|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 8079 occurrences of 2235 keywords
|
|
|
Results
Found 25398 publication records. Showing 25398 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
39 | Dieter Gollmann |
What do We Mean by Entity Authentication? |
S&P |
1996 |
DBLP DOI BibTeX RDF |
authentication protocol design, message passing protocols, high-level objectives, protocol specification abstraction level, cryptographic function, formal specification, cryptography, protocols, message passing, encryption, communication protocols, message authentication, entity authentication |
37 | Ying-Hong Wang, Ching-Lin Wang, Cheng-Horng Liao |
Mobile Agent Protection and Verification in the Internet Environment. |
CIT |
2004 |
DBLP DOI BibTeX RDF |
AUthentication Mechanism, Verification Mechanism, Agent, Mobile Agent, Electronic Commerce |
37 | Hung-Yu Chien |
SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity. |
IEEE Trans. Dependable Secur. Comput. |
2007 |
DBLP DOI BibTeX RDF |
Authentication, Access controls, Security and Privacy Protection, Cryptographic controls |
37 | Nathanael Thompson, Petros Zerfos, Haiyun Luo, Jatinder Pal Singh, Zuoning Yin |
Authentication on the edge: distributed authentication for a global open wi-fi network. |
MobiCom |
2007 |
DBLP DOI BibTeX RDF |
EAP-AGE, social network, authentication, Wi-Fi networks |
37 | William D. Neumann |
HORSE: An Extension of an r-Time Signature Scheme With Fast Signing and Verification. |
ITCC (1) |
2004 |
DBLP DOI BibTeX RDF |
r-time signatures, low power authentication, ad hoc wireless networks, hash chains, broadcast authentication |
37 | Farid G. Hatefi, Forouzan Golshani, Gamze Seckin |
Prospects of Secure Real-Time Video Transmission over CDPD Networks. |
Infrastructure for Mobile and Wireless Systems |
2001 |
DBLP DOI BibTeX RDF |
Real-time video streaming, low-bit rate transmission, bilateral authentication, certificate based authentication, mobile end systems, mobile intermediate systems, wireless communication |
37 | Massimo Tistarelli, Josef Bigün, Anil K. Jain 0001 (eds.) |
Biometric Authentication, International ECCV 2002 Workshop Copenhagen, Denmark, June 1, 2002, Proceedings |
Biometric Authentication |
2002 |
DBLP DOI BibTeX RDF |
|
37 | Modesto Castrillón Santana, Javier Lorenzo-Navarro, Jorge Cabrera-Gámez 0001, Mario Hernández-Tejera, J. Méndez Rodríguez |
Detection of Frontal Faces in Video Streams. |
Biometric Authentication |
2002 |
DBLP DOI BibTeX RDF |
|
37 | Masato Kawamoto, Takayuki Hamamoto, Seiichiro Hangai |
Improvement of On-line Signature Verification System Robust to Intersession Variability. |
Biometric Authentication |
2002 |
DBLP DOI BibTeX RDF |
|
37 | Joaquin Gonzalez-Rodriguez, Julian Fiérrez-Aguilar, Javier Ortega-Garcia, Jose Juan Lucena-Molina |
Biometric Identification in Forensic Cases According to the Bayesian Approach. |
Biometric Authentication |
2002 |
DBLP DOI BibTeX RDF |
|
37 | Raffaele Cappelli, Dario Maio, Davide Maltoni |
Subspace Classification for Face Recognition. |
Biometric Authentication |
2002 |
DBLP DOI BibTeX RDF |
|
37 | Klaus J. Kirchberg, Oliver Jesorsky, Robert Frischholz |
Genetic Model Optimization for Hausdorff Distance-Based Face Localization. |
Biometric Authentication |
2002 |
DBLP DOI BibTeX RDF |
|
37 | Kenneth Nilsson, Josef Bigün |
Complex Filters Applied to Fingerprint Images Detecting Prominent Symmetry Points Used for Alignment. |
Biometric Authentication |
2002 |
DBLP DOI BibTeX RDF |
|
37 | Juneho Yi, Jongsun Kim, Jongmoo Choi, JungHyun Han, Eunseok Lee 0001 |
Face Recognition Based on ICA Combined with FLD. |
Biometric Authentication |
2002 |
DBLP DOI BibTeX RDF |
|
37 | Hichem Sahbi, Nozha Boujemaa |
Robust Face Recognition Using Dynamic Space Warping. |
Biometric Authentication |
2002 |
DBLP DOI BibTeX RDF |
|
37 | Gian Luca Marcialis, Fabio Roli |
Fusion of LDA and PCA for Face Verification. |
Biometric Authentication |
2002 |
DBLP DOI BibTeX RDF |
|
37 | Arun Ross, James Reisman, Anil K. Jain 0001 |
Fingerprint Matching Using Feature Space Correlation. |
Biometric Authentication |
2002 |
DBLP DOI BibTeX RDF |
|
37 | L. Lee, W. Eric L. Grimson |
Gait Appearance for Recognition. |
Biometric Authentication |
2002 |
DBLP DOI BibTeX RDF |
|
37 | Hichem Sahbi, Nozha Boujemaa |
Coarse to Fine Face Detection Based on Skin Color Adaption. |
Biometric Authentication |
2002 |
DBLP DOI BibTeX RDF |
|
37 | Oscar Déniz, Modesto Castrillón Santana, Javier Lorenzo 0001, Mario Hernández |
An Incremental Learning Algorithm for Face Recognition. |
Biometric Authentication |
2002 |
DBLP DOI BibTeX RDF |
|
37 | Carlos E. Thomaz, Duncan Fyfe Gillies, Raul Queiroz Feitosa |
A New Quadratic Classifier Applied to Biometric Recognition. |
Biometric Authentication |
2002 |
DBLP DOI BibTeX RDF |
|
37 | Chiraz BenAbdelkader, Ross Cutler, Larry S. Davis |
View-invariant Estimation of Height and Stride for Gait Recognition. |
Biometric Authentication |
2002 |
DBLP DOI BibTeX RDF |
|
35 | Zhongying Niu, Ke Zhou 0001, Hong Jiang 0001, Tianming Yang, Wei Yan |
Identification and Authentication in Large-Scale Storage Systems. |
NAS |
2009 |
DBLP DOI BibTeX RDF |
|
35 | Levente Buttyán, László Dóra |
An authentication scheme for QoS-aware multi-operator maintained wireless mesh networks. |
WOWMOM |
2009 |
DBLP DOI BibTeX RDF |
|
35 | Mei Song, Li Wang 0039, Jianwen Huang, Junde Song |
An optimal interworking authentication scheme based on EAP-AKA for heterogeneous access networks. |
CCECE |
2009 |
DBLP DOI BibTeX RDF |
|
35 | Zhexuan Song, Seigo Kotani, Ryusuke Masuoka |
Building an Independent Integrated Authentication Service. |
ICYCS |
2008 |
DBLP DOI BibTeX RDF |
|
35 | Zhishou Zhang, Qibin Sun, Wai-Choong Wong, John G. Apostolopoulos, Susie J. Wee |
Rate-Distortion-Authentication Optimized Streaming of Authenticated Video. |
IEEE Trans. Circuits Syst. Video Technol. |
2007 |
DBLP DOI BibTeX RDF |
|
35 | Brahim Gaabab, David Binet, Jean-Marie Bonnin |
Authentication Optimization for Seamless Handovers. |
Integrated Network Management |
2007 |
DBLP DOI BibTeX RDF |
|
35 | B. Sathish Babu, Pallapa Venkataram |
Transaction Based Authentication Scheme for Mobile Communication: A Cognitive Agent Based Approach. |
IPDPS |
2007 |
DBLP DOI BibTeX RDF |
|
35 | Men Long, Chwan-Hwa John Wu |
Energy-efficient and intrusion-resilient authentication for ubiquitous access to factory floor information. |
IEEE Trans. Ind. Informatics |
2006 |
DBLP DOI BibTeX RDF |
|
35 | He Zheng, Jin Kwak, Kyungho Son, Wansuk Lee, Seungjoo Kim, Dongho Won |
Confidence Value Based Multi Levels of Authentication for Ubiquitous Computing Environments. |
ICCSA (2) |
2006 |
DBLP DOI BibTeX RDF |
|
35 | Daesung Lee 0001, Ki-Chang Kim, Year Back Yoo |
IPBio: Embedding Biometric Data in IP Header for Per-Packet Authentication. |
ISPA Workshops |
2006 |
DBLP DOI BibTeX RDF |
|
35 | Insu Kim, Keecheon Kim |
Design of Authentication Mechanism Using PANA CTP in FMIPv6 Environment. |
ISPA Workshops |
2006 |
DBLP DOI BibTeX RDF |
|
35 | YeongGeun Choe, Soon-Ja Kim |
Secure Password Authentication for Keystroke Dynamics. |
KES (3) |
2005 |
DBLP DOI BibTeX RDF |
|
35 | C. K. Wong, Agnes Chan |
Immediate Data Authentication for Multicast in Resource Constrained Network. |
ACISP |
2005 |
DBLP DOI BibTeX RDF |
|
35 | Kanako Yokota, Tatsuhiro Yonekura |
A Proposal of COMPASS (COMmunity Portrait Authentication SyStem). |
CW |
2005 |
DBLP DOI BibTeX RDF |
|
35 | Hae Yong Kim, Amir Afif |
Secure Authentication Watermarking for Binary Images. |
SIBGRAPI |
2003 |
DBLP DOI BibTeX RDF |
|
35 | Cástor Mariño, Manuel G. Penedo, María J. Carreira, F. González |
Retinal Angiography Based Authentication. |
CIARP |
2003 |
DBLP DOI BibTeX RDF |
|
35 | Reouven Elbaz, David Champagne, Catherine H. Gebotys, Ruby B. Lee, Nachiketh R. Potlapally, Lionel Torres |
Hardware Mechanisms for Memory Authentication: A Survey of Existing Techniques and Engines. |
Trans. Comput. Sci. |
2009 |
DBLP DOI BibTeX RDF |
Memory Authentication, Integrity Trees, Board level attacks, Security, Trusted Computing, Active attacks |
35 | Pascal Bou Nassar, Youakim Badr, Frédérique Biennier, Kablan Barbar |
Extended BPEL with heterogeneous authentication mechanisms in service ecosystems. |
MEDES |
2009 |
DBLP DOI BibTeX RDF |
authentication, BPEL, web service composition, SSO |
35 | Youngsook Lee, Dongho Won |
Enhancing of a Password-Based Authentication Scheme Using Smart Cards. |
OTM Conferences (2) |
2009 |
DBLP DOI BibTeX RDF |
two-factor security, smart card, dictionary attack, impersonation attack, Authentication scheme |
35 | Lingling Wang, Guoyin Zhang, Chunguang Ma |
ID-based deniable ring authentication with constant-size signature. |
Frontiers Comput. Sci. China |
2008 |
DBLP DOI BibTeX RDF |
deniable ring authentication, constant-size signature, privacy, bilinear pairings, ID-based |
35 | Eun-Jun Yoon, Kee-Young Yoo |
Improving the Host Authentication Mechanism for POD Copy Protection System. |
New Directions in Intelligent Interactive Multimedia |
2008 |
DBLP DOI BibTeX RDF |
Host authentication, POD copy protection system, Diffie-Hellman key agreement, Replay attack |
35 | Kaleb Brasee, S. Kami Makki, Sherali Zeadally |
A Novel Distributed Authentication Framework for Single Sign-On Services. |
SUTC |
2008 |
DBLP DOI BibTeX RDF |
SeDSSO, Distributed systems, Computer security, Single sign-on, Two-factor authentication |
35 | Chwan-Hwa John Wu, Tong Liu |
Simulation for intrusion-resilient, DDoS-resistant authentication system (IDAS). |
SpringSim |
2008 |
DBLP DOI BibTeX RDF |
computer network defense, authentication, network security, discrete event simulation, DDoS, intrusion |
35 | David Champagne, Reouven Elbaz, Ruby B. Lee |
The Reduced Address Space (RAS) for Application Memory Authentication. |
ISC |
2008 |
DBLP DOI BibTeX RDF |
Memory authentication, integrity tree, secure computing architecture |
35 | Sridhar Machiraju, Hao Chen 0003, Jean Bolot |
Distributed authentication for low-cost wireless networks. |
HotMobile |
2008 |
DBLP DOI BibTeX RDF |
token transfer, authentication, distributed |
35 | Gabriele Lenzini |
Trust-Based and Context-Aware Authentication in a Software Architecture for Context and Proximity-Aware Services. |
WADS |
2008 |
DBLP DOI BibTeX RDF |
context-aware software architectures, trust-based authentication, Subjective Logic |
35 | Andrew Harding, Timothy W. van der Horst, Kent E. Seamons |
Wireless authentication using remote passwords. |
WISEC |
2008 |
DBLP DOI BibTeX RDF |
SAW, decentralized wireless authentication, SRP |
35 | Dacheng Zhang, Jie Xu 0007, Xianxian Li |
Dynamic Cross-Realm Authentication for Multi-Party Service Interactions. |
DSN |
2007 |
DBLP DOI BibTeX RDF |
Secure Service Collaborations, Workflow Business Sessions, Web Services, Authentication, Multi-Party Interactions |
35 | Jodie P. Boyer, Ragib Hasan, Lars E. Olson 0001, Nikita Borisov, Carl A. Gunter, David Raila |
Improving multi-tier security using redundant authentication. |
CSAW |
2007 |
DBLP DOI BibTeX RDF |
Building Automation Systems, authentication |
35 | Goce Jakimoski, K. P. Subbalakshmi |
On Efficient Message Authentication Via Block Cipher Design Techniques. |
ASIACRYPT |
2007 |
DBLP DOI BibTeX RDF |
Wegman-Carter construction, maximum differential probability, block ciphers, Message authentication, universal hash functions |
35 | Giorgos Kostopoulos, Odysseas G. Koufopavlou |
Security Analysis of SIP Signalling during NASS-IMS bundled Authentication. |
ICNS |
2007 |
DBLP DOI BibTeX RDF |
TISPAN, NASS-IMS Authentication, SIP Analysis, IP Multimedia Subsystem |
35 | Guido Rotondi, Gianpiero Guerrera |
A consistent history authentication protocol. |
ACM SIGSOFT Softw. Eng. Notes |
2006 |
DBLP DOI BibTeX RDF |
dentification, authentication, trust, non repudiation, SSL |
35 | Rocío Quixtiano-Xicohténcatl, Orion Fausto Reyes-Galaviz, Leticia Flores-Pulido, Carlos A. Reyes García |
Hybrid Algorithm Applied to Feature Selection for Speaker Authentication. |
MICAI |
2006 |
DBLP DOI BibTeX RDF |
Speaker Authentication, Genetic Algorithms, Hybrid System, Search Space, Feed-Forward |
35 | HongKi Lee, DaeHun Nyang, JooSeok Song |
Message and Its Origin Authentication Protocol for Data Aggregation in Sensor Networks. |
EUC Workshops |
2006 |
DBLP DOI BibTeX RDF |
sensor networks, authentication, aggregation, hash chain, Merkle tree |
35 | Jun-Cheol Jeon, Kee-Young Yoo |
Authentication Based on Singular Cellular Automata. |
ACRI |
2006 |
DBLP DOI BibTeX RDF |
Singular Operation, Authentication, Cellular Automata, Hash function, One-Time Password |
35 | Byunggi Kim, Sang-Sun Hong |
Secure Mutual Authentication for Ad hoc Wireless Networks. |
J. Supercomput. |
2005 |
DBLP DOI BibTeX RDF |
authentication, ad hoc wireless network |
35 | Mario Di Raimondo, Rosario Gennaro |
New approaches for deniable authentication. |
CCS |
2005 |
DBLP DOI BibTeX RDF |
authentication, concurrency, zero-knowledge, deniability |
35 | Andrea Oermann, Jana Dittmann, Claus Vielhauer |
Verifier-Tuple as a Classifier for Biometric Handwriting Authentication - Combination of Syntax and Semantics. |
Communications and Multimedia Security |
2005 |
DBLP DOI BibTeX RDF |
Security of Multimedia Content, Identification and Authentication, Biometrics |
35 | Shintaro Mizuno, Kohji Yamada, Kenji Takahashi |
Authentication using multiple communication channels. |
Digital Identity Management |
2005 |
DBLP DOI BibTeX RDF |
internet, authentication, mobile phone, multiple channels |
35 | Özer Aydemir, Ali Aydin Selçuk |
A Strong User Authentication Protocol for GSM. |
WETICE |
2005 |
DBLP DOI BibTeX RDF |
strong password protocols, GSM, user authentication, Wireless network security |
35 | Ning Zhang 0001, Li Yao, Jay Chin, Aleksandra Nenadic, A. McNab, Alan L. Rector, Carole A. Goble, Qi Shi 0001 |
Plugging a Scalable Authentication Framework into Shibboleth. |
WETICE |
2005 |
DBLP DOI BibTeX RDF |
Grid authentication, smart tokens, security architecture |
35 | Eun-Jun Yoon, Kee-Young Yoo |
Robust Secret Key Based Authentication Scheme Using Smart Cards. |
PCM (2) |
2005 |
DBLP DOI BibTeX RDF |
authentication, Cryptography, smart card, secret key |
35 | Judith E. Y. Rossebø, John Ronan, Kristian Walsh |
Authentication Issues in Multi-service Residential Access Networks. |
MMNS |
2003 |
DBLP DOI BibTeX RDF |
Authentication, Encryption, Public Key Infrastructure, Residential Gateway |
35 | Luciano Rila, Chris J. Mitchell |
Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards. |
ACNS |
2003 |
DBLP DOI BibTeX RDF |
cardholder authentication, biometrics, smartcards |
35 | Tommaso Cucinotta, Gabriele Cecchetti, Gianluca Ferraro |
Adopting Redundancy Techniques for Multicast Stream Authentication. |
FTDCS |
2003 |
DBLP DOI BibTeX RDF |
Multicast stream authentication, digital signatures, forward error correction |
35 | Adrian Perrig, Ran Canetti, J. D. Tygar, Dawn Xiaodong Song |
Efficient Authentication and Signing of Multicast Streams over Lossy Channels. |
S&P |
2000 |
DBLP DOI BibTeX RDF |
Multicast Stream Authentication and Signature |
35 | Moni Naor, Benny Pinkas |
Visual Authentication and Identification. |
CRYPTO |
1997 |
DBLP DOI BibTeX RDF |
Authentication, identification, visual cryptography |
35 | Azad Jiwa, Jennifer Seberry, Yuliang Zheng 0001 |
Beacon Based Authentication. |
ESORICS |
1994 |
DBLP DOI BibTeX RDF |
Term Index Beacon, Authentication, Network Security, Information Security, Security Protocol |
35 | Dongvu Tonien, Reihaneh Safavi-Naini, Peter Nickolas, Yvo Desmedt |
Unconditionally Secure Approximate Message Authentication. |
IWCC |
2009 |
DBLP DOI BibTeX RDF |
approximate authentication, unconditional security, biometric authentication |
35 | Eugenio Faldella, Marco Prandini |
A Novel Approach to On-Line Status Authentication of Public-Key Certificates. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
online status authentication, sensitive data exchange, security constraints, revoked certificates, certificate status handling scheme, one-way accumulator, Owa-based Revocation Scheme, Online Certificate Status Protocol, Internet, scalability, authentication, cryptography, protocols, data integrity, data integrity, computer networks, public key cryptography, public key infrastructure, message authentication, telecommunication security, certification authority, public-key certificates, computational load, public networks |
33 | Saber Zrelli, Yoichi Shinoda |
Specifying Kerberos over EAP: Towards an integrated network access and Kerberos single sign-on process. |
AINA |
2007 |
DBLP DOI BibTeX RDF |
|
33 | A. F. Al Shahri, D. Geoffrey Smith, James M. Irvine |
A Secure Network Access Protocol (SNAP). |
ISCC |
2003 |
DBLP DOI BibTeX RDF |
|
33 | Manabu Hirano, Takeshi Okuda, Suguru Yamaguchi |
Application for a Simple Device Authentication Framework: Device Authentication Middleware Using Novel Smart Card Software. |
SAINT Workshops |
2007 |
DBLP DOI BibTeX RDF |
|
33 | Deok-Gyu Lee, Ilsun You, Sang-Choon Kim, Yun-kyung Lee, Jong Wook Han, Kyo-Il Chung |
Intelligent Home Network Authentication: S/Key-Based Home Device Authentication. |
ISPA Workshops |
2007 |
DBLP DOI BibTeX RDF |
|
33 | Stephen Krawczyk, Anil K. Jain 0001 |
Securing Electronic Medical Records Using Biometric Authentication. |
AVBPA |
2005 |
DBLP DOI BibTeX RDF |
|
33 | Jon A. Solworth |
Beacon certificate push revocation. |
CSAW |
2008 |
DBLP DOI BibTeX RDF |
authentication, certificate, public key infrastructure (pki), revocation |
33 | Tsuyoshi Abe, Hiroki Itoh, Kenji Takahashi |
Implementing identity provider on mobile phone. |
Digital Identity Management |
2007 |
DBLP DOI BibTeX RDF |
identity provider, authentication, mobile phone, federated identity |
33 | Muhammad Ikram 0001, Aminul Haque Chowdhury, Bilal Zafar, Hyon-Soo Cha, Ki-Hyung Kim, Seung-Wha Yoo, Dong-Kyoo Kim |
A simple lightweight authentic bootstrapping protocol for IPv6-based low rate wireless personal area networks (6LoWPANs). |
IWCMC |
2009 |
DBLP DOI BibTeX RDF |
secure bootstrapping and mutual authentication, security, authentication, bootstrapping, 6lowpan |
33 | Sang-Ho Na, Kyu-Jin Kim, Mohammad Mehedi Hassan, Eui-nam Huh |
Identity-based secure protocol scheme for wireless sensor network. |
ICIS |
2009 |
DBLP DOI BibTeX RDF |
ID-based authentication, clustering, wireless sensor network, authentication, proxy |
33 | Eunjong Kim, Ashish Gupta 0010, Batsukh Tsendjav, Daniel Massey |
Resolving islands of security problem for DNSSEC. |
IWCMC |
2006 |
DBLP DOI BibTeX RDF |
DNS security, authentication chains, sanity check, starting points, trust relationship, key distribution, bulletin board, key authentication |
33 | Kaisa Nyberg |
IKE in Ad Hoc IP Networking. |
ESAS |
2004 |
DBLP DOI BibTeX RDF |
ad hoc access, ad hoc authentication, ad hoc networking, key management, message authentication code, peer-to-peer communication, security association, IKEv2 |
33 | Liqun Chen 0002, Dieter Gollmann, Chris J. Mitchell |
Key distribution without individual trusted authentification servers. |
CSFW |
1995 |
DBLP DOI BibTeX RDF |
key distribution systems, authentication servers, key distribution protocols, cross checksum scheme, cryptography, trust, protocols, data integrity, message authentication, symmetric encryption |
33 | Robert R. Jueneman |
A High Speed Manipulation Detection Code. |
CRYPTO |
1986 |
DBLP DOI BibTeX RDF |
Manipulation Detection Code (MDC), birthday problem attacks, numeric data processor chip, math coprocessor chip, 8087, 80287, authentication, cryptography, digital signature, encryption, Message Authentication Code (MAC), IBM PC, checksums |
33 | John Patrick McGregor, Ruby B. Lee |
Performance Impact of Data Compression on Virtual Private Network Transactions. |
LCN |
2000 |
DBLP DOI BibTeX RDF |
virtual private network transactions, secure public network communications, host authentication, IP Security Protocol, IPsec transactions, network types, 1 Gbit/s, 10 Mbit/s, Internet, performance, authentication, cryptography, data integrity, data integrity, data compression, data compression, encryption, transport protocols, packet switching, cryptographic protocols, confidentiality, system model, IPsec, message authentication, data types, VPN, telecommunication networks, telecommunication security, business communication, compression algorithms, security services, cryptographic algorithms, packet sizes, 100 Mbit/s |
33 | Stephen H. Brackin |
A HOL extension of GNY for automatically analyzing cryptographic protocols. |
CSFW |
1996 |
DBLP DOI BibTeX RDF |
HOL extension, automatically analyzing cryptographic protocols, higher order logic theory, authentication properties, protocol properties, hash operations, key-exchange algorithms, formal specification, cryptography, message authentication, access protocols, message authentication codes, multiple encryption, belief maintenance, belief logic |
31 | Li Yao, Ning Zhang 0001 |
A Generic Authentication LoA Derivation Model. |
SEC |
2009 |
DBLP DOI BibTeX RDF |
|
31 | Xiaodong Lin 0001, Rongxing Lu, Pin-Han Ho, Xuemin Shen, Zhenfu Cao |
TUA: A Novel Compromise-Resilient Authentication Architecture for Wireless Mesh Networks. |
IEEE Trans. Wirel. Commun. |
2008 |
DBLP DOI BibTeX RDF |
|
31 | Jorgen Cederlof, Jan-Åke Larsson |
Security Aspects of the Authentication Used in Quantum Cryptography. |
IEEE Trans. Inf. Theory |
2008 |
DBLP DOI BibTeX RDF |
|
31 | Zhenhua Wu |
Biometrics Authentication System on Open Network and Security Analysis. |
ISECS |
2008 |
DBLP DOI BibTeX RDF |
|
31 | Ali Al Shidhani, Victor C. M. Leung |
Reducing re-authentication delays during UMTS-WLAN vertical handovers. |
PIMRC |
2008 |
DBLP DOI BibTeX RDF |
|
31 | Yan Zhang 0002 |
Authentication Overhead in Wireless Networks. |
ICC |
2008 |
DBLP DOI BibTeX RDF |
|
31 | Jiao Zhang, Yujun Zhang, Ye Tian, Zhongcheng Li |
CPK-based fast authentication method in Mobile IPv6 networks. |
ISCC |
2008 |
DBLP DOI BibTeX RDF |
|
31 | Sebastian Gajek, Mark Manulis, Jörg Schwenk |
Enforcing User-Aware Browser-Based Mutual Authentication with Strong Locked Same Origin Policy. |
ACISP |
2008 |
DBLP DOI BibTeX RDF |
|
31 | Zhishou Zhang, Qibin Sun, Wai-Choong Wong, John G. Apostolopoulos, Susie J. Wee |
An Optimized Content-Aware Authentication Scheme for Streaming JPEG-2000 Images Over Lossy Networks. |
IEEE Trans. Multim. |
2007 |
DBLP DOI BibTeX RDF |
|
31 | Hannan Xiao, James A. Malcolm, Bruce Christianson, Ying Zhang 0020 |
Hierarchical Trustworthy Authentication for Pervasive Computing. |
MobiQuitous |
2007 |
DBLP DOI BibTeX RDF |
|
31 | Arjan Durresi, Vamsi Paruchuri, Mimoza Durresi, Leonard Barolli |
Secure Spatial Authentication using Cell Phones. |
ARES |
2007 |
DBLP DOI BibTeX RDF |
|
31 | Masahiro Kuroda, Ritsu Nomura, Wade Trappe |
A Radio-independent Authentication Protocol (EAP-CRP) for Networks of Cognitive Radios. |
SECON |
2007 |
DBLP DOI BibTeX RDF |
|
31 | Youngjun Kim, Jason Kim 0004 |
U-City User Authentication Methods and Encryption Techniques Based on Biometric Technology. |
FBIT |
2007 |
DBLP DOI BibTeX RDF |
|
Displaying result #101 - #200 of 25398 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ >>] |
|