|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 8079 occurrences of 2235 keywords
|
|
|
Results
Found 25398 publication records. Showing 25398 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
31 | Jinsuo Zhang, Stacey Franklin Jones |
uKey: A Unified Key Management and Authentication Automation Middleware For Heterogeneous System. |
ITNG |
2007 |
DBLP DOI BibTeX RDF |
|
31 | Razib Iqbal, Shervin Shirmohammadi, Jiying Zhao |
Hard Authentication of H.264 Video Applying MPEG-21 Generic Bitstream Syntax Description (gBSD). |
ICME |
2007 |
DBLP DOI BibTeX RDF |
|
31 | Shingo Orihara, Yukio Tsuruoka, Kenji Takahashi |
Certificate-less user authentication with consent. |
Digital Identity Management |
2007 |
DBLP DOI BibTeX RDF |
certificate-less, consent, public key cryptography, password |
31 | Steffen Hallsteinsen, Ivar Jørstad, Do Van Thanh 0001 |
Using the mobile phone as a security token for unified authentication. |
ICSNC |
2007 |
DBLP DOI BibTeX RDF |
authentcation, mobility |
31 | Jong-Hyouk Lee, Young-Ju Han, Tai-Myoung Chung |
Local Authentication Scheme Based on AAA in Mobile IPv6 Networks. |
MMM (2) |
2007 |
DBLP DOI BibTeX RDF |
|
31 | Aleksandra Nenadic, Ning Zhang 0001, Jay Chin, Carole A. Goble |
FAME: Adding Multi-Level Authentication to Shibboleth. |
e-Science |
2006 |
DBLP DOI BibTeX RDF |
|
31 | Cheol-seung Lee, Hyeong-Gyun Kim, Joon Lee |
Design of User Authentication System based on WPKI. |
CSCWD |
2006 |
DBLP DOI BibTeX RDF |
|
31 | Ilsun You |
A One-Time Password Authentication Scheme for Secure Remote Access in Intelligent Home Networks. |
KES (2) |
2006 |
DBLP DOI BibTeX RDF |
|
31 | Zhishou Zhang, Qibin Sun, Wai-Choong Wong, John G. Apostolopoulos, Susie J. Wee |
A Content-Aware Stream Authentication Scheme Optimized for Distortion and Overhead. |
ICME |
2006 |
DBLP DOI BibTeX RDF |
|
31 | Lee-Sub Lee, KyungSun Choi, Dongwon Jeong, Soo-Hyun Park, JuHum Kwon |
An Inter-Domain Authentication Mechanism for XMPP/Jabber. |
SERA |
2006 |
DBLP DOI BibTeX RDF |
|
31 | Muhammad Khurram Khan, Jiashu Zhang |
An Efficient and Practical Fingerprint-Based Remote User Authentication Scheme with Smart Cards. |
ISPEC |
2006 |
DBLP DOI BibTeX RDF |
|
31 | Jaeil Lee, Inkyoung Jeun, Seoklae Lee |
Efficient Attribute Authentication in Wireless Mobile Networks. |
ISPA Workshops |
2006 |
DBLP DOI BibTeX RDF |
|
31 | Yao Zhao, Chuang Lin 0002, Hao Yin |
Security Authentication of 3G-WLAN Interworking. |
AINA (2) |
2006 |
DBLP DOI BibTeX RDF |
|
31 | Yi-Bing Lin, Ming-Feng Chang, Meng-Ta Hsu, Lin-Yi Wu |
One-pass GPRS and IMS authentication procedure for UMTS. |
IEEE J. Sel. Areas Commun. |
2005 |
DBLP DOI BibTeX RDF |
|
31 | Arnab Paul, Rajnish Kumar, Umakishore Ramachandran |
LAWN: A Protocol for Remote Authentication overWireless Networks. |
NCA |
2005 |
DBLP DOI BibTeX RDF |
|
31 | Siraj A. Shaikh, Vicky J. Bush, Steve A. Schneider |
Specifying Authentication Using Signal Events in CSP. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
|
31 | Xiaoyun Wu, Xiaoping Liang, Hongmei Liu 0001, Jiwu Huang, Guoping Qiu |
Reversible Semi-fragile Image Authentication Using Zernike Moments and Integer Wavelet Transform. |
DRMTICS |
2005 |
DBLP DOI BibTeX RDF |
|
31 | Torsten Braun, Hahnsang Kim |
Efficient Authentication and Authorization of Mobile Users Based on Peer-to-Peer Network Mechanisms. |
HICSS |
2005 |
DBLP DOI BibTeX RDF |
|
31 | Hoon Ko, Bangyong Sohn, Hayoung Park, Yongtae Shin |
Safe Authentication Method for Security Communication in Ubiquitous. |
ICCSA (2) |
2005 |
DBLP DOI BibTeX RDF |
|
31 | Miyoung Kim, Misun Kim, Youngsong Mun |
A Hierarchical Authentication Scheme for MIPv6 Node with Local Movement Property. |
ICCSA (1) |
2005 |
DBLP DOI BibTeX RDF |
|
31 | Lanjun Dang, Weidong Kou, Yuxia Xiao |
An Improved Scheme for Unilateral Asymmetric Smart Card Authentication. |
AINA |
2005 |
DBLP DOI BibTeX RDF |
|
31 | Harald Vogt |
Exploring Message Authentication in Sensor Networks. |
ESAS |
2004 |
DBLP DOI BibTeX RDF |
|
31 | Sun-Sik Roh, Su-Hyun Kim, Gwang-Hyun Kim |
Design of Authentication and Key Exchange Protocol in Ethernet Passive Optical Networks. |
ICCSA (1) |
2004 |
DBLP DOI BibTeX RDF |
|
31 | Hui Liu, Minglu Li 0001 |
Multiparty Joint Authentication: Extending the Semantics of Single Sign-On for Grids. |
GCC Workshops |
2004 |
DBLP DOI BibTeX RDF |
|
31 | Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati |
A Novel Remote User Authentication Scheme Through Dynamic Login Identity. |
IWDC |
2004 |
DBLP DOI BibTeX RDF |
|
31 | Hugo Gamboa, Ana L. N. Fred |
A User Authentication Technic Using a~Web Interaction Monitoring System. |
IbPRIA |
2003 |
DBLP DOI BibTeX RDF |
|
31 | Chai Wah Wu |
On the design of content-based multimedia authentication systems. |
IEEE Trans. Multim. |
2002 |
DBLP DOI BibTeX RDF |
|
31 | Chi-Chun Lo, Yi-Chun Yeh |
Authentication protocols for the broadband ISDN billing system. |
NOMS |
2000 |
DBLP DOI BibTeX RDF |
|
31 | Yonatan Aumann, Michael O. Rabin |
Authentication, Enhanced Security and Error Correcting Codes (Extended Abstract). |
CRYPTO |
1998 |
DBLP DOI BibTeX RDF |
|
31 | Albrecht Beutelspacher |
Perfect and Essentially Perfect Authentication Schemes. |
EUROCRYPT |
1987 |
DBLP DOI BibTeX RDF |
|
31 | Gustavus J. Simmons |
The Practice of Authentication. |
EUROCRYPT |
1985 |
DBLP DOI BibTeX RDF |
|
31 | David Kim, Paul Dunphy, Pamela Briggs, Jonathan Hook, John Nicholson, James Nicholson, Patrick Olivier |
Multi-touch authentication on tabletops. |
CHI |
2010 |
DBLP DOI BibTeX RDF |
user authentication, graphical passwords, multi-touch interaction, shoulder surfing |
31 | Ribao Wei, Dingfeng Ye |
Delegate predicate encryption and its application to anonymous authentication. |
AsiaCCS |
2009 |
DBLP DOI BibTeX RDF |
predicate encryption, anonymous authentication |
31 | Eun-A Jun, Jea Doek Ji, Jongin Lim 0001, Seok Won Jung |
Improved remote user authentication scheme using bilinear pairings. |
ICHIT |
2009 |
DBLP DOI BibTeX RDF |
authentication, smart card, bilinear pairings |
31 | Yutaka Oiwa, Hiromitsu Takagi, Hajime Watanabe, Hirofumi Suzuki |
PAKE-based mutual HTTP authentication for preventing phishing attacks. |
WWW |
2009 |
DBLP DOI BibTeX RDF |
http, mutual authentication, web systems |
31 | Hongwei Li 0001, Yuanshun Dai, Ling Tian, Haomiao Yang |
Identity-Based Authentication for Cloud Computing. |
CloudCom |
2009 |
DBLP DOI BibTeX RDF |
authentication, cloud computing, identity-based cryptography |
31 | Mohamed Abid, Songbo Song, Hassnaa Moustafa, Hossam Afifi |
Efficient identity-based authentication for IMS based services access. |
MoMM |
2009 |
DBLP DOI BibTeX RDF |
identity based cryptography (IBC), personalized access, service authentication, IP multimedia subsystem (IMS) |
31 | Kyunghwa Lee, Joohyun Lee, Bongduk Zhang, Jaeho Kim, Yongtae Shin |
An Enhanced Trust Center Based Authentication in ZigBee Networks. |
ISA |
2009 |
DBLP DOI BibTeX RDF |
sensor security, sensor authentication, key management, ZigBee |
31 | Bruno Elias Penteado, Aparecido Nilceu Marana |
A Video-Based Biometric Authentication for e-Learning Web Applications. |
ICEIS |
2009 |
DBLP DOI BibTeX RDF |
e-Learning, Face recognition, Biometrics, Web authentication |
31 | Adil Haouzia, Rita Noumeir |
Methods for image authentication: a survey. |
Multim. Tools Appl. |
2008 |
DBLP DOI BibTeX RDF |
Digital image signature, Cryptography, Image authentication, Fragile watermarking, Image content, Semi-fragile watermarking |
31 | Tao Feng, Fenghua Li, Jianfeng Ma 0001, Sang-Jae Moon |
A new approach for UC security concurrent deniable authentication. |
Sci. China Ser. F Inf. Sci. |
2008 |
DBLP DOI BibTeX RDF |
concurrent deniable authentication, verifiably smooth projective hashing, the decisional composite residuosity assumption, information security, universally composable |
31 | Debasis Giri, Parmeshwary Dayal Srivastava |
Cryptanalysis and Improvement of a Remote User Authentication Scheme using Smart Cards. |
ISECS |
2008 |
DBLP DOI BibTeX RDF |
Authentication, Cryptanalysis, Smart Card, Timestamp |
31 | Patrick P. Tsang, Man Ho Au, Apu Kapadia, Sean W. Smith |
PEREA: towards practical TTP-free revocation in anonymous authentication. |
CCS |
2008 |
DBLP DOI BibTeX RDF |
non-membership proofs, privacy-enhanced revocation, subjective blacklisting, anonymous authentication |
31 | Manik Lal Das, V. Lakshmi Narasimhan |
EARS: Efficient Entity Authentication in Remote Systems. |
ITNG |
2008 |
DBLP DOI BibTeX RDF |
Authentication, Smart card, Hash function, Password |
31 | Alexander De Luca, Roman Weiss, Heinrich Hußmann, Xueli An |
Eyepass - eye-stroke authentication for public terminals. |
CHI Extended Abstracts |
2008 |
DBLP DOI BibTeX RDF |
security, privacy, authentication, eye-gestures |
31 | Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Thierry Pun |
Multimodal authentication based on random projections and source coding. |
MM&Sec |
2008 |
DBLP DOI BibTeX RDF |
multimodal authentication, dimensionality reduction, fusion, hypothesis testing, random projections |
31 | Takumi Yamamoto, Atsushi Harada, Takeo Isarida, Masakatsu Nishigaki |
Improvement of User Authentication Using Schema of Visual Memory: Exploitation of "Schema of Story". |
AINA |
2008 |
DBLP DOI BibTeX RDF |
image-based user authentication system, observing attack, unclear image, schema, story |
31 | Sinjini Mitra, Marios Savvides, Anthony Brockwell |
Statistical Performance Evaluation of Biometric Authentication Systems Using Random Effects Models. |
IEEE Trans. Pattern Anal. Mach. Intell. |
2007 |
DBLP DOI BibTeX RDF |
watch-list, performance evaluation, authentication, Biometrics, face, random effects model |
31 | Eun-Jun Yoon, Kee-Young Yoo |
Improving the Sun-Cao's Public Key Authentication Scheme for Non-repudiation. |
ICIC (3) |
2007 |
DBLP DOI BibTeX RDF |
Public key substitution attack, Cryptanalysis, Non-repudiation, Key authentication |
31 | Nai-Wei Lo, Kuo-Hui Yeh |
Novel RFID Authentication Schemes for Security Enhancement and System Efficiency. |
Secure Data Management |
2007 |
DBLP DOI BibTeX RDF |
Security, Privacy, Authentication, RFID |
31 | Julien Bringer, Hervé Chabanne, Malika Izabachène, David Pointcheval, Qiang Tang 0001, Sébastien Zimmer |
An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication. |
ACISP |
2007 |
DBLP DOI BibTeX RDF |
privacy, Authentication, biometrics |
31 | Weidong Shi, Hsien-Hsin S. Lee |
Accelerating memory decryption and authentication with frequent value prediction. |
Conf. Computing Frontiers |
2007 |
DBLP DOI BibTeX RDF |
message authentication, value prediction, secure processors |
31 | Jin-Oh Jeon, Su-Bong Ryu, Sang-Jo Park, Min-Sup Kang |
Strong Authentication Protocol for RFID Tag Using SHA-1 Hash Algorithm. |
ICCSA (1) |
2007 |
DBLP DOI BibTeX RDF |
Strong authentication protocol, SHA-1 hash algorithm, Three-way challenge response, ISO/IEC 1800-3 standard, Digital Codec design, RFID Tag |
31 | Chin-Chen Chang 0001, Chih-Chiang Tsou, Yung-Chen Chou |
A Remediable Image Authentication Scheme Based on Feature Extraction and Clustered VQ. |
PCM |
2007 |
DBLP DOI BibTeX RDF |
quad-tree segmentation, Image authentication, tampering detection |
31 | Georgios Kambourakis, Stefanos Gritzalis |
On Device Authentication in Wireless Networks: Present Issues and Future Challenges. |
TrustBus |
2007 |
DBLP DOI BibTeX RDF |
Device authentication, Wireless security, 802.1X, TCG |
31 | Yanjiang Yang, Robert H. Deng, Feng Bao 0001 |
A Practical Password-Based Two-Server Authentication and Key Exchange System. |
IEEE Trans. Dependable Secur. Comput. |
2006 |
DBLP DOI BibTeX RDF |
Password system, password verification data (PVD), offline dictionary attack, key exchange, user authentication |
31 | Shang-Ming Chang, Shiuhpyng Shieh, Warren W. Lin, Chih-Ming Hsieh |
An efficient broadcast authentication scheme in wireless sensor networks. |
AsiaCCS |
2006 |
DBLP DOI BibTeX RDF |
key renewal, wireless sensor networks, authentication, broadcast, one time signature |
31 | Deok-Gyu Lee, Jong Sik Moon, Jong Hyuk Park, Im-Yeong Lee |
Authentication for Ubiquitous Multi Domain in Pervasive Computing Using PMI. |
HPCC |
2006 |
DBLP DOI BibTeX RDF |
Authentication, Pervasive Computing, Multi Domain, PMI |
31 | Tzung-Han Lin, Wen-Pin Shih, Wen-Chao Chen, W. Y. Ho |
3D face authentication by mutual coupled 3D and 2D feature extraction. |
ACM Southeast Regional Conference |
2006 |
DBLP DOI BibTeX RDF |
automatic feature detection, face recognition, face authentication |
31 | Jun-Cheol Jeon, Byung-Heon Kang, Se-Min Kim, Wan-Soo Lee, Kee-Young Yoo |
An Improvement of Remote User Authentication Scheme Using Smart Cards. |
MSN |
2006 |
DBLP DOI BibTeX RDF |
Off-line Dictionary Attack, Bilinear Pairing, Mutual Authentication, Replay Attack, Forgery Attack |
31 | Shuiming Ye, Qibin Sun, Ee-Chien Chang |
Error Resilient Image Authentication Using Feature Statistical and Spatial Properties. |
IWDW |
2006 |
DBLP DOI BibTeX RDF |
Feature Distance Measure, Digital Signature, Digital Watermarking, Error Resilience, Image Authentication, Image Transmission |
31 | Isamu Teranishi, Kazue Sako |
k-Times Anonymous Authentication with a Constant Proving Cost. |
Public Key Cryptography |
2006 |
DBLP DOI BibTeX RDF |
k-times anonymous authentication, efficiency, public verifiability |
31 | DaeHun Nyang, Abedelaziz Mohaisen |
Cooperative Public Key Authentication Protocol in Wireless Sensor Network. |
UIC |
2006 |
DBLP DOI BibTeX RDF |
Public Key Authentication, Cooperative Protocol, Voting |
31 | Nandakishore Ramaswamy, K. R. Rao 0001 |
Video authentication for H.264/AVC using digital signature standard and secure hash algorithm. |
NOSSDAV |
2006 |
DBLP DOI BibTeX RDF |
digital signature standard, secure hash, video authentication, H.264/AVC, multimedia security |
31 | Taketsugu Yao, Shigeru Fukunaga, Toshihisa Nakai |
Reliable Broadcast Message Authentication in Wireless Sensor Networks. |
EUC Workshops |
2006 |
DBLP DOI BibTeX RDF |
One-way Key Chain, Secure Acknowledgment, Sensor Networks, Message Authentication, Software Update, Symmetric-key |
31 | Meiyuan Zhao, Sean W. Smith, David M. Nicol |
Aggregated path authentication for efficient BGP security. |
CCS |
2005 |
DBLP DOI BibTeX RDF |
security, performance, routing, authentication, BGP |
31 | JaeYong Jeong, Yongsu Park, Yookun Cho |
Efficient DoS Resistant Multicast Authentication Schemes. |
ICCSA (2) |
2005 |
DBLP DOI BibTeX RDF |
authentication, network security, multicast network |
31 | Eun-Jun Yoon, Kee-Young Yoo |
An Efficient Password Authentication Schemes Without Using the Server Public Key for Grid Computing. |
GCC |
2005 |
DBLP DOI BibTeX RDF |
Security, Grid computing, Password authentication |
31 | Eun-Jun Yoon, Kee-Young Yoo |
New Authentication Scheme Based on a One-Way Hash Function and Diffie-Hellman Key Exchange. |
CANS |
2005 |
DBLP DOI BibTeX RDF |
Authentication, Smart card, Password, Guessing attack |
31 | Philippa J. Hopcroft, Gavin Lowe |
Analysing a stream authentication protocol using model checking. |
Int. J. Inf. Sec. |
2004 |
DBLP DOI BibTeX RDF |
Stream authentication protocols, Model checking, Automatic verification, Data independence |
31 | Robert A. Ghanea-Hercock |
Phobos: An Agent-Based User Authentication System. |
IEEE Intell. Syst. |
2003 |
DBLP DOI BibTeX RDF |
security, multi-agent systems, authentication |
31 | André Weimerskirch, Dirk Westhoff |
Zero Common-Knowledge Authentication for Pervasive Networks. |
Selected Areas in Cryptography |
2003 |
DBLP DOI BibTeX RDF |
Key-Chains, Ad-hoc Networks, Authentication, Public-Key, Symmetric Ciphers, Pervasive Networks |
31 | Mathias Bohge, Wade Trappe |
An authentication framework for hierarchical ad hoc sensor networks. |
Workshop on Wireless Security |
2003 |
DBLP DOI BibTeX RDF |
ad hoc networks, authentication, handoff, TESLA |
31 | Colin Boyd |
A Formal Framework for Authentication. |
ESORICS |
1992 |
DBLP DOI BibTeX RDF |
security standards, formal models, Authentication protocols |
31 | Kwok-Yan Lam, Dieter Gollmann |
Freshness Assurance of Authentication Protocols. |
ESORICS |
1992 |
DBLP DOI BibTeX RDF |
Clock Synchronization Protocol, Network Security, Authentication Protocols, Distributed Operating Systems |
31 | SoHyun Park, Nakpo Kim, YungHa Jee |
An authentication mechanism for the UMTS-WiFi networks. |
Mobility Conference |
2009 |
DBLP DOI BibTeX RDF |
AKA, DBDM (dual band dual mode), SQN, USIM, authentication vector, core network architecture, security, authentication, mobile phone, UMTS, WiFi, 3GPP, convergence network |
31 | Pradeep K. Atrey, Wei-Qi Yan 0001, Mohan S. Kankanhalli |
A scalable signature scheme for video authentication. |
Multim. Tools Appl. |
2007 |
DBLP DOI BibTeX RDF |
Video authentication, Authentication signature, Secret sharing, Digital video |
31 | Goce Jakimoski |
Some Notes on the Security of the Timed Efficient Stream Loss-Tolerant Authentication Scheme. |
Selected Areas in Cryptography |
2006 |
DBLP DOI BibTeX RDF |
multicast stream authentication, cryptanalysis, block ciphers, message authentication, related-key attacks, TESLA |
31 | Murat Aydos, Tugrul Yanik, Çetin Kaya Koç |
An High-Speed ECC-based Wireless Authentication Protocol on an ARM Microprocessor. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
high-speed ECC-based wireless authentication, ARM microprocessor, elliptic curve digital signature algorithm, ARM7TDMI processor, core processor, 80 MHz, 160 bit, mobile computing, elliptic curve cryptography, public key cryptography, software libraries, software library, authorisation, microprocessor chips, message authentication, portable computers, ECDSA, 32 bit, wireless applications |
31 | Martín Abadi |
Explicit Communication Revisited: Two New Attacks on Authentication Protocols. |
IEEE Trans. Software Eng. |
1997 |
DBLP DOI BibTeX RDF |
security, authentication, Cryptography, cryptographic protocols, authentication protocols |
31 | Michael Hitchens, Vijay Varadharajan |
esign Choices For Symmetric Key Based Inter-Domain Authentication Protocols In Distributed Systems. |
ACSAC |
1996 |
DBLP DOI BibTeX RDF |
design choices, secure interactions, key establishment protocols, client responsibility, trusted server responsibility, inter-domain protocols, symmetric key systems, OSF Distributed Computing Environment, distributed systems, message authentication, authentication protocols, Kerberos |
29 | Chwan-Hwa John Wu, Chun-Ching Andy Huang, J. David Irwin |
Using Identity-Based Privacy-Protected Access Control Filter (IPACF) to against denial of service attacks and protect user privacy. |
SpringSim (3) |
2007 |
DBLP BibTeX RDF |
privacy, network security, DDoS, wireless security |
29 | Jongho Ryu |
EAP Using the Split Password-Based Authenticated Key Agreement. |
WISA |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Jong-Hyouk Lee, Tai-Myoung Chung |
Session Key Forwarding Scheme Based on AAA Architecture in Wireless Networks. |
ISPA |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Ashutosh Dutta, Sunil Madhani, Tao Zhang 0005, Yoshihiro Ohba, Kenichi Taniuchi |
Network Discovery Mechanisms for Fast-handoff. |
BROADNETS |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Manhee Lee, Eun Jung Kim 0001, Mazin S. Yousif |
Security Enhancement in InfiniBand Architecture. |
IPDPS |
2005 |
DBLP DOI BibTeX RDF |
|
29 | Tierui Chen, Bin B. Zhu, Shipeng Li 0001, Xueqi Cheng |
ThresPassport - A Distributed Single Sign-On Service. |
ICIC (2) |
2005 |
DBLP DOI BibTeX RDF |
|
29 | Vandana Gunupudi, Stephen R. Tate |
Performance Evaluation of Data Integrity Mechanisms for Mobile Agents. |
ITCC (1) |
2004 |
DBLP DOI BibTeX RDF |
Mobile Agents, Data Integrity, Internet Security |
29 | Zhishou Zhang, Qibin Sun, John G. Apostolopoulos, Wai-Choong Wong |
Rate-Distortion-Authentication optimized streaming with Generalized Butterfly Graph authentication. |
ICIP |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Yvo Desmedt, Goce Jakimoski |
Non-degrading Erasure-Tolerant Information Authentication with an Application to Multicast Stream Authentication over Lossy Channels. |
CT-RSA |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Fei Yang, Shiguang Shan, Bingpeng Ma, Xilin Chen 0001, Wen Gao 0001 |
Using Score Normalization to Solve the Score Variation Problem in Face Authentication. |
IWBRS |
2005 |
DBLP DOI BibTeX RDF |
|
29 | Shaoning Pang |
Constructing SVM Multiple Tree for Face Membership Authentication. |
ICBA |
2004 |
DBLP DOI BibTeX RDF |
|
29 | Madalina Baltatu, Rosalia D'Alessandro, Roberta D'Amico |
Toward Ubiquitous Acceptance of Biometric Authentication: Template Protection Techniques. |
ECCV Workshop BioAW |
2004 |
DBLP DOI BibTeX RDF |
|
29 | Sonia Garcia-Salicetti, Charles Beumier, Gérard Chollet, Bernadette Dorizzi, Jean Leroux les Jardins, Jan Lunter, Yang Ni, Dijana Petrovska-Delacrétaz |
BIOMET: A Multimodal Person Authentication Database Including Face, Voice, Fingerprint, Hand and Signature Modalities. |
AVBPA |
2003 |
DBLP DOI BibTeX RDF |
|
29 | Sunil J. Noronha, Chitra Dorai, Nalini K. Ratha, Ruud M. Bolle |
Architecture for Synchronous Multiparty Authentication Using Biometrics. |
AVBPA |
2003 |
DBLP DOI BibTeX RDF |
|
29 | Alexander De Luca, Marc Langheinrich, Heinrich Hussmann |
Towards understanding ATM security: a field study of real world ATM use. |
SOUPS |
2010 |
DBLP DOI BibTeX RDF |
design implications, security, authentication, ATM, field study, lessons learned |
29 | Andreas Klenk, Holger Kinkelin, Christoph Eunicke, Georg Carle |
Preventing identity theft with electronic identity cards and the trusted platform module. |
EUROSEC |
2009 |
DBLP DOI BibTeX RDF |
authentication with TPM, electronic ID, identity system |
29 | Rene Mayrhofer |
The Candidate Key Protocol for Generating Secret Shared Keys from Similar Sensor Data Streams. |
ESAS |
2007 |
DBLP DOI BibTeX RDF |
context authentication, cryptographic hash, sensor data |
29 | Seon-Ho Park, Young-Ju Han, Tai-Myoung Chung |
Context-Aware Security Management System for Pervasive Computing Environment. |
CONTEXT |
2007 |
DBLP DOI BibTeX RDF |
context role based access control, partial credential, authentication, context aware, pervasive computing |
29 | Youngsook Lee, Junghyun Nam, Jin Kwak, Dongho Won |
Password-Only Authenticated Key Exchange Between Two Agents in the Four-Party Setting. |
KES-AMSTA |
2007 |
DBLP DOI BibTeX RDF |
authentication, agent, Password, key exchange, inter-domain |
Displaying result #201 - #300 of 25398 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ >>] |
|