|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 8079 occurrences of 2235 keywords
|
|
|
Results
Found 25398 publication records. Showing 25398 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
39 | Dieter Gollmann |
What do We Mean by Entity Authentication? ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 1996 IEEE Symposium on Security and Privacy, May 6-8, 1996, Oakland, CA, USA, pp. 46-54, 1996, IEEE Computer Society, 0-8186-7417-2. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
authentication protocol design, message passing protocols, high-level objectives, protocol specification abstraction level, cryptographic function, formal specification, cryptography, protocols, message passing, encryption, communication protocols, message authentication, entity authentication |
37 | Ying-Hong Wang, Ching-Lin Wang, Cheng-Horng Liao |
Mobile Agent Protection and Verification in the Internet Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIT ![In: 2004 International Conference on Computer and Information Technology (CIT 2004), 14-16 September 2004, Wuhan, China, pp. 482-487, 2004, IEEE Computer Society, 0-7695-2216-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
AUthentication Mechanism, Verification Mechanism, Agent, Mobile Agent, Electronic Commerce |
37 | Hung-Yu Chien |
SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 4(4), pp. 337-340, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Authentication, Access controls, Security and Privacy Protection, Cryptographic controls |
37 | Nathanael Thompson, Petros Zerfos, Haiyun Luo, Jatinder Pal Singh, Zuoning Yin |
Authentication on the edge: distributed authentication for a global open wi-fi network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiCom ![In: Proceedings of the 13th Annual International Conference on Mobile Computing and Networking, MOBICOM 2007, Montréal, Québec, Canada, September 9-14, 2007, pp. 334-337, 2007, ACM, 978-1-59593-681-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
EAP-AGE, social network, authentication, Wi-Fi networks |
37 | William D. Neumann |
HORSE: An Extension of an r-Time Signature Scheme With Fast Signing and Verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITCC (1) ![In: International Conference on Information Technology: Coding and Computing (ITCC'04), Volume 1, April 5-7, 2004, Las Vegas, Nevada, USA, pp. 129-, 2004, IEEE Computer Society, 0-7695-2108-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
r-time signatures, low power authentication, ad hoc wireless networks, hash chains, broadcast authentication |
37 | Farid G. Hatefi, Forouzan Golshani, Gamze Seckin |
Prospects of Secure Real-Time Video Transmission over CDPD Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Infrastructure for Mobile and Wireless Systems ![In: Developing an Infrastructure for Mobile and Wireless Systems, NSF Workshop IMWS 2001, Scottsdale, AZ, USA, October 15, 2001, Revised Papers, pp. 164-172, 2001, Springer, 3-540-00289-8. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Real-time video streaming, low-bit rate transmission, bilateral authentication, certificate based authentication, mobile end systems, mobile intermediate systems, wireless communication |
37 | Massimo Tistarelli, Josef Bigün, Anil K. Jain 0001 (eds.) |
Biometric Authentication, International ECCV 2002 Workshop Copenhagen, Denmark, June 1, 2002, Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
Biometric Authentication ![Springer, 3-540-43723-1 The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
37 | Modesto Castrillón Santana, Javier Lorenzo-Navarro, Jorge Cabrera-Gámez 0001, Mario Hernández-Tejera, J. Méndez Rodríguez |
Detection of Frontal Faces in Video Streams. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Biometric Authentication ![In: Biometric Authentication, International ECCV 2002 Workshop Copenhagen, Denmark, June 1, 2002, Proceedings, pp. 91-102, 2002, Springer, 3-540-43723-1. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
37 | Masato Kawamoto, Takayuki Hamamoto, Seiichiro Hangai |
Improvement of On-line Signature Verification System Robust to Intersession Variability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Biometric Authentication ![In: Biometric Authentication, International ECCV 2002 Workshop Copenhagen, Denmark, June 1, 2002, Proceedings, pp. 168-176, 2002, Springer, 3-540-43723-1. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
37 | Joaquin Gonzalez-Rodriguez, Julian Fiérrez-Aguilar, Javier Ortega-Garcia, Jose Juan Lucena-Molina |
Biometric Identification in Forensic Cases According to the Bayesian Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Biometric Authentication ![In: Biometric Authentication, International ECCV 2002 Workshop Copenhagen, Denmark, June 1, 2002, Proceedings, pp. 177-185, 2002, Springer, 3-540-43723-1. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
37 | Raffaele Cappelli, Dario Maio, Davide Maltoni |
Subspace Classification for Face Recognition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Biometric Authentication ![In: Biometric Authentication, International ECCV 2002 Workshop Copenhagen, Denmark, June 1, 2002, Proceedings, pp. 133-142, 2002, Springer, 3-540-43723-1. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
37 | Klaus J. Kirchberg, Oliver Jesorsky, Robert Frischholz |
Genetic Model Optimization for Hausdorff Distance-Based Face Localization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Biometric Authentication ![In: Biometric Authentication, International ECCV 2002 Workshop Copenhagen, Denmark, June 1, 2002, Proceedings, pp. 103-111, 2002, Springer, 3-540-43723-1. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
37 | Kenneth Nilsson, Josef Bigün |
Complex Filters Applied to Fingerprint Images Detecting Prominent Symmetry Points Used for Alignment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Biometric Authentication ![In: Biometric Authentication, International ECCV 2002 Workshop Copenhagen, Denmark, June 1, 2002, Proceedings, pp. 39-47, 2002, Springer, 3-540-43723-1. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
37 | Juneho Yi, Jongsun Kim, Jongmoo Choi, JungHyun Han, Eunseok Lee 0001 |
Face Recognition Based on ICA Combined with FLD. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Biometric Authentication ![In: Biometric Authentication, International ECCV 2002 Workshop Copenhagen, Denmark, June 1, 2002, Proceedings, pp. 10-18, 2002, Springer, 3-540-43723-1. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
37 | Hichem Sahbi, Nozha Boujemaa |
Robust Face Recognition Using Dynamic Space Warping. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Biometric Authentication ![In: Biometric Authentication, International ECCV 2002 Workshop Copenhagen, Denmark, June 1, 2002, Proceedings, pp. 121-132, 2002, Springer, 3-540-43723-1. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
37 | Gian Luca Marcialis, Fabio Roli |
Fusion of LDA and PCA for Face Verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Biometric Authentication ![In: Biometric Authentication, International ECCV 2002 Workshop Copenhagen, Denmark, June 1, 2002, Proceedings, pp. 30-38, 2002, Springer, 3-540-43723-1. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
37 | Arun Ross, James Reisman, Anil K. Jain 0001 |
Fingerprint Matching Using Feature Space Correlation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Biometric Authentication ![In: Biometric Authentication, International ECCV 2002 Workshop Copenhagen, Denmark, June 1, 2002, Proceedings, pp. 48-57, 2002, Springer, 3-540-43723-1. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
37 | L. Lee, W. Eric L. Grimson |
Gait Appearance for Recognition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Biometric Authentication ![In: Biometric Authentication, International ECCV 2002 Workshop Copenhagen, Denmark, June 1, 2002, Proceedings, pp. 143-154, 2002, Springer, 3-540-43723-1. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
37 | Hichem Sahbi, Nozha Boujemaa |
Coarse to Fine Face Detection Based on Skin Color Adaption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Biometric Authentication ![In: Biometric Authentication, International ECCV 2002 Workshop Copenhagen, Denmark, June 1, 2002, Proceedings, pp. 112-120, 2002, Springer, 3-540-43723-1. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
37 | Oscar Déniz, Modesto Castrillón Santana, Javier Lorenzo 0001, Mario Hernández |
An Incremental Learning Algorithm for Face Recognition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Biometric Authentication ![In: Biometric Authentication, International ECCV 2002 Workshop Copenhagen, Denmark, June 1, 2002, Proceedings, pp. 1-9, 2002, Springer, 3-540-43723-1. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
37 | Carlos E. Thomaz, Duncan Fyfe Gillies, Raul Queiroz Feitosa |
A New Quadratic Classifier Applied to Biometric Recognition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Biometric Authentication ![In: Biometric Authentication, International ECCV 2002 Workshop Copenhagen, Denmark, June 1, 2002, Proceedings, pp. 186-196, 2002, Springer, 3-540-43723-1. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
37 | Chiraz BenAbdelkader, Ross Cutler, Larry S. Davis |
View-invariant Estimation of Height and Stride for Gait Recognition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Biometric Authentication ![In: Biometric Authentication, International ECCV 2002 Workshop Copenhagen, Denmark, June 1, 2002, Proceedings, pp. 155-167, 2002, Springer, 3-540-43723-1. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
35 | Zhongying Niu, Ke Zhou 0001, Hong Jiang 0001, Tianming Yang, Wei Yan |
Identification and Authentication in Large-Scale Storage Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NAS ![In: International Conference on Networking, Architecture, and Storage, NAS 2009, 9-11 July 2009, Zhang Jia Jie, Hunan, China, pp. 421-427, 2009, IEEE Computer Society, 978-0-7695-3741-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
35 | Levente Buttyán, László Dóra |
An authentication scheme for QoS-aware multi-operator maintained wireless mesh networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOWMOM ![In: 10th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, WOWMOM 2009, Kos Island, Greece, 15-19 June, 2009, pp. 1-6, 2009, IEEE Computer Society, 978-1-4244-4439-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
35 | Mei Song, Li Wang 0039, Jianwen Huang, Junde Song |
An optimal interworking authentication scheme based on EAP-AKA for heterogeneous access networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCECE ![In: Proceedings of the 22nd Canadian Conference on Electrical and Computer Engineering, CCECE 2009, 3-6 May 2009, Delta St. John's Hotel and Conference Centre, St. John's, Newfoundland, Canada, pp. 794-797, 2009, IEEE, 978-1-4244-3508-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
35 | Zhexuan Song, Seigo Kotani, Ryusuke Masuoka |
Building an Independent Integrated Authentication Service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICYCS ![In: Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008, Zhang Jia Jie, Hunan, China, November 18-21, 2008, pp. 2254-2259, 2008, IEEE Computer Society, 978-0-7695-3398-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
35 | Zhishou Zhang, Qibin Sun, Wai-Choong Wong, John G. Apostolopoulos, Susie J. Wee |
Rate-Distortion-Authentication Optimized Streaming of Authenticated Video. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Circuits Syst. Video Technol. ![In: IEEE Trans. Circuits Syst. Video Technol. 17(5), pp. 544-557, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
35 | Brahim Gaabab, David Binet, Jean-Marie Bonnin |
Authentication Optimization for Seamless Handovers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Integrated Network Management ![In: Integrated Network Management, IM 2007. 10th IFIP/IEEE International Symposium on Integrated Network Management, Munich, Germany, 21-25 May 2007, pp. 829-832, 2007, IEEE. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
35 | B. Sathish Babu, Pallapa Venkataram |
Transaction Based Authentication Scheme for Mobile Communication: A Cognitive Agent Based Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPDPS ![In: 21th International Parallel and Distributed Processing Symposium (IPDPS 2007), Proceedings, 26-30 March 2007, Long Beach, California, USA, pp. 1-8, 2007, IEEE. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
35 | Men Long, Chwan-Hwa John Wu |
Energy-efficient and intrusion-resilient authentication for ubiquitous access to factory floor information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Ind. Informatics ![In: IEEE Trans. Ind. Informatics 2(1), pp. 40-47, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
35 | He Zheng, Jin Kwak, Kyungho Son, Wansuk Lee, Seungjoo Kim, Dongho Won |
Confidence Value Based Multi Levels of Authentication for Ubiquitous Computing Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (2) ![In: Computational Science and Its Applications - ICCSA 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part II, pp. 954-963, 2006, Springer, 3-540-34072-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
35 | Daesung Lee 0001, Ki-Chang Kim, Year Back Yoo |
IPBio: Embedding Biometric Data in IP Header for Per-Packet Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPA Workshops ![In: Frontiers of High Performance Computing and Networking - ISPA 2006 Workshops, ISPA 2006 International Workshops, FHPCN, XHPC, S-GRACE, GridGIS, HPC-GTP, PDCE, ParDMCom, WOMP, ISDF, and UPWN, Sorrento, Italy, December 4-7, 2006, Proceedings, pp. 927-938, 2006, Springer, 3-540-49860-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
35 | Insu Kim, Keecheon Kim |
Design of Authentication Mechanism Using PANA CTP in FMIPv6 Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPA Workshops ![In: Frontiers of High Performance Computing and Networking - ISPA 2006 Workshops, ISPA 2006 International Workshops, FHPCN, XHPC, S-GRACE, GridGIS, HPC-GTP, PDCE, ParDMCom, WOMP, ISDF, and UPWN, Sorrento, Italy, December 4-7, 2006, Proceedings, pp. 1034-1043, 2006, Springer, 3-540-49860-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
35 | YeongGeun Choe, Soon-Ja Kim |
Secure Password Authentication for Keystroke Dynamics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES (3) ![In: Knowledge-Based Intelligent Information and Engineering Systems, 9th International Conference, KES 2005, Melbourne, Australia, September 14-16, 2005, Proceedings, Part III, pp. 317-324, 2005, Springer, 3-540-28896-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
35 | C. K. Wong, Agnes Chan |
Immediate Data Authentication for Multicast in Resource Constrained Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005, Proceedings, pp. 113-121, 2005, Springer, 3-540-26547-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
35 | Kanako Yokota, Tatsuhiro Yonekura |
A Proposal of COMPASS (COMmunity Portrait Authentication SyStem). ![Search on Bibsonomy](Pics/bibsonomy.png) |
CW ![In: 4th International Conference on Cyberworlds (CW 2005), 23-25 November 2005, Singapore, pp. 363-367, 2005, IEEE Computer Society, 0-7695-2378-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
35 | Hae Yong Kim, Amir Afif |
Secure Authentication Watermarking for Binary Images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIBGRAPI ![In: 16th Brazilian Symposium on Computer Graphics and Image Processing (SIBGRAPI 2003), 12-15 October 2003, Sao Carlos, Brazil, pp. 199-206, 2003, IEEE Computer Society, 0-7695-2032-4. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
35 | Cástor Mariño, Manuel G. Penedo, María J. Carreira, F. González |
Retinal Angiography Based Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIARP ![In: Progress in Pattern Recognition, Speech and Image Analysis, 8th Iberoamerican Congress on Pattern Recognition, CIARP 2003, Havana, Cuba, November 26-29, 2003, Proceedings, pp. 306-313, 2003, Springer, 3-540-20590-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
35 | Reouven Elbaz, David Champagne, Catherine H. Gebotys, Ruby B. Lee, Nachiketh R. Potlapally, Lionel Torres |
Hardware Mechanisms for Memory Authentication: A Survey of Existing Techniques and Engines. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Trans. Comput. Sci. ![In: Transactions on Computational Science IV, Special Issue on Security in Computing, pp. 1-22, 2009, Springer, 978-3-642-01003-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Memory Authentication, Integrity Trees, Board level attacks, Security, Trusted Computing, Active attacks |
35 | Pascal Bou Nassar, Youakim Badr, Frédérique Biennier, Kablan Barbar |
Extended BPEL with heterogeneous authentication mechanisms in service ecosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MEDES ![In: MEDES '09: International ACM Conference on Management of Emergent Digital EcoSystems, Lyon, France, October 27-30, 2009, pp. 126-133, 2009, ACM, 978-1-60558-829-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
authentication, BPEL, web service composition, SSO |
35 | Youngsook Lee, Dongho Won |
Enhancing of a Password-Based Authentication Scheme Using Smart Cards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OTM Conferences (2) ![In: On the Move to Meaningful Internet Systems: OTM 2009, Confederated International Conferences, CoopIS, DOA, IS, and ODBASE 2009, Vilamoura, Portugal, November 1-6, 2009, Proceedings, Part II, pp. 879-886, 2009, Springer, 978-3-642-05150-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
two-factor security, smart card, dictionary attack, impersonation attack, Authentication scheme |
35 | Lingling Wang, Guoyin Zhang, Chunguang Ma |
ID-based deniable ring authentication with constant-size signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Frontiers Comput. Sci. China ![In: Frontiers Comput. Sci. China 2(1), pp. 106-112, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
deniable ring authentication, constant-size signature, privacy, bilinear pairings, ID-based |
35 | Eun-Jun Yoon, Kee-Young Yoo |
Improving the Host Authentication Mechanism for POD Copy Protection System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
New Directions in Intelligent Interactive Multimedia ![In: New Directions in Intelligent Interactive Multimedia, pp. 373-383, 2008, Springer, 978-3-540-68126-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Host authentication, POD copy protection system, Diffie-Hellman key agreement, Replay attack |
35 | Kaleb Brasee, S. Kami Makki, Sherali Zeadally |
A Novel Distributed Authentication Framework for Single Sign-On Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SUTC ![In: IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC 2008), 11-13 June 2008, Taichung, Taiwan, pp. 52-58, 2008, IEEE Computer Society, 978-0-7695-3158-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
SeDSSO, Distributed systems, Computer security, Single sign-on, Two-factor authentication |
35 | Chwan-Hwa John Wu, Tong Liu |
Simulation for intrusion-resilient, DDoS-resistant authentication system (IDAS). ![Search on Bibsonomy](Pics/bibsonomy.png) |
SpringSim ![In: Proceedings of the 2008 Spring Simulation Multiconference, SpringSim 2008, Ottawa, Canada, April 14-17, 2008, pp. 844-851, 2008, SCS/ACM, 1-56555-319-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
computer network defense, authentication, network security, discrete event simulation, DDoS, intrusion |
35 | David Champagne, Reouven Elbaz, Ruby B. Lee |
The Reduced Address Space (RAS) for Application Memory Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings, pp. 47-63, 2008, Springer, 978-3-540-85884-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Memory authentication, integrity tree, secure computing architecture |
35 | Sridhar Machiraju, Hao Chen 0003, Jean Bolot |
Distributed authentication for low-cost wireless networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HotMobile ![In: Proceedings of the 9th Workshop on Mobile Computing Systems and Applications, HotMobile 2008, Napa Valley, California, USA, February 25-26, 2008, pp. 55-59, 2008, ACM, 978-1-60558-118-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
token transfer, authentication, distributed |
35 | Gabriele Lenzini |
Trust-Based and Context-Aware Authentication in a Software Architecture for Context and Proximity-Aware Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WADS ![In: Architecting Dependable Systems VI, pp. 284-307, 2008, Springer, 978-3-642-10247-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
context-aware software architectures, trust-based authentication, Subjective Logic |
35 | Andrew Harding, Timothy W. van der Horst, Kent E. Seamons |
Wireless authentication using remote passwords. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the First ACM Conference on Wireless Network Security, WISEC 2008, Alexandria, VA, USA, March 31 - April 02, 2008, pp. 24-29, 2008, ACM, 978-1-59593-814-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
SAW, decentralized wireless authentication, SRP |
35 | Dacheng Zhang, Jie Xu 0007, Xianxian Li |
Dynamic Cross-Realm Authentication for Multi-Party Service Interactions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSN ![In: The 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2007, 25-28 June 2007, Edinburgh, UK, Proceedings, pp. 440-449, 2007, IEEE Computer Society, 0-7695-2855-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Secure Service Collaborations, Workflow Business Sessions, Web Services, Authentication, Multi-Party Interactions |
35 | Jodie P. Boyer, Ragib Hasan, Lars E. Olson 0001, Nikita Borisov, Carl A. Gunter, David Raila |
Improving multi-tier security using redundant authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSAW ![In: Proceedings of the 2007 ACM workshop on Computer Security Architecture, CSAW 2007, Fairfax, VA, USA, November 2, 2007, pp. 54-62, 2007, ACM, 978-1-59593-890-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Building Automation Systems, authentication |
35 | Goce Jakimoski, K. P. Subbalakshmi |
On Efficient Message Authentication Via Block Cipher Design Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings, pp. 232-248, 2007, Springer, 978-3-540-76899-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Wegman-Carter construction, maximum differential probability, block ciphers, Message authentication, universal hash functions |
35 | Giorgos Kostopoulos, Odysseas G. Koufopavlou |
Security Analysis of SIP Signalling during NASS-IMS bundled Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNS ![In: Third International Conference on Networking and Services (ICNS 2007), June 19-25, 2007, Athens, Greece, pp. 35, 2007, IEEE Computer Society, 978-0-7695-2858-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
TISPAN, NASS-IMS Authentication, SIP Analysis, IP Multimedia Subsystem |
35 | Guido Rotondi, Gianpiero Guerrera |
A consistent history authentication protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGSOFT Softw. Eng. Notes ![In: ACM SIGSOFT Softw. Eng. Notes 31(3), pp. 1-7, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
dentification, authentication, trust, non repudiation, SSL |
35 | Rocío Quixtiano-Xicohténcatl, Orion Fausto Reyes-Galaviz, Leticia Flores-Pulido, Carlos A. Reyes García |
Hybrid Algorithm Applied to Feature Selection for Speaker Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MICAI ![In: MICAI 2006: Advances in Artificial Intelligence, 5th Mexican International Conference on Artificial Intelligence, Apizaco, Mexico, November 13-17, 2006, Proceedings, pp. 1075-1084, 2006, Springer, 3-540-49026-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Speaker Authentication, Genetic Algorithms, Hybrid System, Search Space, Feed-Forward |
35 | HongKi Lee, DaeHun Nyang, JooSeok Song |
Message and Its Origin Authentication Protocol for Data Aggregation in Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC Workshops ![In: Emerging Directions in Embedded and Ubiquitous Computing, EUC 2006 Workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Seoul, Korea, August 1-4, 2006, Proceedings, pp. 281-290, 2006, Springer, 3-540-36850-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
sensor networks, authentication, aggregation, hash chain, Merkle tree |
35 | Jun-Cheol Jeon, Kee-Young Yoo |
Authentication Based on Singular Cellular Automata. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACRI ![In: Cellular Automata, 7th International Conference on Cellular Automata, for Research and Industry, ACRI 2006, Perpignan, France, September 20-23, 2006, Proceedings, pp. 605-610, 2006, Springer, 3-540-40929-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Singular Operation, Authentication, Cellular Automata, Hash function, One-Time Password |
35 | Byunggi Kim, Sang-Sun Hong |
Secure Mutual Authentication for Ad hoc Wireless Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Supercomput. ![In: J. Supercomput. 33(1-2), pp. 123-132, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
authentication, ad hoc wireless network |
35 | Mario Di Raimondo, Rosario Gennaro |
New approaches for deniable authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS 2005, Alexandria, VA, USA, November 7-11, 2005, pp. 112-121, 2005, ACM, 1-59593-226-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
authentication, concurrency, zero-knowledge, deniability |
35 | Andrea Oermann, Jana Dittmann, Claus Vielhauer |
Verifier-Tuple as a Classifier for Biometric Handwriting Authentication - Combination of Syntax and Semantics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Communications and Multimedia Security ![In: Communications and Multimedia Security, 9th IFIP TC-6 TC-11 International Conference, CMS 2005, Salzburg, Austria, September 19-21, 2005, Proceedings, pp. 170-179, 2005, Springer, 3-540-28791-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Security of Multimedia Content, Identification and Authentication, Biometrics |
35 | Shintaro Mizuno, Kohji Yamada, Kenji Takahashi |
Authentication using multiple communication channels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 2005 Workshop on Digital Identity Management, Fairfax, VA, USA, November 11, 2005, pp. 54-62, 2005, ACM, 1-59593-232-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
internet, authentication, mobile phone, multiple channels |
35 | Özer Aydemir, Ali Aydin Selçuk |
A Strong User Authentication Protocol for GSM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WETICE ![In: 14th IEEE International Workshops on Enabling Technologies (WETICE 2005), 13-15 June 2005, Linköping, Sweden, pp. 150-153, 2005, IEEE Computer Society, 0-7695-2362-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
strong password protocols, GSM, user authentication, Wireless network security |
35 | Ning Zhang 0001, Li Yao, Jay Chin, Aleksandra Nenadic, A. McNab, Alan L. Rector, Carole A. Goble, Qi Shi 0001 |
Plugging a Scalable Authentication Framework into Shibboleth. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WETICE ![In: 14th IEEE International Workshops on Enabling Technologies (WETICE 2005), 13-15 June 2005, Linköping, Sweden, pp. 271-276, 2005, IEEE Computer Society, 0-7695-2362-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Grid authentication, smart tokens, security architecture |
35 | Eun-Jun Yoon, Kee-Young Yoo |
Robust Secret Key Based Authentication Scheme Using Smart Cards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PCM (2) ![In: Advances in Multimedia Information Processing - PCM 2005, 6th Pacific-Rim Conference on Multimedia, Jeju Island, Korea, November 13-16, 2005, Proceedings, Part II, pp. 723-734, 2005, Springer, 3-540-30040-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
authentication, Cryptography, smart card, secret key |
35 | Judith E. Y. Rossebø, John Ronan, Kristian Walsh |
Authentication Issues in Multi-service Residential Access Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMNS ![In: Management of Multimedia Networks and Services, 6th IFIP/IEEE International Conference, MMNS 2003, Belfast, Northern Ireland, UK, September 7-10, 2003, Proceedings, pp. 381-395, 2003, Springer, 3-540-20050-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Authentication, Encryption, Public Key Infrastructure, Residential Gateway |
35 | Luciano Rila, Chris J. Mitchell |
Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, First International Conference, ACNS 2003. Kunming, China, October 16-19, 2003, Proceedings, pp. 254-264, 2003, Springer, 3-540-20208-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
cardholder authentication, biometrics, smartcards |
35 | Tommaso Cucinotta, Gabriele Cecchetti, Gianluca Ferraro |
Adopting Redundancy Techniques for Multicast Stream Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FTDCS ![In: 9th IEEE International Workshop on Future Trends of Distributed Computing Systems (FTDCS 2003), 28-30 May 2003, San Juan, Puerto Rico, Proceedings, pp. 183-189, 2003, IEEE Computer Society, 0-7695-1910-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Multicast stream authentication, digital signatures, forward error correction |
35 | Adrian Perrig, Ran Canetti, J. D. Tygar, Dawn Xiaodong Song |
Efficient Authentication and Signing of Multicast Streams over Lossy Channels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 2000 IEEE Symposium on Security and Privacy, Berkeley, California, USA, May 14-17, 2000, pp. 56-73, 2000, IEEE Computer Society, 0-7695-0665-8. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
Multicast Stream Authentication and Signature |
35 | Moni Naor, Benny Pinkas |
Visual Authentication and Identification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '97, 17th Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings, pp. 322-336, 1997, Springer, 3-540-63384-7. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
Authentication, identification, visual cryptography |
35 | Azad Jiwa, Jennifer Seberry, Yuliang Zheng 0001 |
Beacon Based Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 94, Third European Symposium on Research in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings, pp. 125-141, 1994, Springer, 3-540-58618-0. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
Term Index Beacon, Authentication, Network Security, Information Security, Security Protocol |
35 | Dongvu Tonien, Reihaneh Safavi-Naini, Peter Nickolas, Yvo Desmedt |
Unconditionally Secure Approximate Message Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWCC ![In: Coding and Cryptology, Second International Workshop, IWCC 2009, Zhangjiajie, China, June 1-5, 2009. Proceedings, pp. 233-247, 2009, Springer, 978-3-642-01813-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
approximate authentication, unconditional security, biometric authentication |
35 | Eugenio Faldella, Marco Prandini |
A Novel Approach to On-Line Status Authentication of Public-Key Certificates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 16th Annual Computer Security Applications Conference (ACSAC 2000), 11-15 December 2000, New Orleans, Louisiana, USA, pp. 270-277, 2000, IEEE Computer Society, 0-7695-0859-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
online status authentication, sensitive data exchange, security constraints, revoked certificates, certificate status handling scheme, one-way accumulator, Owa-based Revocation Scheme, Online Certificate Status Protocol, Internet, scalability, authentication, cryptography, protocols, data integrity, data integrity, computer networks, public key cryptography, public key infrastructure, message authentication, telecommunication security, certification authority, public-key certificates, computational load, public networks |
33 | Saber Zrelli, Yoichi Shinoda |
Specifying Kerberos over EAP: Towards an integrated network access and Kerberos single sign-on process. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA ![In: 21st International Conference on Advanced Information Networking and Applications (AINA 2007), May 21-23, 2007, Niagara Falls, Canada, pp. 490-497, 2007, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
33 | A. F. Al Shahri, D. Geoffrey Smith, James M. Irvine |
A Secure Network Access Protocol (SNAP). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June - 3 July 2003, Kiris-Kemer, Turkey, pp. 809-814, 2003, IEEE Computer Society, 0-7695-1961-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
33 | Manabu Hirano, Takeshi Okuda, Suguru Yamaguchi |
Application for a Simple Device Authentication Framework: Device Authentication Middleware Using Novel Smart Card Software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAINT Workshops ![In: 2007 International Symposium on Applications and the Internet - Workshops (SAINT 2007 Workshops), 15-19 January 2007, Hiroshima, Japan, pp. 31, 2007, IEEE Computer Society, 0-7695-2757-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
33 | Deok-Gyu Lee, Ilsun You, Sang-Choon Kim, Yun-kyung Lee, Jong Wook Han, Kyo-Il Chung |
Intelligent Home Network Authentication: S/Key-Based Home Device Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPA Workshops ![In: Frontiers of High Performance Computing and Networking ISPA 2007 Workshops, ISPA 2007 International Workshops SSDSN, UPWN, WISH, SGC, ParDMCom, HiPCoMB, and IST-AWSN Niagara Falls, Canada, August 28 - September 1, 2007, Proceedings, pp. 214-223, 2007, Springer, 978-3-540-74766-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
33 | Stephen Krawczyk, Anil K. Jain 0001 |
Securing Electronic Medical Records Using Biometric Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AVBPA ![In: Audio- and Video-Based Biometric Person Authentication, 5th International Conference, AVBPA 2005, Hilton Rye Town, NY, USA, July 20-22, 2005, Proceedings, pp. 1110-1119, 2005, Springer, 3-540-27887-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
33 | Jon A. Solworth |
Beacon certificate push revocation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSAW ![In: Proceedings of the 2nd ACM Workshop on Computer Security Architecture, CSAW 2008, Alexandria, VA, USA, October 31, 2008, pp. 59-66, 2008, ACM, 978-1-60558-300-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
authentication, certificate, public key infrastructure (pki), revocation |
33 | Tsuyoshi Abe, Hiroki Itoh, Kenji Takahashi |
Implementing identity provider on mobile phone. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 2007 Workshop on Digital Identity Management, Fairfax, VA, USA, November 2, 2007, pp. 46-52, 2007, ACM, 978-1-59593-889-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
identity provider, authentication, mobile phone, federated identity |
33 | Muhammad Ikram 0001, Aminul Haque Chowdhury, Bilal Zafar, Hyon-Soo Cha, Ki-Hyung Kim, Seung-Wha Yoo, Dong-Kyoo Kim |
A simple lightweight authentic bootstrapping protocol for IPv6-based low rate wireless personal area networks (6LoWPANs). ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWCMC ![In: Proceedings of the International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, IWCMC 2009, Leipzig, Germany, June 21-24, 2009, pp. 937-941, 2009, ACM, 978-1-60558-569-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
secure bootstrapping and mutual authentication, security, authentication, bootstrapping, 6lowpan |
33 | Sang-Ho Na, Kyu-Jin Kim, Mohammad Mehedi Hassan, Eui-nam Huh |
Identity-based secure protocol scheme for wireless sensor network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIS ![In: Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human (ICIS 2009), Seoul, Korea, 24-26 November 2009, pp. 555-560, 2009, ACM, 978-1-60558-710-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
ID-based authentication, clustering, wireless sensor network, authentication, proxy |
33 | Eunjong Kim, Ashish Gupta 0010, Batsukh Tsendjav, Daniel Massey |
Resolving islands of security problem for DNSSEC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWCMC ![In: Proceedings of the International Conference on Wireless Communications and Mobile Computing, IWCMC 2006, Vancouver, British Columbia, Canada, July 3-6, 2006, pp. 1271-1276, 2006, ACM, 1-59593-306-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
DNS security, authentication chains, sanity check, starting points, trust relationship, key distribution, bulletin board, key authentication |
33 | Kaisa Nyberg |
IKE in Ad Hoc IP Networking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESAS ![In: Security in Ad-hoc and Sensor Networks, First European Workshop, ESAS 2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers, pp. 139-151, 2004, Springer, 3-540-24396-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
ad hoc access, ad hoc authentication, ad hoc networking, key management, message authentication code, peer-to-peer communication, security association, IKEv2 |
33 | Liqun Chen 0002, Dieter Gollmann, Chris J. Mitchell |
Key distribution without individual trusted authentification servers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: The Eighth IEEE Computer Security Foundations Workshop (CSFW '95), March 13-15, 1995, Kenmare, County Kerry, Ireland, pp. 30-, 1995, IEEE Computer Society, 0-8186-7033-9. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
key distribution systems, authentication servers, key distribution protocols, cross checksum scheme, cryptography, trust, protocols, data integrity, message authentication, symmetric encryption |
33 | Robert R. Jueneman |
A High Speed Manipulation Detection Code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '86, Santa Barbara, California, USA, 1986, Proceedings, pp. 327-346, 1986, Springer. The full citation details ...](Pics/full.jpeg) |
1986 |
DBLP DOI BibTeX RDF |
Manipulation Detection Code (MDC), birthday problem attacks, numeric data processor chip, math coprocessor chip, 8087, 80287, authentication, cryptography, digital signature, encryption, Message Authentication Code (MAC), IBM PC, checksums |
33 | John Patrick McGregor, Ruby B. Lee |
Performance Impact of Data Compression on Virtual Private Network Transactions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: Proceedings 27th Conference on Local Computer Networks, Tampa, Florida, USA, 8-10 November, 2000, pp. 500-510, 2000, IEEE Computer Society, 0-7695-0912-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
virtual private network transactions, secure public network communications, host authentication, IP Security Protocol, IPsec transactions, network types, 1 Gbit/s, 10 Mbit/s, Internet, performance, authentication, cryptography, data integrity, data integrity, data compression, data compression, encryption, transport protocols, packet switching, cryptographic protocols, confidentiality, system model, IPsec, message authentication, data types, VPN, telecommunication networks, telecommunication security, business communication, compression algorithms, security services, cryptographic algorithms, packet sizes, 100 Mbit/s |
33 | Stephen H. Brackin |
A HOL extension of GNY for automatically analyzing cryptographic protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: Ninth IEEE Computer Security Foundations Workshop, March 10 - 12, 1996, Dromquinna Manor, Kenmare, County Kerry, Ireland, pp. 62-, 1996, IEEE Computer Society, 0-8186-7522-5. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
HOL extension, automatically analyzing cryptographic protocols, higher order logic theory, authentication properties, protocol properties, hash operations, key-exchange algorithms, formal specification, cryptography, message authentication, access protocols, message authentication codes, multiple encryption, belief maintenance, belief logic |
31 | Li Yao, Ning Zhang 0001 |
A Generic Authentication LoA Derivation Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Emerging Challenges for Security, Privacy and Trust, 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009. Proceedings, pp. 98-108, 2009, Springer, 978-3-642-01243-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
31 | Xiaodong Lin 0001, Rongxing Lu, Pin-Han Ho, Xuemin Shen, Zhenfu Cao |
TUA: A Novel Compromise-Resilient Authentication Architecture for Wireless Mesh Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Wirel. Commun. ![In: IEEE Trans. Wirel. Commun. 7(4), pp. 1389-1399, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
31 | Jorgen Cederlof, Jan-Åke Larsson |
Security Aspects of the Authentication Used in Quantum Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Theory ![In: IEEE Trans. Inf. Theory 54(4), pp. 1735-1741, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
31 | Zhenhua Wu |
Biometrics Authentication System on Open Network and Security Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISECS ![In: Proceedings of The International Symposium on Electronic Commerce and Security, ISECS 2008, August 3-5, 2008, Guangzhou, China, pp. 549-553, 2008, IEEE Computer Society, 978-0-7695-3258-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
31 | Ali Al Shidhani, Victor C. M. Leung |
Reducing re-authentication delays during UMTS-WLAN vertical handovers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PIMRC ![In: Proceedings of the IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC 2008, 15-18 September 2008, Cannes, French Riviera, France, pp. 1-5, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
31 | Yan Zhang 0002 |
Authentication Overhead in Wireless Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: Proceedings of IEEE International Conference on Communications, ICC 2008, Beijing, China, 19-23 May 2008, pp. 1505-1509, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
31 | Jiao Zhang, Yujun Zhang, Ye Tian, Zhongcheng Li |
CPK-based fast authentication method in Mobile IPv6 networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), July 6-9, Marrakech, Morocco, pp. 234-239, 2008, IEEE Computer Society, 978-1-4244-2702-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
31 | Sebastian Gajek, Mark Manulis, Jörg Schwenk |
Enforcing User-Aware Browser-Based Mutual Authentication with Strong Locked Same Origin Policy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings, pp. 6-20, 2008, Springer, 978-3-540-69971-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
31 | Zhishou Zhang, Qibin Sun, Wai-Choong Wong, John G. Apostolopoulos, Susie J. Wee |
An Optimized Content-Aware Authentication Scheme for Streaming JPEG-2000 Images Over Lossy Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Multim. ![In: IEEE Trans. Multim. 9(2), pp. 320-331, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
31 | Hannan Xiao, James A. Malcolm, Bruce Christianson, Ying Zhang 0020 |
Hierarchical Trustworthy Authentication for Pervasive Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiQuitous ![In: 4th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2007), August 6-10, 2007, Philadelphia, PA, USA, pp. 1-3, 2007, IEEE Computer Society, 978-1-4244-1024-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
31 | Arjan Durresi, Vamsi Paruchuri, Mimoza Durresi, Leonard Barolli |
Secure Spatial Authentication using Cell Phones. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Second International Conference on Availability, Reliability and Security, ARES 2007, The International Dependability Conference - Bridging Theory and Practice, April 10-13 2007, Vienna, Austria, pp. 543-549, 2007, IEEE Computer Society, 0-7695-2775-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
31 | Masahiro Kuroda, Ritsu Nomura, Wade Trappe |
A Radio-independent Authentication Protocol (EAP-CRP) for Networks of Cognitive Radios. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECON ![In: Proceedings of the Fourth Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON 2007, Merged with IEEE International Workshop on Wireless Ad-hoc and Sensor Networks (IWWAN), June 18-21, 2007, San Diego, California, USA, pp. 70-79, 2007, IEEE, 1-4244-1268-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
31 | Youngjun Kim, Jason Kim 0004 |
U-City User Authentication Methods and Encryption Techniques Based on Biometric Technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FBIT ![In: Frontiers in the Convergence of Bioscience and Information Technologies 2007, FBIT 2007, Jeju Island, Korea, October 11-13, 2007, pp. 695-697, 2007, IEEE Computer Society, 978-0-7695-2999-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
Displaying result #101 - #200 of 25398 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ >>] |
|