The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for authentication with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1973-1981 (18) 1982-1984 (22) 1985-1986 (22) 1987 (21) 1988 (25) 1989 (33) 1990 (36) 1991 (31) 1992 (40) 1993 (50) 1994 (65) 1995 (55) 1996 (112) 1997 (145) 1998 (98) 1999 (167) 2000 (208) 2001 (294) 2002 (330) 2003 (618) 2004 (905) 2005 (1106) 2006 (1033) 2007 (1140) 2008 (1183) 2009 (1031) 2010 (805) 2011 (788) 2012 (820) 2013 (879) 2014 (955) 2015 (1035) 2016 (1133) 2017 (1173) 2018 (1332) 2019 (1500) 2020 (1379) 2021 (1410) 2022 (1499) 2023 (1523) 2024 (379)
Publication types (Num. hits)
article(10875) book(17) data(3) incollection(161) inproceedings(14078) phdthesis(247) proceedings(17)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 8079 occurrences of 2235 keywords

Results
Found 25398 publication records. Showing 25398 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
39Dieter Gollmann What do We Mean by Entity Authentication? Search on Bibsonomy S&P The full citation details ... 1996 DBLP  DOI  BibTeX  RDF authentication protocol design, message passing protocols, high-level objectives, protocol specification abstraction level, cryptographic function, formal specification, cryptography, protocols, message passing, encryption, communication protocols, message authentication, entity authentication
37Ying-Hong Wang, Ching-Lin Wang, Cheng-Horng Liao Mobile Agent Protection and Verification in the Internet Environment. Search on Bibsonomy CIT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF AUthentication Mechanism, Verification Mechanism, Agent, Mobile Agent, Electronic Commerce
37Hung-Yu Chien SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Authentication, Access controls, Security and Privacy Protection, Cryptographic controls
37Nathanael Thompson, Petros Zerfos, Haiyun Luo, Jatinder Pal Singh, Zuoning Yin Authentication on the edge: distributed authentication for a global open wi-fi network. Search on Bibsonomy MobiCom The full citation details ... 2007 DBLP  DOI  BibTeX  RDF EAP-AGE, social network, authentication, Wi-Fi networks
37William D. Neumann HORSE: An Extension of an r-Time Signature Scheme With Fast Signing and Verification. Search on Bibsonomy ITCC (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF r-time signatures, low power authentication, ad hoc wireless networks, hash chains, broadcast authentication
37Farid G. Hatefi, Forouzan Golshani, Gamze Seckin Prospects of Secure Real-Time Video Transmission over CDPD Networks. Search on Bibsonomy Infrastructure for Mobile and Wireless Systems The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Real-time video streaming, low-bit rate transmission, bilateral authentication, certificate based authentication, mobile end systems, mobile intermediate systems, wireless communication
37Massimo Tistarelli, Josef Bigün, Anil K. Jain 0001 (eds.) Biometric Authentication, International ECCV 2002 Workshop Copenhagen, Denmark, June 1, 2002, Proceedings Search on Bibsonomy Biometric Authentication The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
37Modesto Castrillón Santana, Javier Lorenzo-Navarro, Jorge Cabrera-Gámez 0001, Mario Hernández-Tejera, J. Méndez Rodríguez Detection of Frontal Faces in Video Streams. Search on Bibsonomy Biometric Authentication The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
37Masato Kawamoto, Takayuki Hamamoto, Seiichiro Hangai Improvement of On-line Signature Verification System Robust to Intersession Variability. Search on Bibsonomy Biometric Authentication The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
37Joaquin Gonzalez-Rodriguez, Julian Fiérrez-Aguilar, Javier Ortega-Garcia, Jose Juan Lucena-Molina Biometric Identification in Forensic Cases According to the Bayesian Approach. Search on Bibsonomy Biometric Authentication The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
37Raffaele Cappelli, Dario Maio, Davide Maltoni Subspace Classification for Face Recognition. Search on Bibsonomy Biometric Authentication The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
37Klaus J. Kirchberg, Oliver Jesorsky, Robert Frischholz Genetic Model Optimization for Hausdorff Distance-Based Face Localization. Search on Bibsonomy Biometric Authentication The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
37Kenneth Nilsson, Josef Bigün Complex Filters Applied to Fingerprint Images Detecting Prominent Symmetry Points Used for Alignment. Search on Bibsonomy Biometric Authentication The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
37Juneho Yi, Jongsun Kim, Jongmoo Choi, JungHyun Han, Eunseok Lee 0001 Face Recognition Based on ICA Combined with FLD. Search on Bibsonomy Biometric Authentication The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
37Hichem Sahbi, Nozha Boujemaa Robust Face Recognition Using Dynamic Space Warping. Search on Bibsonomy Biometric Authentication The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
37Gian Luca Marcialis, Fabio Roli Fusion of LDA and PCA for Face Verification. Search on Bibsonomy Biometric Authentication The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
37Arun Ross, James Reisman, Anil K. Jain 0001 Fingerprint Matching Using Feature Space Correlation. Search on Bibsonomy Biometric Authentication The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
37L. Lee, W. Eric L. Grimson Gait Appearance for Recognition. Search on Bibsonomy Biometric Authentication The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
37Hichem Sahbi, Nozha Boujemaa Coarse to Fine Face Detection Based on Skin Color Adaption. Search on Bibsonomy Biometric Authentication The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
37Oscar Déniz, Modesto Castrillón Santana, Javier Lorenzo 0001, Mario Hernández An Incremental Learning Algorithm for Face Recognition. Search on Bibsonomy Biometric Authentication The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
37Carlos E. Thomaz, Duncan Fyfe Gillies, Raul Queiroz Feitosa A New Quadratic Classifier Applied to Biometric Recognition. Search on Bibsonomy Biometric Authentication The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
37Chiraz BenAbdelkader, Ross Cutler, Larry S. Davis View-invariant Estimation of Height and Stride for Gait Recognition. Search on Bibsonomy Biometric Authentication The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
35Zhongying Niu, Ke Zhou 0001, Hong Jiang 0001, Tianming Yang, Wei Yan Identification and Authentication in Large-Scale Storage Systems. Search on Bibsonomy NAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
35Levente Buttyán, László Dóra An authentication scheme for QoS-aware multi-operator maintained wireless mesh networks. Search on Bibsonomy WOWMOM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
35Mei Song, Li Wang 0039, Jianwen Huang, Junde Song An optimal interworking authentication scheme based on EAP-AKA for heterogeneous access networks. Search on Bibsonomy CCECE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
35Zhexuan Song, Seigo Kotani, Ryusuke Masuoka Building an Independent Integrated Authentication Service. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
35Zhishou Zhang, Qibin Sun, Wai-Choong Wong, John G. Apostolopoulos, Susie J. Wee Rate-Distortion-Authentication Optimized Streaming of Authenticated Video. Search on Bibsonomy IEEE Trans. Circuits Syst. Video Technol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
35Brahim Gaabab, David Binet, Jean-Marie Bonnin Authentication Optimization for Seamless Handovers. Search on Bibsonomy Integrated Network Management The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
35B. Sathish Babu, Pallapa Venkataram Transaction Based Authentication Scheme for Mobile Communication: A Cognitive Agent Based Approach. Search on Bibsonomy IPDPS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
35Men Long, Chwan-Hwa John Wu Energy-efficient and intrusion-resilient authentication for ubiquitous access to factory floor information. Search on Bibsonomy IEEE Trans. Ind. Informatics The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
35He Zheng, Jin Kwak, Kyungho Son, Wansuk Lee, Seungjoo Kim, Dongho Won Confidence Value Based Multi Levels of Authentication for Ubiquitous Computing Environments. Search on Bibsonomy ICCSA (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
35Daesung Lee 0001, Ki-Chang Kim, Year Back Yoo IPBio: Embedding Biometric Data in IP Header for Per-Packet Authentication. Search on Bibsonomy ISPA Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
35Insu Kim, Keecheon Kim Design of Authentication Mechanism Using PANA CTP in FMIPv6 Environment. Search on Bibsonomy ISPA Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
35YeongGeun Choe, Soon-Ja Kim Secure Password Authentication for Keystroke Dynamics. Search on Bibsonomy KES (3) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
35C. K. Wong, Agnes Chan Immediate Data Authentication for Multicast in Resource Constrained Network. Search on Bibsonomy ACISP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
35Kanako Yokota, Tatsuhiro Yonekura A Proposal of COMPASS (COMmunity Portrait Authentication SyStem). Search on Bibsonomy CW The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
35Hae Yong Kim, Amir Afif Secure Authentication Watermarking for Binary Images. Search on Bibsonomy SIBGRAPI The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
35Cástor Mariño, Manuel G. Penedo, María J. Carreira, F. González Retinal Angiography Based Authentication. Search on Bibsonomy CIARP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
35Reouven Elbaz, David Champagne, Catherine H. Gebotys, Ruby B. Lee, Nachiketh R. Potlapally, Lionel Torres Hardware Mechanisms for Memory Authentication: A Survey of Existing Techniques and Engines. Search on Bibsonomy Trans. Comput. Sci. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Memory Authentication, Integrity Trees, Board level attacks, Security, Trusted Computing, Active attacks
35Pascal Bou Nassar, Youakim Badr, Frédérique Biennier, Kablan Barbar Extended BPEL with heterogeneous authentication mechanisms in service ecosystems. Search on Bibsonomy MEDES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF authentication, BPEL, web service composition, SSO
35Youngsook Lee, Dongho Won Enhancing of a Password-Based Authentication Scheme Using Smart Cards. Search on Bibsonomy OTM Conferences (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF two-factor security, smart card, dictionary attack, impersonation attack, Authentication scheme
35Lingling Wang, Guoyin Zhang, Chunguang Ma ID-based deniable ring authentication with constant-size signature. Search on Bibsonomy Frontiers Comput. Sci. China The full citation details ... 2008 DBLP  DOI  BibTeX  RDF deniable ring authentication, constant-size signature, privacy, bilinear pairings, ID-based
35Eun-Jun Yoon, Kee-Young Yoo Improving the Host Authentication Mechanism for POD Copy Protection System. Search on Bibsonomy New Directions in Intelligent Interactive Multimedia The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Host authentication, POD copy protection system, Diffie-Hellman key agreement, Replay attack
35Kaleb Brasee, S. Kami Makki, Sherali Zeadally A Novel Distributed Authentication Framework for Single Sign-On Services. Search on Bibsonomy SUTC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF SeDSSO, Distributed systems, Computer security, Single sign-on, Two-factor authentication
35Chwan-Hwa John Wu, Tong Liu Simulation for intrusion-resilient, DDoS-resistant authentication system (IDAS). Search on Bibsonomy SpringSim The full citation details ... 2008 DBLP  DOI  BibTeX  RDF computer network defense, authentication, network security, discrete event simulation, DDoS, intrusion
35David Champagne, Reouven Elbaz, Ruby B. Lee The Reduced Address Space (RAS) for Application Memory Authentication. Search on Bibsonomy ISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Memory authentication, integrity tree, secure computing architecture
35Sridhar Machiraju, Hao Chen 0003, Jean Bolot Distributed authentication for low-cost wireless networks. Search on Bibsonomy HotMobile The full citation details ... 2008 DBLP  DOI  BibTeX  RDF token transfer, authentication, distributed
35Gabriele Lenzini Trust-Based and Context-Aware Authentication in a Software Architecture for Context and Proximity-Aware Services. Search on Bibsonomy WADS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF context-aware software architectures, trust-based authentication, Subjective Logic
35Andrew Harding, Timothy W. van der Horst, Kent E. Seamons Wireless authentication using remote passwords. Search on Bibsonomy WISEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF SAW, decentralized wireless authentication, SRP
35Dacheng Zhang, Jie Xu 0007, Xianxian Li Dynamic Cross-Realm Authentication for Multi-Party Service Interactions. Search on Bibsonomy DSN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Secure Service Collaborations, Workflow Business Sessions, Web Services, Authentication, Multi-Party Interactions
35Jodie P. Boyer, Ragib Hasan, Lars E. Olson 0001, Nikita Borisov, Carl A. Gunter, David Raila Improving multi-tier security using redundant authentication. Search on Bibsonomy CSAW The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Building Automation Systems, authentication
35Goce Jakimoski, K. P. Subbalakshmi On Efficient Message Authentication Via Block Cipher Design Techniques. Search on Bibsonomy ASIACRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Wegman-Carter construction, maximum differential probability, block ciphers, Message authentication, universal hash functions
35Giorgos Kostopoulos, Odysseas G. Koufopavlou Security Analysis of SIP Signalling during NASS-IMS bundled Authentication. Search on Bibsonomy ICNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF TISPAN, NASS-IMS Authentication, SIP Analysis, IP Multimedia Subsystem
35Guido Rotondi, Gianpiero Guerrera A consistent history authentication protocol. Search on Bibsonomy ACM SIGSOFT Softw. Eng. Notes The full citation details ... 2006 DBLP  DOI  BibTeX  RDF dentification, authentication, trust, non repudiation, SSL
35Rocío Quixtiano-Xicohténcatl, Orion Fausto Reyes-Galaviz, Leticia Flores-Pulido, Carlos A. Reyes García Hybrid Algorithm Applied to Feature Selection for Speaker Authentication. Search on Bibsonomy MICAI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Speaker Authentication, Genetic Algorithms, Hybrid System, Search Space, Feed-Forward
35HongKi Lee, DaeHun Nyang, JooSeok Song Message and Its Origin Authentication Protocol for Data Aggregation in Sensor Networks. Search on Bibsonomy EUC Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF sensor networks, authentication, aggregation, hash chain, Merkle tree
35Jun-Cheol Jeon, Kee-Young Yoo Authentication Based on Singular Cellular Automata. Search on Bibsonomy ACRI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Singular Operation, Authentication, Cellular Automata, Hash function, One-Time Password
35Byunggi Kim, Sang-Sun Hong Secure Mutual Authentication for Ad hoc Wireless Networks. Search on Bibsonomy J. Supercomput. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF authentication, ad hoc wireless network
35Mario Di Raimondo, Rosario Gennaro New approaches for deniable authentication. Search on Bibsonomy CCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF authentication, concurrency, zero-knowledge, deniability
35Andrea Oermann, Jana Dittmann, Claus Vielhauer Verifier-Tuple as a Classifier for Biometric Handwriting Authentication - Combination of Syntax and Semantics. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Security of Multimedia Content, Identification and Authentication, Biometrics
35Shintaro Mizuno, Kohji Yamada, Kenji Takahashi Authentication using multiple communication channels. Search on Bibsonomy Digital Identity Management The full citation details ... 2005 DBLP  DOI  BibTeX  RDF internet, authentication, mobile phone, multiple channels
35Özer Aydemir, Ali Aydin Selçuk A Strong User Authentication Protocol for GSM. Search on Bibsonomy WETICE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF strong password protocols, GSM, user authentication, Wireless network security
35Ning Zhang 0001, Li Yao, Jay Chin, Aleksandra Nenadic, A. McNab, Alan L. Rector, Carole A. Goble, Qi Shi 0001 Plugging a Scalable Authentication Framework into Shibboleth. Search on Bibsonomy WETICE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Grid authentication, smart tokens, security architecture
35Eun-Jun Yoon, Kee-Young Yoo Robust Secret Key Based Authentication Scheme Using Smart Cards. Search on Bibsonomy PCM (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF authentication, Cryptography, smart card, secret key
35Judith E. Y. Rossebø, John Ronan, Kristian Walsh Authentication Issues in Multi-service Residential Access Networks. Search on Bibsonomy MMNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Authentication, Encryption, Public Key Infrastructure, Residential Gateway
35Luciano Rila, Chris J. Mitchell Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards. Search on Bibsonomy ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF cardholder authentication, biometrics, smartcards
35Tommaso Cucinotta, Gabriele Cecchetti, Gianluca Ferraro Adopting Redundancy Techniques for Multicast Stream Authentication. Search on Bibsonomy FTDCS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Multicast stream authentication, digital signatures, forward error correction
35Adrian Perrig, Ran Canetti, J. D. Tygar, Dawn Xiaodong Song Efficient Authentication and Signing of Multicast Streams over Lossy Channels. Search on Bibsonomy S&P The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Multicast Stream Authentication and Signature
35Moni Naor, Benny Pinkas Visual Authentication and Identification. Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF Authentication, identification, visual cryptography
35Azad Jiwa, Jennifer Seberry, Yuliang Zheng 0001 Beacon Based Authentication. Search on Bibsonomy ESORICS The full citation details ... 1994 DBLP  DOI  BibTeX  RDF Term Index Beacon, Authentication, Network Security, Information Security, Security Protocol
35Dongvu Tonien, Reihaneh Safavi-Naini, Peter Nickolas, Yvo Desmedt Unconditionally Secure Approximate Message Authentication. Search on Bibsonomy IWCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF approximate authentication, unconditional security, biometric authentication
35Eugenio Faldella, Marco Prandini A Novel Approach to On-Line Status Authentication of Public-Key Certificates. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF online status authentication, sensitive data exchange, security constraints, revoked certificates, certificate status handling scheme, one-way accumulator, Owa-based Revocation Scheme, Online Certificate Status Protocol, Internet, scalability, authentication, cryptography, protocols, data integrity, data integrity, computer networks, public key cryptography, public key infrastructure, message authentication, telecommunication security, certification authority, public-key certificates, computational load, public networks
33Saber Zrelli, Yoichi Shinoda Specifying Kerberos over EAP: Towards an integrated network access and Kerberos single sign-on process. Search on Bibsonomy AINA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
33A. F. Al Shahri, D. Geoffrey Smith, James M. Irvine A Secure Network Access Protocol (SNAP). Search on Bibsonomy ISCC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
33Manabu Hirano, Takeshi Okuda, Suguru Yamaguchi Application for a Simple Device Authentication Framework: Device Authentication Middleware Using Novel Smart Card Software. Search on Bibsonomy SAINT Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
33Deok-Gyu Lee, Ilsun You, Sang-Choon Kim, Yun-kyung Lee, Jong Wook Han, Kyo-Il Chung Intelligent Home Network Authentication: S/Key-Based Home Device Authentication. Search on Bibsonomy ISPA Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
33Stephen Krawczyk, Anil K. Jain 0001 Securing Electronic Medical Records Using Biometric Authentication. Search on Bibsonomy AVBPA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
33Jon A. Solworth Beacon certificate push revocation. Search on Bibsonomy CSAW The full citation details ... 2008 DBLP  DOI  BibTeX  RDF authentication, certificate, public key infrastructure (pki), revocation
33Tsuyoshi Abe, Hiroki Itoh, Kenji Takahashi Implementing identity provider on mobile phone. Search on Bibsonomy Digital Identity Management The full citation details ... 2007 DBLP  DOI  BibTeX  RDF identity provider, authentication, mobile phone, federated identity
33Muhammad Ikram 0001, Aminul Haque Chowdhury, Bilal Zafar, Hyon-Soo Cha, Ki-Hyung Kim, Seung-Wha Yoo, Dong-Kyoo Kim A simple lightweight authentic bootstrapping protocol for IPv6-based low rate wireless personal area networks (6LoWPANs). Search on Bibsonomy IWCMC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF secure bootstrapping and mutual authentication, security, authentication, bootstrapping, 6lowpan
33Sang-Ho Na, Kyu-Jin Kim, Mohammad Mehedi Hassan, Eui-nam Huh Identity-based secure protocol scheme for wireless sensor network. Search on Bibsonomy ICIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF ID-based authentication, clustering, wireless sensor network, authentication, proxy
33Eunjong Kim, Ashish Gupta 0010, Batsukh Tsendjav, Daniel Massey Resolving islands of security problem for DNSSEC. Search on Bibsonomy IWCMC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF DNS security, authentication chains, sanity check, starting points, trust relationship, key distribution, bulletin board, key authentication
33Kaisa Nyberg IKE in Ad Hoc IP Networking. Search on Bibsonomy ESAS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF ad hoc access, ad hoc authentication, ad hoc networking, key management, message authentication code, peer-to-peer communication, security association, IKEv2
33Liqun Chen 0002, Dieter Gollmann, Chris J. Mitchell Key distribution without individual trusted authentification servers. Search on Bibsonomy CSFW The full citation details ... 1995 DBLP  DOI  BibTeX  RDF key distribution systems, authentication servers, key distribution protocols, cross checksum scheme, cryptography, trust, protocols, data integrity, message authentication, symmetric encryption
33Robert R. Jueneman A High Speed Manipulation Detection Code. Search on Bibsonomy CRYPTO The full citation details ... 1986 DBLP  DOI  BibTeX  RDF Manipulation Detection Code (MDC), birthday problem attacks, numeric data processor chip, math coprocessor chip, 8087, 80287, authentication, cryptography, digital signature, encryption, Message Authentication Code (MAC), IBM PC, checksums
33John Patrick McGregor, Ruby B. Lee Performance Impact of Data Compression on Virtual Private Network Transactions. Search on Bibsonomy LCN The full citation details ... 2000 DBLP  DOI  BibTeX  RDF virtual private network transactions, secure public network communications, host authentication, IP Security Protocol, IPsec transactions, network types, 1 Gbit/s, 10 Mbit/s, Internet, performance, authentication, cryptography, data integrity, data integrity, data compression, data compression, encryption, transport protocols, packet switching, cryptographic protocols, confidentiality, system model, IPsec, message authentication, data types, VPN, telecommunication networks, telecommunication security, business communication, compression algorithms, security services, cryptographic algorithms, packet sizes, 100 Mbit/s
33Stephen H. Brackin A HOL extension of GNY for automatically analyzing cryptographic protocols. Search on Bibsonomy CSFW The full citation details ... 1996 DBLP  DOI  BibTeX  RDF HOL extension, automatically analyzing cryptographic protocols, higher order logic theory, authentication properties, protocol properties, hash operations, key-exchange algorithms, formal specification, cryptography, message authentication, access protocols, message authentication codes, multiple encryption, belief maintenance, belief logic
31Li Yao, Ning Zhang 0001 A Generic Authentication LoA Derivation Model. Search on Bibsonomy SEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
31Xiaodong Lin 0001, Rongxing Lu, Pin-Han Ho, Xuemin Shen, Zhenfu Cao TUA: A Novel Compromise-Resilient Authentication Architecture for Wireless Mesh Networks. Search on Bibsonomy IEEE Trans. Wirel. Commun. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
31Jorgen Cederlof, Jan-Åke Larsson Security Aspects of the Authentication Used in Quantum Cryptography. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
31Zhenhua Wu Biometrics Authentication System on Open Network and Security Analysis. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
31Ali Al Shidhani, Victor C. M. Leung Reducing re-authentication delays during UMTS-WLAN vertical handovers. Search on Bibsonomy PIMRC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
31Yan Zhang 0002 Authentication Overhead in Wireless Networks. Search on Bibsonomy ICC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
31Jiao Zhang, Yujun Zhang, Ye Tian, Zhongcheng Li CPK-based fast authentication method in Mobile IPv6 networks. Search on Bibsonomy ISCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
31Sebastian Gajek, Mark Manulis, Jörg Schwenk Enforcing User-Aware Browser-Based Mutual Authentication with Strong Locked Same Origin Policy. Search on Bibsonomy ACISP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
31Zhishou Zhang, Qibin Sun, Wai-Choong Wong, John G. Apostolopoulos, Susie J. Wee An Optimized Content-Aware Authentication Scheme for Streaming JPEG-2000 Images Over Lossy Networks. Search on Bibsonomy IEEE Trans. Multim. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
31Hannan Xiao, James A. Malcolm, Bruce Christianson, Ying Zhang 0020 Hierarchical Trustworthy Authentication for Pervasive Computing. Search on Bibsonomy MobiQuitous The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
31Arjan Durresi, Vamsi Paruchuri, Mimoza Durresi, Leonard Barolli Secure Spatial Authentication using Cell Phones. Search on Bibsonomy ARES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
31Masahiro Kuroda, Ritsu Nomura, Wade Trappe A Radio-independent Authentication Protocol (EAP-CRP) for Networks of Cognitive Radios. Search on Bibsonomy SECON The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
31Youngjun Kim, Jason Kim 0004 U-City User Authentication Methods and Encryption Techniques Based on Biometric Technology. Search on Bibsonomy FBIT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
Displaying result #101 - #200 of 25398 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license