The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for authentication with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1973-1981 (18) 1982-1984 (22) 1985-1986 (22) 1987 (21) 1988 (25) 1989 (33) 1990 (36) 1991 (31) 1992 (40) 1993 (50) 1994 (65) 1995 (55) 1996 (112) 1997 (145) 1998 (98) 1999 (167) 2000 (208) 2001 (294) 2002 (330) 2003 (618) 2004 (905) 2005 (1106) 2006 (1033) 2007 (1140) 2008 (1183) 2009 (1031) 2010 (805) 2011 (788) 2012 (820) 2013 (879) 2014 (955) 2015 (1035) 2016 (1133) 2017 (1173) 2018 (1332) 2019 (1500) 2020 (1379) 2021 (1410) 2022 (1499) 2023 (1523) 2024 (379)
Publication types (Num. hits)
article(10875) book(17) data(3) incollection(161) inproceedings(14078) phdthesis(247) proceedings(17)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 8079 occurrences of 2235 keywords

Results
Found 25398 publication records. Showing 25398 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
31Jinsuo Zhang, Stacey Franklin Jones uKey: A Unified Key Management and Authentication Automation Middleware For Heterogeneous System. Search on Bibsonomy ITNG The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
31Razib Iqbal, Shervin Shirmohammadi, Jiying Zhao Hard Authentication of H.264 Video Applying MPEG-21 Generic Bitstream Syntax Description (gBSD). Search on Bibsonomy ICME The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
31Shingo Orihara, Yukio Tsuruoka, Kenji Takahashi Certificate-less user authentication with consent. Search on Bibsonomy Digital Identity Management The full citation details ... 2007 DBLP  DOI  BibTeX  RDF certificate-less, consent, public key cryptography, password
31Steffen Hallsteinsen, Ivar Jørstad, Do Van Thanh 0001 Using the mobile phone as a security token for unified authentication. Search on Bibsonomy ICSNC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF authentcation, mobility
31Jong-Hyouk Lee, Young-Ju Han, Tai-Myoung Chung Local Authentication Scheme Based on AAA in Mobile IPv6 Networks. Search on Bibsonomy MMM (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
31Aleksandra Nenadic, Ning Zhang 0001, Jay Chin, Carole A. Goble FAME: Adding Multi-Level Authentication to Shibboleth. Search on Bibsonomy e-Science The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
31Cheol-seung Lee, Hyeong-Gyun Kim, Joon Lee Design of User Authentication System based on WPKI. Search on Bibsonomy CSCWD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
31Ilsun You A One-Time Password Authentication Scheme for Secure Remote Access in Intelligent Home Networks. Search on Bibsonomy KES (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
31Zhishou Zhang, Qibin Sun, Wai-Choong Wong, John G. Apostolopoulos, Susie J. Wee A Content-Aware Stream Authentication Scheme Optimized for Distortion and Overhead. Search on Bibsonomy ICME The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
31Lee-Sub Lee, KyungSun Choi, Dongwon Jeong, Soo-Hyun Park, JuHum Kwon An Inter-Domain Authentication Mechanism for XMPP/Jabber. Search on Bibsonomy SERA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
31Muhammad Khurram Khan, Jiashu Zhang An Efficient and Practical Fingerprint-Based Remote User Authentication Scheme with Smart Cards. Search on Bibsonomy ISPEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
31Jaeil Lee, Inkyoung Jeun, Seoklae Lee Efficient Attribute Authentication in Wireless Mobile Networks. Search on Bibsonomy ISPA Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
31Yao Zhao, Chuang Lin 0002, Hao Yin Security Authentication of 3G-WLAN Interworking. Search on Bibsonomy AINA (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
31Yi-Bing Lin, Ming-Feng Chang, Meng-Ta Hsu, Lin-Yi Wu One-pass GPRS and IMS authentication procedure for UMTS. Search on Bibsonomy IEEE J. Sel. Areas Commun. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
31Arnab Paul, Rajnish Kumar, Umakishore Ramachandran LAWN: A Protocol for Remote Authentication overWireless Networks. Search on Bibsonomy NCA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
31Siraj A. Shaikh, Vicky J. Bush, Steve A. Schneider Specifying Authentication Using Signal Events in CSP. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
31Xiaoyun Wu, Xiaoping Liang, Hongmei Liu 0001, Jiwu Huang, Guoping Qiu Reversible Semi-fragile Image Authentication Using Zernike Moments and Integer Wavelet Transform. Search on Bibsonomy DRMTICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
31Torsten Braun, Hahnsang Kim Efficient Authentication and Authorization of Mobile Users Based on Peer-to-Peer Network Mechanisms. Search on Bibsonomy HICSS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
31Hoon Ko, Bangyong Sohn, Hayoung Park, Yongtae Shin Safe Authentication Method for Security Communication in Ubiquitous. Search on Bibsonomy ICCSA (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
31Miyoung Kim, Misun Kim, Youngsong Mun A Hierarchical Authentication Scheme for MIPv6 Node with Local Movement Property. Search on Bibsonomy ICCSA (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
31Lanjun Dang, Weidong Kou, Yuxia Xiao An Improved Scheme for Unilateral Asymmetric Smart Card Authentication. Search on Bibsonomy AINA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
31Harald Vogt Exploring Message Authentication in Sensor Networks. Search on Bibsonomy ESAS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
31Sun-Sik Roh, Su-Hyun Kim, Gwang-Hyun Kim Design of Authentication and Key Exchange Protocol in Ethernet Passive Optical Networks. Search on Bibsonomy ICCSA (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
31Hui Liu, Minglu Li 0001 Multiparty Joint Authentication: Extending the Semantics of Single Sign-On for Grids. Search on Bibsonomy GCC Workshops The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
31Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati A Novel Remote User Authentication Scheme Through Dynamic Login Identity. Search on Bibsonomy IWDC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
31Hugo Gamboa, Ana L. N. Fred A User Authentication Technic Using a~Web Interaction Monitoring System. Search on Bibsonomy IbPRIA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
31Chai Wah Wu On the design of content-based multimedia authentication systems. Search on Bibsonomy IEEE Trans. Multim. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
31Chi-Chun Lo, Yi-Chun Yeh Authentication protocols for the broadband ISDN billing system. Search on Bibsonomy NOMS The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
31Yonatan Aumann, Michael O. Rabin Authentication, Enhanced Security and Error Correcting Codes (Extended Abstract). Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
31Albrecht Beutelspacher Perfect and Essentially Perfect Authentication Schemes. Search on Bibsonomy EUROCRYPT The full citation details ... 1987 DBLP  DOI  BibTeX  RDF
31Gustavus J. Simmons The Practice of Authentication. Search on Bibsonomy EUROCRYPT The full citation details ... 1985 DBLP  DOI  BibTeX  RDF
31David Kim, Paul Dunphy, Pamela Briggs, Jonathan Hook, John Nicholson, James Nicholson, Patrick Olivier Multi-touch authentication on tabletops. Search on Bibsonomy CHI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF user authentication, graphical passwords, multi-touch interaction, shoulder surfing
31Ribao Wei, Dingfeng Ye Delegate predicate encryption and its application to anonymous authentication. Search on Bibsonomy AsiaCCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF predicate encryption, anonymous authentication
31Eun-A Jun, Jea Doek Ji, Jongin Lim 0001, Seok Won Jung Improved remote user authentication scheme using bilinear pairings. Search on Bibsonomy ICHIT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF authentication, smart card, bilinear pairings
31Yutaka Oiwa, Hiromitsu Takagi, Hajime Watanabe, Hirofumi Suzuki PAKE-based mutual HTTP authentication for preventing phishing attacks. Search on Bibsonomy WWW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF http, mutual authentication, web systems
31Hongwei Li 0001, Yuanshun Dai, Ling Tian, Haomiao Yang Identity-Based Authentication for Cloud Computing. Search on Bibsonomy CloudCom The full citation details ... 2009 DBLP  DOI  BibTeX  RDF authentication, cloud computing, identity-based cryptography
31Mohamed Abid, Songbo Song, Hassnaa Moustafa, Hossam Afifi Efficient identity-based authentication for IMS based services access. Search on Bibsonomy MoMM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF identity based cryptography (IBC), personalized access, service authentication, IP multimedia subsystem (IMS)
31Kyunghwa Lee, Joohyun Lee, Bongduk Zhang, Jaeho Kim, Yongtae Shin An Enhanced Trust Center Based Authentication in ZigBee Networks. Search on Bibsonomy ISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF sensor security, sensor authentication, key management, ZigBee
31Bruno Elias Penteado, Aparecido Nilceu Marana A Video-Based Biometric Authentication for e-Learning Web Applications. Search on Bibsonomy ICEIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF e-Learning, Face recognition, Biometrics, Web authentication
31Adil Haouzia, Rita Noumeir Methods for image authentication: a survey. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Digital image signature, Cryptography, Image authentication, Fragile watermarking, Image content, Semi-fragile watermarking
31Tao Feng, Fenghua Li, Jianfeng Ma 0001, Sang-Jae Moon A new approach for UC security concurrent deniable authentication. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF concurrent deniable authentication, verifiably smooth projective hashing, the decisional composite residuosity assumption, information security, universally composable
31Debasis Giri, Parmeshwary Dayal Srivastava Cryptanalysis and Improvement of a Remote User Authentication Scheme using Smart Cards. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Authentication, Cryptanalysis, Smart Card, Timestamp
31Patrick P. Tsang, Man Ho Au, Apu Kapadia, Sean W. Smith PEREA: towards practical TTP-free revocation in anonymous authentication. Search on Bibsonomy CCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF non-membership proofs, privacy-enhanced revocation, subjective blacklisting, anonymous authentication
31Manik Lal Das, V. Lakshmi Narasimhan EARS: Efficient Entity Authentication in Remote Systems. Search on Bibsonomy ITNG The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Authentication, Smart card, Hash function, Password
31Alexander De Luca, Roman Weiss, Heinrich Hußmann, Xueli An Eyepass - eye-stroke authentication for public terminals. Search on Bibsonomy CHI Extended Abstracts The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security, privacy, authentication, eye-gestures
31Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Thierry Pun Multimodal authentication based on random projections and source coding. Search on Bibsonomy MM&Sec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF multimodal authentication, dimensionality reduction, fusion, hypothesis testing, random projections
31Takumi Yamamoto, Atsushi Harada, Takeo Isarida, Masakatsu Nishigaki Improvement of User Authentication Using Schema of Visual Memory: Exploitation of "Schema of Story". Search on Bibsonomy AINA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF image-based user authentication system, observing attack, unclear image, schema, story
31Sinjini Mitra, Marios Savvides, Anthony Brockwell Statistical Performance Evaluation of Biometric Authentication Systems Using Random Effects Models. Search on Bibsonomy IEEE Trans. Pattern Anal. Mach. Intell. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF watch-list, performance evaluation, authentication, Biometrics, face, random effects model
31Eun-Jun Yoon, Kee-Young Yoo Improving the Sun-Cao's Public Key Authentication Scheme for Non-repudiation. Search on Bibsonomy ICIC (3) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Public key substitution attack, Cryptanalysis, Non-repudiation, Key authentication
31Nai-Wei Lo, Kuo-Hui Yeh Novel RFID Authentication Schemes for Security Enhancement and System Efficiency. Search on Bibsonomy Secure Data Management The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Security, Privacy, Authentication, RFID
31Julien Bringer, Hervé Chabanne, Malika Izabachène, David Pointcheval, Qiang Tang 0001, Sébastien Zimmer An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication. Search on Bibsonomy ACISP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF privacy, Authentication, biometrics
31Weidong Shi, Hsien-Hsin S. Lee Accelerating memory decryption and authentication with frequent value prediction. Search on Bibsonomy Conf. Computing Frontiers The full citation details ... 2007 DBLP  DOI  BibTeX  RDF message authentication, value prediction, secure processors
31Jin-Oh Jeon, Su-Bong Ryu, Sang-Jo Park, Min-Sup Kang Strong Authentication Protocol for RFID Tag Using SHA-1 Hash Algorithm. Search on Bibsonomy ICCSA (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Strong authentication protocol, SHA-1 hash algorithm, Three-way challenge response, ISO/IEC 1800-3 standard, Digital Codec design, RFID Tag
31Chin-Chen Chang 0001, Chih-Chiang Tsou, Yung-Chen Chou A Remediable Image Authentication Scheme Based on Feature Extraction and Clustered VQ. Search on Bibsonomy PCM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF quad-tree segmentation, Image authentication, tampering detection
31Georgios Kambourakis, Stefanos Gritzalis On Device Authentication in Wireless Networks: Present Issues and Future Challenges. Search on Bibsonomy TrustBus The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Device authentication, Wireless security, 802.1X, TCG
31Yanjiang Yang, Robert H. Deng, Feng Bao 0001 A Practical Password-Based Two-Server Authentication and Key Exchange System. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Password system, password verification data (PVD), offline dictionary attack, key exchange, user authentication
31Shang-Ming Chang, Shiuhpyng Shieh, Warren W. Lin, Chih-Ming Hsieh An efficient broadcast authentication scheme in wireless sensor networks. Search on Bibsonomy AsiaCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF key renewal, wireless sensor networks, authentication, broadcast, one time signature
31Deok-Gyu Lee, Jong Sik Moon, Jong Hyuk Park, Im-Yeong Lee Authentication for Ubiquitous Multi Domain in Pervasive Computing Using PMI. Search on Bibsonomy HPCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Authentication, Pervasive Computing, Multi Domain, PMI
31Tzung-Han Lin, Wen-Pin Shih, Wen-Chao Chen, W. Y. Ho 3D face authentication by mutual coupled 3D and 2D feature extraction. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 2006 DBLP  DOI  BibTeX  RDF automatic feature detection, face recognition, face authentication
31Jun-Cheol Jeon, Byung-Heon Kang, Se-Min Kim, Wan-Soo Lee, Kee-Young Yoo An Improvement of Remote User Authentication Scheme Using Smart Cards. Search on Bibsonomy MSN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Off-line Dictionary Attack, Bilinear Pairing, Mutual Authentication, Replay Attack, Forgery Attack
31Shuiming Ye, Qibin Sun, Ee-Chien Chang Error Resilient Image Authentication Using Feature Statistical and Spatial Properties. Search on Bibsonomy IWDW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Feature Distance Measure, Digital Signature, Digital Watermarking, Error Resilience, Image Authentication, Image Transmission
31Isamu Teranishi, Kazue Sako k-Times Anonymous Authentication with a Constant Proving Cost. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF k-times anonymous authentication, efficiency, public verifiability
31DaeHun Nyang, Abedelaziz Mohaisen Cooperative Public Key Authentication Protocol in Wireless Sensor Network. Search on Bibsonomy UIC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Public Key Authentication, Cooperative Protocol, Voting
31Nandakishore Ramaswamy, K. R. Rao 0001 Video authentication for H.264/AVC using digital signature standard and secure hash algorithm. Search on Bibsonomy NOSSDAV The full citation details ... 2006 DBLP  DOI  BibTeX  RDF digital signature standard, secure hash, video authentication, H.264/AVC, multimedia security
31Taketsugu Yao, Shigeru Fukunaga, Toshihisa Nakai Reliable Broadcast Message Authentication in Wireless Sensor Networks. Search on Bibsonomy EUC Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF One-way Key Chain, Secure Acknowledgment, Sensor Networks, Message Authentication, Software Update, Symmetric-key
31Meiyuan Zhao, Sean W. Smith, David M. Nicol Aggregated path authentication for efficient BGP security. Search on Bibsonomy CCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF security, performance, routing, authentication, BGP
31JaeYong Jeong, Yongsu Park, Yookun Cho Efficient DoS Resistant Multicast Authentication Schemes. Search on Bibsonomy ICCSA (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF authentication, network security, multicast network
31Eun-Jun Yoon, Kee-Young Yoo An Efficient Password Authentication Schemes Without Using the Server Public Key for Grid Computing. Search on Bibsonomy GCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Security, Grid computing, Password authentication
31Eun-Jun Yoon, Kee-Young Yoo New Authentication Scheme Based on a One-Way Hash Function and Diffie-Hellman Key Exchange. Search on Bibsonomy CANS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Authentication, Smart card, Password, Guessing attack
31Philippa J. Hopcroft, Gavin Lowe Analysing a stream authentication protocol using model checking. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Stream authentication protocols, Model checking, Automatic verification, Data independence
31Robert A. Ghanea-Hercock Phobos: An Agent-Based User Authentication System. Search on Bibsonomy IEEE Intell. Syst. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF security, multi-agent systems, authentication
31André Weimerskirch, Dirk Westhoff Zero Common-Knowledge Authentication for Pervasive Networks. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Key-Chains, Ad-hoc Networks, Authentication, Public-Key, Symmetric Ciphers, Pervasive Networks
31Mathias Bohge, Wade Trappe An authentication framework for hierarchical ad hoc sensor networks. Search on Bibsonomy Workshop on Wireless Security The full citation details ... 2003 DBLP  DOI  BibTeX  RDF ad hoc networks, authentication, handoff, TESLA
31Colin Boyd A Formal Framework for Authentication. Search on Bibsonomy ESORICS The full citation details ... 1992 DBLP  DOI  BibTeX  RDF security standards, formal models, Authentication protocols
31Kwok-Yan Lam, Dieter Gollmann Freshness Assurance of Authentication Protocols. Search on Bibsonomy ESORICS The full citation details ... 1992 DBLP  DOI  BibTeX  RDF Clock Synchronization Protocol, Network Security, Authentication Protocols, Distributed Operating Systems
31SoHyun Park, Nakpo Kim, YungHa Jee An authentication mechanism for the UMTS-WiFi networks. Search on Bibsonomy Mobility Conference The full citation details ... 2009 DBLP  DOI  BibTeX  RDF AKA, DBDM (dual band dual mode), SQN, USIM, authentication vector, core network architecture, security, authentication, mobile phone, UMTS, WiFi, 3GPP, convergence network
31Pradeep K. Atrey, Wei-Qi Yan 0001, Mohan S. Kankanhalli A scalable signature scheme for video authentication. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Video authentication, Authentication signature, Secret sharing, Digital video
31Goce Jakimoski Some Notes on the Security of the Timed Efficient Stream Loss-Tolerant Authentication Scheme. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF multicast stream authentication, cryptanalysis, block ciphers, message authentication, related-key attacks, TESLA
31Murat Aydos, Tugrul Yanik, Çetin Kaya Koç An High-Speed ECC-based Wireless Authentication Protocol on an ARM Microprocessor. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF high-speed ECC-based wireless authentication, ARM microprocessor, elliptic curve digital signature algorithm, ARM7TDMI processor, core processor, 80 MHz, 160 bit, mobile computing, elliptic curve cryptography, public key cryptography, software libraries, software library, authorisation, microprocessor chips, message authentication, portable computers, ECDSA, 32 bit, wireless applications
31Martín Abadi Explicit Communication Revisited: Two New Attacks on Authentication Protocols. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF security, authentication, Cryptography, cryptographic protocols, authentication protocols
31Michael Hitchens, Vijay Varadharajan esign Choices For Symmetric Key Based Inter-Domain Authentication Protocols In Distributed Systems. Search on Bibsonomy ACSAC The full citation details ... 1996 DBLP  DOI  BibTeX  RDF design choices, secure interactions, key establishment protocols, client responsibility, trusted server responsibility, inter-domain protocols, symmetric key systems, OSF Distributed Computing Environment, distributed systems, message authentication, authentication protocols, Kerberos
29Chwan-Hwa John Wu, Chun-Ching Andy Huang, J. David Irwin Using Identity-Based Privacy-Protected Access Control Filter (IPACF) to against denial of service attacks and protect user privacy. Search on Bibsonomy SpringSim (3) The full citation details ... 2007 DBLP  BibTeX  RDF privacy, network security, DDoS, wireless security
29Jongho Ryu EAP Using the Split Password-Based Authenticated Key Agreement. Search on Bibsonomy WISA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
29Jong-Hyouk Lee, Tai-Myoung Chung Session Key Forwarding Scheme Based on AAA Architecture in Wireless Networks. Search on Bibsonomy ISPA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
29Ashutosh Dutta, Sunil Madhani, Tao Zhang 0005, Yoshihiro Ohba, Kenichi Taniuchi Network Discovery Mechanisms for Fast-handoff. Search on Bibsonomy BROADNETS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
29Manhee Lee, Eun Jung Kim 0001, Mazin S. Yousif Security Enhancement in InfiniBand Architecture. Search on Bibsonomy IPDPS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
29Tierui Chen, Bin B. Zhu, Shipeng Li 0001, Xueqi Cheng ThresPassport - A Distributed Single Sign-On Service. Search on Bibsonomy ICIC (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
29Vandana Gunupudi, Stephen R. Tate Performance Evaluation of Data Integrity Mechanisms for Mobile Agents. Search on Bibsonomy ITCC (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Mobile Agents, Data Integrity, Internet Security
29Zhishou Zhang, Qibin Sun, John G. Apostolopoulos, Wai-Choong Wong Rate-Distortion-Authentication optimized streaming with Generalized Butterfly Graph authentication. Search on Bibsonomy ICIP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Yvo Desmedt, Goce Jakimoski Non-degrading Erasure-Tolerant Information Authentication with an Application to Multicast Stream Authentication over Lossy Channels. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
29Fei Yang, Shiguang Shan, Bingpeng Ma, Xilin Chen 0001, Wen Gao 0001 Using Score Normalization to Solve the Score Variation Problem in Face Authentication. Search on Bibsonomy IWBRS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
29Shaoning Pang Constructing SVM Multiple Tree for Face Membership Authentication. Search on Bibsonomy ICBA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
29Madalina Baltatu, Rosalia D'Alessandro, Roberta D'Amico Toward Ubiquitous Acceptance of Biometric Authentication: Template Protection Techniques. Search on Bibsonomy ECCV Workshop BioAW The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
29Sonia Garcia-Salicetti, Charles Beumier, Gérard Chollet, Bernadette Dorizzi, Jean Leroux les Jardins, Jan Lunter, Yang Ni, Dijana Petrovska-Delacrétaz BIOMET: A Multimodal Person Authentication Database Including Face, Voice, Fingerprint, Hand and Signature Modalities. Search on Bibsonomy AVBPA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
29Sunil J. Noronha, Chitra Dorai, Nalini K. Ratha, Ruud M. Bolle Architecture for Synchronous Multiparty Authentication Using Biometrics. Search on Bibsonomy AVBPA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
29Alexander De Luca, Marc Langheinrich, Heinrich Hussmann Towards understanding ATM security: a field study of real world ATM use. Search on Bibsonomy SOUPS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF design implications, security, authentication, ATM, field study, lessons learned
29Andreas Klenk, Holger Kinkelin, Christoph Eunicke, Georg Carle Preventing identity theft with electronic identity cards and the trusted platform module. Search on Bibsonomy EUROSEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF authentication with TPM, electronic ID, identity system
29Rene Mayrhofer The Candidate Key Protocol for Generating Secret Shared Keys from Similar Sensor Data Streams. Search on Bibsonomy ESAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF context authentication, cryptographic hash, sensor data
29Seon-Ho Park, Young-Ju Han, Tai-Myoung Chung Context-Aware Security Management System for Pervasive Computing Environment. Search on Bibsonomy CONTEXT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF context role based access control, partial credential, authentication, context aware, pervasive computing
29Youngsook Lee, Junghyun Nam, Jin Kwak, Dongho Won Password-Only Authenticated Key Exchange Between Two Agents in the Four-Party Setting. Search on Bibsonomy KES-AMSTA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF authentication, agent, Password, key exchange, inter-domain
Displaying result #201 - #300 of 25398 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license