezes, Berkant Ustaoglu |
Security arguments for the UM key agreement protocol in the NIST SP 800-56A standard. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2008, Tokyo, Japan, March 18-20, 2008, pp. 261-270, 2008, ACM, 978-1-59593-979-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
NIST SP 800-56A, provable security, security models, key agreement protocols |
25 | Hyun Seok Kim, Seok Seo, Jin-Young Choi |
Weaknesses Analysis and Countermeasure of a Verifier-Based Key Agreement Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HPCC ![In: 10th IEEE International Conference on High Performance Computing and Communications, HPCC 2008, 25-27 Sept. 2008, Dalian, China, pp. 1015-1018, 2008, IEEE Computer Society, 978-0-7695-3352-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Meng-Hui Lim, Sanggon Lee, Hoonjae Lee 0001 |
Cryptanalytic Flaws in Oh et al.'s ID-Based Authenticated Key Agreement Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (2) ![In: Computational Science and Its Applications - ICCSA 2008, International Conference, Perugia, Italy, June 30 - July 3, 2008, Proceedings, Part II, pp. 458-467, 2008, Springer, 978-3-540-69840-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Davrondzhon Gafurov, Einar Snekkenes, Patrick Bours |
Spoof Attacks on Gait Authentication System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 2(3-2), pp. 491-502, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Oleksiy Mazhelis, Seppo Puuronen, Mika Raento |
Evaluating Classifiers for Mobile-Masquerader Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Security and Privacy in Dynamic Environments, Proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22-24 May 2006, Karlstad, Sweden, pp. 271-283, 2006, Springer, 0-387-33405-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Wenbo Shi, Hyeong Seon Yoo |
Efficient Nonce-Based Authentication Scheme Using Token-Update. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (3) ![In: Computational Science and Its Applications - ICCSA 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part III, pp. 213-221, 2006, Springer, 3-540-34075-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Yukio Itakura, Shigeo Tsujii |
Proposal on a multifactor biometric authentication method based on cryptosystem keys containing biometric signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 4(4), pp. 288-296, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Biological information, Authentication security, Biometrics-cryptographic key, Public-key cryptography, Personal identification |
25 | Eun-Jun Yoon, Kee-Young Yoo |
A New Efficient Fingerprint-Based Remote User Authentication Scheme for Multimedia Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES (3) ![In: Knowledge-Based Intelligent Information and Engineering Systems, 9th International Conference, KES 2005, Melbourne, Australia, September 14-16, 2005, Proceedings, Part III, pp. 332-338, 2005, Springer, 3-540-28896-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Security techniques, Multimedia, Biometrics, Smart card, User authentication, Fingerprint verification |
25 | Kaoru Kurosawa, Swee-Huay Heng |
Identity-Based Identification Without Random Oracles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (2) ![In: Computational Science and Its Applications - ICCSA 2005, International Conference, Singapore, May 9-12, 2005, Proceedings, Part II, pp. 603-613, 2005, Springer, 3-540-25861-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
ID-based cryptography, identification scheme |
25 | Goce Jakimoski |
Unconditionally Secure Information Authentication in Presence of Erasures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMACC ![In: Cryptography and Coding, 10th IMA International Conference, Cirencester, UK, December 19-21, 2005, Proceedings, pp. 304-321, 2005, Springer, 3-540-30276-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
erasure- resilient codes, erasure-tolerant authentication, message authentication, authentication codes |
25 | Shengbao Wang, Zhenfu Cao, Haiyong Bao |
Security of an Efficient ID-Based Authenticated Key Agreement Protocol from Pairings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPA Workshops ![In: Parallel and Distributed Processing and Applications - ISPA 2005 Workshops, ISPA 2005 International Workshops AEPP, ASTD, BIOS, GCIC, IADS, MASN, SGCA, and WISA, Nanjing, China, November 2-5, 2005, Proceedings, pp. 342-349, 2005, Springer, 3-540-29770-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
25 | Eun-Jun Yoon, Kee-Young Yoo |
New Authentication Scheme Based on a One-Way Hash Function and Diffie-Hellman Key Exchange. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 4th International Conference, CANS 2005, Xiamen, China, December 14-16, 2005, Proceedings, pp. 147-160, 2005, Springer, 3-540-30849-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Authentication, Smart card, Password, Guessing attack |
25 | Xinghua Li 0001, Jianfeng Ma 0001, Sang-Jae Moon |
On the Security of the Canetti-Krawczyk Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS (2) ![In: Computational Intelligence and Security, International Conference, CIS 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part II, pp. 356-363, 2005, Springer, 3-540-30819-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
25 | Bi-Hui Chen |
Improvement of authenaticated multiple-key agreement protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGOPS Oper. Syst. Rev. ![In: ACM SIGOPS Oper. Syst. Rev. 38(3), pp. 35-41, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
multiple-key, authenticated, key agreement |
25 | Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo |
Robust Remote User Authentication Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICOIN ![In: Information Networking, Networking Technologies for Broadband and Mobile Networks, International Conference ICOIN 2004, Busan, Korea, February 18-20, 2004, Revised Selected Papers, pp. 935-942, 2004, Springer, 3-540-23034-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
25 | Yvo Desmedt, Moti Yung |
Abritrated Unconditionally Secure Authentication Can Be Unconditionally Protected Against Arbiter's Attacks (Extended Abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '90, 10th Annual International Cryptology Conference, Santa Barbara, California, USA, August 11-15, 1990, Proceedings, pp. 177-188, 1990, Springer, 3-540-54508-5. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
25 | Andrea Sgarro |
Informational Divergence Bounds for Authentication Codes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '89, Workshop on the Theory and Application of of Cryptographic Techniques, Houthalen, Belgium, April 10-13, 1989, Proceedings, pp. 93-101, 1989, Springer, 3-540-53433-4. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
22 | Raphael C.-W. Phan, Wei-Chuen Yau, Bok-Min Goi |
Analysis of Two Pairing-Based Three-Party Password Authenticated Key Exchange Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Third International Conference on Network and System Security, NSS 2009, Gold Coast, Queensland, Australia, October 19-21, 2009, pp. 102-106, 2009, IEEE Computer Society, 978-0-7695-3838-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
three-party, cryptanalysis, provable security, attacks, Weil pairing, Password-authenticated key exchange, key compromise impersonation |
22 | Akiko Orita, Hisakazu Hada |
Is that really you?: an approach to assure identity without revealing real-name online. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 5th Workshop on Digital Identity Management, Chicago, Illinois, USA, November 13, 2009, pp. 17-20, 2009, ACM, 978-1-60558-786-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
anonymity, identity, twitter, identity theft, linkability, impersonation |
22 | Hung-Yu Chien, Tzong-Chen Wu |
Highly Efficient Password-Based Three-Party Key Exchange in Random Oracle Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI Workshops ![In: Intelligence and Security Informatics, IEEE ISI 2008 International Workshops: PAISI, PACCF, and SOCO 2008, Taipei, Taiwan, June 17, 2008. Proceedings, pp. 69-76, 2008, Springer, 978-3-540-69136-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
authentication, key agreement, random oracle, impersonation attack, guessing attack |
22 | David R. Hill |
Speaker Classification Concepts: Past, Present and Future. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Speaker Classification (1) ![In: Speaker Classification I: Fundamentals, Features, and Methods, pp. 21-46, 2007, Springer, 978-3-540-74186-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
voice morphing, socio-phonetics, speech forensics, speech research tools, speech segments, speech prosody, formant sensitivity analysis, dialogue dynamics, gnuspeech, face recognition, rhythm, emotional intelligence, intonation, speaker classification, mimicry, impersonation |
22 | Ivan Martinovic, Frank A. Zdarsky, Jens B. Schmitt |
Regional-based authentication against dos attacks in wireless networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Q2SWinet ![In: Q2SWinet'07 - Proceedings of the Third ACM Workshop on Q2S and Security for Wireless and Mobile Networks, Chania, Crete Island, Greece, October 22, 2007, pp. 176-179, 2007, ACM, 978-1-59593-806-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
denial-of-service (DoS) attacks, wireless LAN, impersonation attacks |
22 | Haifeng Qian, Zhenfu Cao, Lichen Wang, Qingshui Xue |
Efficient Non-interactive Deniable Authentication Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIT ![In: Fifth International Conference on Computer and Information Technology (CIT 2005), 21-23 September 2005, Shanghai, China, pp. 673-679, 2005, IEEE Computer Society, 0-7695-2432-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Tight security, Authentication, Digital signature, MAC, Deniablity, Impersonation attack, Trapdoor permutations |
22 | Kyungah Shim |
The Risks of Compromising Secret Information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 4th International Conference, ICICS 2002, Singapore, December 9-12, 2002, Proceedings, pp. 122-133, 2002, Springer, 3-540-00164-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Authenticated key agreement protocol, insider, known-key attack, key-compromise impersonation attack |
21 | Fengfan Zhou, Heifei Ling |
PPR: Enhancing Dodging Attacks while Maintaining Impersonation Attacks on Face Recognition Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2401.08903, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
21 | Ahmed Elshafee, Walid El-Shafai |
Design and analysis of data link impersonation attack for wired LAN application layer services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Ambient Intell. Humaniz. Comput. ![In: J. Ambient Intell. Humaniz. Comput. 14(10), pp. 13465-13488, October 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Roberto Gallardo-Cava, David Ortega-delCampo, Julio Guillen-Garcia, Daniel Palacios-Alonso, Cristina Conde |
Creating Realistic Presentation Attacks for Facial Impersonation Step-by-Step. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 11, pp. 109257-109266, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Alok Kumar Shukla |
Detecting impersonation episode using teaching learning-based optimization and support vector machine techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Expert Syst. J. Knowl. Eng. ![In: Expert Syst. J. Knowl. Eng. 40(7), August 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Nmachi Peace Wosah |
A framework for securing email entrances and mitigating phishing impersonation attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2312.04100, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Leonard Salewski, Stephan Alaniz, Isabel Rio-Torto, Eric Schulz, Zeynep Akata |
In-Context Impersonation Reveals Large Language Models' Strengths and Biases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2305.14930, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Michele Campobasso, Luca Allodi |
Know Your Cybercriminal: Evaluating Attacker Preferences by Measuring Profile Sales on an Active, Leading Criminal Market for User Impersonation at Scale. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2303.03249, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Zhanwen Chen, Kazumasa Omote |
Preventing SNS Impersonation: A Blockchain-Based Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Inf. Syst. ![In: IEICE Trans. Inf. Syst. 106(9), pp. 1354-1363, September 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Rajeev Rajan, Noumida Abdul Kareem, Sreelakshmi S |
Paraconsistent Feature Analysis for the Competency Evaluation of Voice Impersonation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASRU ![In: IEEE Automatic Speech Recognition and Understanding Workshop, ASRU 2023, Taipei, Taiwan, December 16-20, 2023, pp. 1-7, 2023, IEEE, 979-8-3503-0689-7. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Manuel Barbosa, André Cirne, Luís Esquível |
Rogue key and impersonation attacks on FIDO2: From theory to practice. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 18th International Conference on Availability, Reliability and Security, ARES 2023, Benevento, Italy, 29 August 2023- 1 September 2023, pp. 14:1-14:11, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Giovanni Graziano, Daniele Ucci, Federica Bisio, Luca Oneto |
PhishVision: A Deep Learning Based Visual Brand Impersonation Detector for Identifying Phishing Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OL2A (1) ![In: Optimization, Learning Algorithms and Applications - Third International Conference, OL2A 2023, Ponta Delgada, Portugal, September 27-29, 2023, Revised Selected Papers, Part I, pp. 123-134, 2023, Springer, 978-3-031-53024-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Michele Campobasso, Luca Allodi |
Know Your Cybercriminal: Evaluating Attacker Preferences by Measuring Profile Sales on an Active, Leading Criminal Market for User Impersonation at Scale. ![Search on Bibsonomy](Pics/bibsonomy.png) |
USENIX Security Symposium ![In: 32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023, pp. 553-570, 2023, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
21 | Rajaa Alqudah, Mohammed Al-Qaisi, Rakan Ammari, Yazan Abu Ta'a |
OSINT-Based Tool for Social Media User Impersonation Detection Through Machine Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIT ![In: International Conference on Information Technology, ICIT 2023, Amman, Jordan, August 9-10, 2023, pp. 752-757, 2023, IEEE, 979-8-3503-2006-0. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Leonard Salewski, Stephan Alaniz, Isabel Rio-Torto, Eric Schulz, Zeynep Akata |
In-Context Impersonation Reveals Large Language Models' Strengths and Biases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NeurIPS ![In: Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, NeurIPS 2023, New Orleans, LA, USA, December 10 - 16, 2023., 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
21 | Victor Adriel de Jesus Oliveira, Gernot Rottermanner, Magdalena Boucher, Stefanie Größbacher, Peter Judmaier, Werner Bailer, Georg Thallinger, Thomas Kurz, Jakob Frank, Christoph Bauer, Gabriele Fröschl, Michael Batlogg |
Taylor - Impersonation of AI for Audiovisual Content Documentation and Search. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM (2) ![In: MultiMedia Modeling - 29th International Conference, MMM 2023, Bergen, Norway, January 9-12, 2023, Proceedings, Part II, pp. 751-757, 2023, Springer, 978-3-031-27817-4. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Zhanwen Chen, Jiageng Chen, Weizhi Meng 0001 |
Threshold identity authentication signature: Impersonation prevention in social network services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Concurr. Comput. Pract. Exp. ![In: Concurr. Comput. Pract. Exp. 34(16), 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Nam Yul Yu |
Performance Analysis of Signature-Based Grant-Free Random Access Under Impersonation Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 10, pp. 72925-72935, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Wenbin Huang, Wenjuan Tang, Hongbo Jiang 0001, Jun Luo 0001, Yaoxue Zhang |
Stop Deceiving! An Effective Defense Scheme Against Voice Impersonation Attacks on Smart Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Things J. ![In: IEEE Internet Things J. 9(7), pp. 5304-5314, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Yanrong Lu, Dawei Zhao |
Providing impersonation resistance for biometric-based authentication scheme in mobile cloud computing service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Commun. ![In: Comput. Commun. 182, pp. 22-30, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Huimin Ren, Suhyun Kim, Daehee Seo, Imyeong Lee |
A Certificateless-based One-Round Authenticated Group Key Agreement Protocol to Prevent Impersonation Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KSII Trans. Internet Inf. Syst. ![In: KSII Trans. Internet Inf. Syst. 16(5), pp. 1687-1707, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Xiaoliang Liu, Furao Shen, Jian Zhao 0013, Changhai Nie |
RSTAM: An Effective Black-Box Impersonation Attack on Face Recognition using a Mobile and Compact Printer. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2206.12590, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Xin Na, Xiuzhen Guo, Yuan He 0004, Rui Xi |
Wi-attack: Cross-technology Impersonation Attack against iBeacon Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2209.15322, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Paul Zanna, Dinesh Kumar, Pj Radcliffe |
Detecting IEEE 802.11 Client Device Impersonation on a Wireless Access Point. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Commun. Inf. Networks ![In: J. Commun. Inf. Networks 7(4), pp. 408-420, December 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Gabriel Mariano de Castro SIlva, Jaime Simão Sichman |
Impersonation fraud detection on building access control systems: An approach based on anomalous social and spatio-temporal behaviors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Appl. Soft Comput. ![In: Appl. Soft Comput. 118, pp. 108310, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Anne Bumiller, Olivier Barais, Nicolas Aillery, Gaël Le Lan |
Towards a Better Understanding of Impersonation Risks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: 15th International Conference on Security of Information and Networks, SIN 2022, Sousse, Tunisia, November 11-13, 2022, pp. 1-8, 2022, IEEE, 978-1-6654-5465-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Aiming Wu, Shanshan Tu, Junwei Liu, Yihe Zhang, Yongjie Yang 0007, Xuetao Bai |
Detection Scheme of Impersonation Attack Based on Sarsa(Lambda) Algorithm in Fog Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCNS ![In: Proceedings of the 12th International Conference on Communication and Network Security, ICCNS 2022, Beijing, China, December 1-3, 2022, pp. 16-22, 2022, ACM, 978-1-4503-9752-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Shahroz Tariq, Sowon Jeon, Simon S. Woo |
Am I a Real or Fake Celebrity? Evaluating Face Recognition and Verification APIs under Deepfake Impersonation Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: WWW '22: The ACM Web Conference 2022, Virtual Event, Lyon, France, April 25 - 29, 2022, pp. 512-523, 2022, ACM, 978-1-4503-9096-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Yuxuan Xu, Ming Liu 0010, Linning Peng, Junqing Zhang, Yawen Zheng |
Colluding RF Fingerprint Impersonation Attack Based on Generative Adversarial Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: IEEE International Conference on Communications, ICC 2022, Seoul, Korea, May 16-20, 2022, pp. 3220-3225, 2022, IEEE, 978-1-5386-8347-7. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Zhiqiang Ma, Jun He |
Outsider Key Compromise Impersonation Attack on a Multi-factor Authenticated Key Exchange Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS Workshops ![In: Applied Cryptography and Network Security Workshops - ACNS 2022 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Rome, Italy, June 20-23, 2022, Proceedings, pp. 320-337, 2022, Springer, 978-3-031-16814-7. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Dinh Duc Nha Nguyen, Keshav Sood, Yong Xiang 0001, Longxiang Gao, Lianhua Chi |
Impersonation Attack Detection in IoT Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GLOBECOM ![In: IEEE Global Communications Conference, GLOBECOM 2022, Rio de Janeiro, Brazil, December 4-8, 2022, pp. 6061-6066, 2022, IEEE, 978-1-6654-3540-6. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Jack Sturgess, Simon Eberz, Ivo Sluganovic, Ivan Martinovic |
Inferring User Height and Improving Impersonation Attacks in Mobile Payments using a Smartwatch. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PerCom Workshops ![In: 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, PerCom 2022 Workshops, Pisa, Italy, March 21-25, 2022, pp. 775-780, 2022, IEEE, 978-1-6654-1647-4. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Chatri Chuangulueam, Boonserm Kijsirikul, Nuttakorn Thubthong |
Voice Impersonation for Thai Speech Using CycleGAN over Prosody. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MSIE ![In: MSIE 2022: 4th International Conference on Management Science and Industrial Engineering, Chiang Mai Thailand, April 28 - 30, 2022, pp. 443-447, 2022, ACM, 978-1-4503-9581-6. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Felipe Boeira, Mikael Asplund, Marinho P. Barcellos |
No Doppelgänger: Advancing Mobile Networks Against Impersonation in Adversarial Scenarios. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022, pp. 280-281, 2022, ACM, 978-1-4503-9216-7. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Shanshan Tu, Muhammad Waqas 0001, Sadaqat ur Rehman, Talha Mir, Ghulam Abbas 0002, Ziaul Haq Abbas, Zahid Halim, Iftekhar Ahmad |
Reinforcement Learning Assisted Impersonation Attack Detection in Device-to-Device Communications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Veh. Technol. ![In: IEEE Trans. Veh. Technol. 70(2), pp. 1474-1479, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Wei Guo, Benedetta Tondi, Mauro Barni |
A Master Key backdoor for universal impersonation attack against DNN-based face verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Pattern Recognit. Lett. ![In: Pattern Recognit. Lett. 144, pp. 61-67, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Inam ul Haq, Jian Wang 0038, Youwen Zhu, Saad Maqbool |
An efficient hash-based authenticated key agreement scheme for multi-server architecture resilient to key compromise impersonation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digit. Commun. Networks ![In: Digit. Commun. Networks 7(1), pp. 140-150, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Ting Chen, Xinghua Li 0001, Qingfeng Cheng |
An enhanced key exchange protocol exhibiting key compromise impersonation attacks resistance in mobile commerce environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sci. China Inf. Sci. ![In: Sci. China Inf. Sci. 64(9), 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Wei Guo, Benedetta Tondi, Mauro Barni |
A Master Key Backdoor for Universal Impersonation Attack against DNN-based Face Verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2105.00249, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
21 | Shahroz Tariq, Sowon Jeon, Simon S. Woo |
Am I a Real or Fake Celebrity? Measuring Commercial Face Recognition Web APIs under Deepfake Impersonation Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2103.00847, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
21 | Hisham A. Kholidy |
Detecting impersonation attacks in cloud computing environments using a centric user profiling approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Future Gener. Comput. Syst. ![In: Future Gener. Comput. Syst. 117, pp. 299-320, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Osnat Mokryn, Hagit Ben-Shoshan |
Domain-based Latent Personal Analysis and its use for impersonation detection in social media. ![Search on Bibsonomy](Pics/bibsonomy.png) |
User Model. User Adapt. Interact. ![In: User Model. User Adapt. Interact. 31(4), pp. 785-828, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Taotao Li, Zhen Hong, Lisong Liu, Zhenyu Wen, Li Yu 0001 |
Meta-WF: Meta-Learning-Based Few-Shot Wireless Impersonation Detection for Wi-Fi Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Commun. Lett. ![In: IEEE Commun. Lett. 25(11), pp. 3585-3589, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Md. Morshedul Islam, Reihaneh Safavi-Naini |
Model Inversion for Impersonation in Behavioral Authentication Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECRYPT ![In: Proceedings of the 18th International Conference on Security and Cryptography, SECRYPT 2021, July 6-8, 2021., pp. 271-282, 2021, SCITEPRESS, 978-989-758-524-1. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Xin Na, Xiuzhen Guo, Yuan He 0004, Rui Xi |
Wi-attack: Cross-technology Impersonation Attack against iBeacon Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECON ![In: 18th Annual IEEE International Conference on Sensing, Communication, and Networking, SECON 2021, Rome, Italy, July 6-9, 2021, pp. 1-9, 2021, IEEE, 978-1-6654-4108-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|