The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for authentication with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1973-1981 (18) 1982-1984 (22) 1985-1986 (22) 1987 (21) 1988 (25) 1989 (33) 1990 (36) 1991 (31) 1992 (40) 1993 (50) 1994 (65) 1995 (55) 1996 (112) 1997 (145) 1998 (98) 1999 (167) 2000 (208) 2001 (294) 2002 (330) 2003 (618) 2004 (905) 2005 (1106) 2006 (1033) 2007 (1140) 2008 (1183) 2009 (1031) 2010 (805) 2011 (788) 2012 (820) 2013 (879) 2014 (955) 2015 (1035) 2016 (1133) 2017 (1173) 2018 (1332) 2019 (1500) 2020 (1379) 2021 (1410) 2022 (1499) 2023 (1523) 2024 (379)
Publication types (Num. hits)
article(10875) book(17) data(3) incollection(161) inproceedings(14078) phdthesis(247) proceedings(17)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 8079 occurrences of 2235 keywords

Results
Found 25398 publication records. Showing 25398 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
29Seong-Pyo Hong, Jong-An Park, Seung Jo Han, Jae-Young Pyun, Joon Lee Design of WLAN Secure System Against Weaknesses of the IEEE 802.1x. Search on Bibsonomy ICHIT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF IEEE 802.1x, Privacy, Authentication, Wireless LAN Security
29Yonghwan Lee, Eunmi Choi, Dugki Min An Authenticated Key Exchange Mechanism Using One-Time Shared Key. Search on Bibsonomy ICCSA (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF One-Time Shared key, Authentication, Key Exchange, Diffie- Hellman
29Jae Hyung Koo, Bum Han Kim, Dong Hoon Lee 0001 Authenticated Public Key Distribution Scheme Without Trusted Third Party. Search on Bibsonomy EUC Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Key Management and Authentication, Public-key Cryptography, Public Key Infrastructure (PKI)
29Andreas Pashalidis, Chris J. Mitchell Using EMV Cards for Single Sign-On. Search on Bibsonomy EuroPKI The full citation details ... 2004 DBLP  DOI  BibTeX  RDF authentication, single sign-on, EMV
29Michael Wang, Andrzej M. Goscinski The Development and Testing of the Identity-Based Conference Key Distribution System for the RHODOS Distributed System. Search on Bibsonomy ESORICS The full citation details ... 1992 DBLP  DOI  BibTeX  RDF Identity-based Conference Key Distribution, Distributed Systems, Authentication, Distributed Operating Systems
29Louis C. Guillou, Jean-Jacques Quisquater A "Paradoxical" Indentity-Based Signature Scheme Resulting from Zero-Knowledge. Search on Bibsonomy CRYPTO The full citation details ... 1988 DBLP  DOI  BibTeX  RDF zero-knowledge interactive proofs, identity-based system, public key system, complexity, authentication, integrity, digital signature, randomization, identification, factoring, cryptology
29Qi Dong 0001, Donggang Liu, Peng Ning Pre-authentication filters: providing dos resistance for signature-based broadcast authentication in sensor networks. Search on Bibsonomy WISEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security, sensor networks, broadcast authentication, DoS attacks
29Hiroyuki Manabe, Masaaki Fukumoto AwareLESS authentication: insensible input based authentication. Search on Bibsonomy CHI Extended Abstracts The full citation details ... 2007 DBLP  DOI  BibTeX  RDF awareLESS, finger motion, insensible, authentication, input
29Kianoosh Mokhtarian, Mohamed Hefeeda End-to-end secure delivery of scalable video streams. Search on Bibsonomy NOSSDAV The full citation details ... 2009 DBLP  DOI  BibTeX  RDF multimedia authentication, secure streaming, video authentication, multimedia security, scalable video
29Arshad Noor Identity protection factor (IPF). Search on Bibsonomy IDtrust The full citation details ... 2008 DBLP  DOI  BibTeX  RDF asymmetric key, identification & authentication, identity protection factor (IPF), shared-secret, authentication, access control, identity management, symmetric key
29Eun-Chul Cha, Hyoung-Kee Choi A Study of Performance Improvement in EAP. Search on Bibsonomy Networking The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Extensible Authentication Protocol (EAP), Network Access Authentication, Network Security
29Thomas Johansson 0001 Bucket Hashing with a Small Key Size. Search on Bibsonomy EUROCRYPT The full citation details ... 1997 DBLP  DOI  BibTeX  RDF bucket hashing, message authentication, software implementations, authentication codes, Universal hash functions
29Martin Leu Relative Signatures for Fault Tolerance and their Implementation. Search on Bibsonomy EDCC The full citation details ... 1994 DBLP  DOI  BibTeX  RDF relative signatures, relative authentication, fault tolerance, distributed systems, authentication, digital signatures
29Alen Peacock, Xian Ke, Matthew Wilkerson Typing Patterns: A Key to User Identification. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Keystroke, Security, Pattern Recognition, Authentication, Authentication, Biometrics, Typing, Intellectual Property, User Authentication, network-level security and protection, Security and Privacy Protection, User Identification
27Lifeng Lai, Hesham El Gamal, H. Vincent Poor Authentication Over Noisy Channels. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
27Wei-Min Shi ID-Based Non-interactive Deniable Authentication Protocol. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
27Janani C. Sriram, Minho Shin, Tanzeem Choudhury, David Kotz Activity-aware ECG-based patient authentication for remote health monitoring. Search on Bibsonomy ICMI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF security, mobile computing, biometrics, ECG
27Qingsong Yao, Yong Qi, Jinsong Han, Jizhong Zhao, Xiang-Yang Li 0001, Yunhao Liu 0001 Randomizing RFID Private Authentication. Search on Bibsonomy PerCom The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
27Ali Fanian, Mehdi Berenjkoub, T. Aaron Gulliver A new mutual authentication protocol for GSM networks. Search on Bibsonomy CCECE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
27Hua Wang, Yao Guo 0001, Xiangqun Chen DPAC: A Reuse-Oriented Password Authentication Framework for Improving Password Security. Search on Bibsonomy HASE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Ayesha Altaf, Rabia Sirhindi, Attiq Ahmed A Novel Approach against DoS Attacks in WiMAX Authentication Using Visual Cryptography. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Minghui Shi, Khaled Hatem Almotairi, Xuemin Shen, Jon W. Mark, Dongmei Zhao, Bruno R. Preiss Credit-Based User Authentication for Delay Tolerant Mobile Wireless Networks. Search on Bibsonomy ICC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Stanislaw Jarecki, Xiaomin Liu Affiliation-Hiding Envelope and Authentication Schemes with Efficient Support for Multiple Credentials. Search on Bibsonomy ICALP (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Ming-Chin Chuang, Jeng Farn Lee LMAM: A Lightweight Mutual Authentication Mechanism for Network Mobility in Vehicular Networks. Search on Bibsonomy APSCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Ruichuan Chen, Wenjia Guo, Liyong Tang, Jian-bin Hu, Zhong Chen 0001 Scalable Byzantine Fault Tolerant Public Key Authentication for Peer-to-Peer Networks. Search on Bibsonomy Euro-Par The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Chenxi Zhang, Rongxing Lu, Pin-Han Ho, Anyi Chen A Location Privacy Preserving Authentication Scheme in Vehicular Networks. Search on Bibsonomy WCNC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27M. N. Doja 0001, Naveen Kumar 0008 Image Authentication Schemes against Key-Logger Spyware. Search on Bibsonomy SNPD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Wenbo Zhang, Hongqi Zhang, Bin Zhang 0015, Yan Yang An Identity-Based Authentication Model for Multi-domain in Grid Environment. Search on Bibsonomy CSSE (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Hou Huifang, Ji Xinshen, Liu Guangqiang A Novel Access Authentication Scheme Based on ECC for 3G-WLAN Interworking Network. Search on Bibsonomy CSSE (5) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Hou Huifang, Kaizhi Huang, Liu Guangqiang CPK and ECC-Based Authentication and Key Agreement Scheme for Heterogeneous Wireless Network. Search on Bibsonomy CSSE (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Yanfei Liu An Efficient RFID Authentication Protocol for Low-Cost Tags. Search on Bibsonomy EUC (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Steven Gordon Formal Analysis of PANA Authentication and Authorisation Protocol. Search on Bibsonomy PDCAT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Sébastien Marcel, José del R. Millán Person Authentication Using Brainwaves (EEG) and Maximum A Posteriori Model Adaptation. Search on Bibsonomy IEEE Trans. Pattern Anal. Mach. Intell. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF biometry, machine learning, signal processing, electroencephalogram, probabilistic algorithms, Emerging technologies
27Somchart Fugkeaw, Piyawit Manpanpanich, Sekpon Juntapremjitt AmTRUE: Authentication Management and Trusted Role-based Authorization in Multi-Application and Multi-User Environment. Search on Bibsonomy SECURWARE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Andreas Roos, Sabine Wieland, A. Th. Schwarzbacher, Bangnan Xu Time Behaviour and Network Encumbrance Due to Authentication in Wireless Mesh Access Networks. Search on Bibsonomy VTC Spring The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Bogdan Groza, Toma-Leonida Dragomir On the use of one-way chain based authentication protocols in secure control systems. Search on Bibsonomy ARES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Leila Ismail Authentication Mechanisms for Mobile Agents. Search on Bibsonomy ARES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Shushan Zhao, Akshai K. Aggarwal, Robert D. Kent PKI-Based Authentication Mechanisms in Grid Systems. Search on Bibsonomy IEEE NAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Wei Zhang 0060, Yonghe Liu, Sajal K. Das 0001 Aggregation Supportive Authentication in Wireless Sensor Networks: A Watermark Based Approach. Search on Bibsonomy WOWMOM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Rosa R. Heckle, Wayne G. Lutters Privacy implications for single sign-on authentication in a hospital environment. Search on Bibsonomy SOUPS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Anna Cinzia Squicciarini, Abhilasha Bhargav-Spantzel, Elisa Bertino, Alexei B. Czeksis Auth-SL - A System for the Specification and Enforcement of Quality-Based Authentication Policies. Search on Bibsonomy ICICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Phillip L. Hellewell, Kent E. Seamons Extensible Pre-authentication Kerberos. Search on Bibsonomy ACSAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Weidong Shi, Hsien-Hsin S. Lee Authentication Control Point and Its Implications For Secure Processor Design. Search on Bibsonomy MICRO The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Fumiko Satoh, Yuichi Nakamura 0003, Koichi Ono Adding Authentication to Model Driven Security. Search on Bibsonomy ICWS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Takahiro Watanabe, Yasunobu Nohara, Kensuke Baba, Sozo Inoue, Hiroto Yasuura On Authentication between Human and Computer. Search on Bibsonomy PerCom Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Ryo Nojima, Kazukuni Kobara, Hideki Imai Efficient Shared-Key Authentication Scheme from Any Weak Pseudorandom Function. Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Jong-Hyouk Lee, Tai-Myoung Chung Performance Evaluation of Dual Authentication Scheme in Mobile IPv6 Networks. Search on Bibsonomy ICSNC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Mehmet A. Orgun, Ji Ma 0001, Chuchang Liu, Guido Governatori Analysing Stream Authentication Protocols in Autonomous Agent-Based Systems. Search on Bibsonomy DASC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Eric Simpson, Patrick Schaumont Offline Hardware/Software Authentication for Reconfigurable Platforms. Search on Bibsonomy CHES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Seung Wook Jung, Souhwan Jung Secure Password Authentication for Distributed Computing. Search on Bibsonomy CIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Chenyu Yan, Daniel Englender, Milos Prvulovic, Brian Rogers, Yan Solihin Improving Cost, Performance, and Security of Memory Encryption and Authentication. Search on Bibsonomy ISCA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27William Eric Hall, Charanjit S. Jutla Parallelizable Authentication Trees. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27Flávio Oliveira Silva 0001, João A. A. Pacheco, Pedro Frosi Rosa A Web Service Authentication Control System Based on SRP and SAML. Search on Bibsonomy ICWS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27Hyungmo Kang, Youngsong Mun Authentication in Fast Handover of Mobile IPv6 Applying AAA by Using Hash Value. Search on Bibsonomy MSN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27HyunGon Kim, ByeongKyun Oh Implementation of Credit-Control Authorization with Embedded Mobile IPv6 Authentication. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF prepaid, authorization, Mobile IPv6, Mobile node
27Wei Liang, Wenye Wang A quantitative study of authentication and QoS in wireless IP networks. Search on Bibsonomy INFOCOM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27Yuanbo Guo, Jianfeng Ma 0001, Yadi Wang An Intrusion-Resilient Authorization and Authentication Framework for Grid Computing Infrastructure. Search on Bibsonomy International Conference on Computational Science (3) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27Jun Zhou, Guangda Su, Yafeng Deng, Kai Meng, Congcong Li A Dynamic Face and Fingerprint Fusion System for Identity Authentication. Search on Bibsonomy CIS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27Lin Chen 0020, Xiaoqin Huang, Jinyuan You Certificate-Based Authentication and Authorization Architecture in Digital Library. Search on Bibsonomy ICADL The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
27Bruce Christianson Anonymous Authentication (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
27Yacine Challal, Hatem Bettahar, Abdelmadjid Bouabdallah A2cast: an adaptive source authentication protocol for multicast streams. Search on Bibsonomy ISCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
27Chang-Joo Moon, Dae-Ha Park A User Authentication Model for the OSGi Service Platform. Search on Bibsonomy AsiaSim The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
27Bruno Crispo, Bogdan C. Popescu, Andrew S. Tanenbaum Symmetric Key Authentication Services Revisited. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
27Xin Zhao 0016, Atul Prakash 0001 Source Authentication in Group Communication Systems. Search on Bibsonomy DEXA Workshops The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
27Sung-Cheal Byun, Sang-Kwang Lee, Ahmed H. Tewfik, Byung-Ha Ahn A SVD-Based Fragile Watermarking Scheme for Image Authentication. Search on Bibsonomy IWDW The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
27Satoshi Ohzahata, Shigetomo Kimura, Yoshihiko Ebihara A Fast Authentication Method for Secure and Seamless Handoff. Search on Bibsonomy ICOIN (2) The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
27Moni Naor Deniable Ring Authentication. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
27Tim Ebringer, Peter Thorne, Yuliang Zheng 0001 Parasitic Authentication To Protect Your E-Wallet. Search on Bibsonomy Computer The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
27Michael Roe Authentication and Naming (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
27Joshua D. Guttman, F. Javier Thayer Authentication Tests. Search on Bibsonomy S&P The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
27Ralf C. Hauser, E. Stewart Lee Verification and Modelling of Authentication Protocols. Search on Bibsonomy ESORICS The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
27Atefeh Mashatan, Douglas R. Stinson Interactive two-channel message authentication based on Interactive-Collision Resistant hash functions. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Two-channel cryptography, Authenticated channel, Hash functions, Message authentication
27Michael S. Kirkpatrick, Elisa Bertino Physically restricted authentication with trusted hardware. Search on Bibsonomy STC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF authentication, discrete logarithm, zero-knowledge proof, physical unclonable functions, applied cryptography
27Md. Endadul Hoque, Farzana Rahman, Sheikh Iqbal Ahamed Supporting recovery, privacy and security in RFID systems using a robust authentication protocol. Search on Bibsonomy SAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF security, privacy, authentication, RFID, robust, recovery
27Gyözö Gódor, Sándor Imre Performance analysis of the simple lightweight authentication protocol. Search on Bibsonomy MoMM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF lightweight protocol, authentication, RFID
27Jong Sik Moon, Deok-Gyu Lee, Im-Yeong Lee Device Authentication/Authorization Protocol for Home Network in Next Generation Security. Search on Bibsonomy ISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Authentication, Authorization, Home Network, Roaming
27Seong-Soo Park 0001, Jong-Hyouk Lee, Tai-Myoung Chung Authentication Scheme Based on Trust and Clustering Using Fuzzy Control in Wireless Ad-Hoc Networks. Search on Bibsonomy ICCSA (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF clustering, ad-hoc networks, authentication, trust, fuzzy control
27Ming Ki Chong, Gary Marsden Exploring the Use of Discrete Gestures for Authentication. Search on Bibsonomy INTERACT (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF gesture passwords, discrete gestures, User authentication
27Christophe Tartary Ensuring Authentication of Digital Information Using Cryptographic Accumulators. Search on Bibsonomy CANS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Adversarial Channel, Cryptographic Accumulator, Stream Authentication, Polynomial Reconstruction, Erasure Channel
27Florian Kerschbaum, Alessandro Sorniotti RFID-based supply chain partner authentication and key agreement. Search on Bibsonomy WISEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF proof of possession, authentication, supply chain, key agreement, rfid
27Gábor Fehér, István Oláh Enhancing wireless video streaming using lightweight approximate authentication. Search on Bibsonomy Multim. Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Approximate authentication, Security, QoS, Wireless video streaming, Error resilient video coding
27Rosalia D'Alessandro, Marco Ghirardi, Manuel Leone SC@CCO: a Graphic-Based Authentication System. Search on Bibsonomy EUROSEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF data matrix, graphic authentication and authorization system, security, access control, barcode, anti-phishing, one-time password
27Summit R. Tuladhar, Carlos E. Caicedo, James B. D. Joshi Inter-domain Authentication for Seamless Roaming in Heterogeneous Wireless Networks. Search on Bibsonomy SUTC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF seamless roaming, ubiquitous mobility, authentication, heterogeneous networks
27Bezawada Bruhadeshwar, Kishore Kothapalli A Family of Collusion Resistant Symmetric Key Protocols for Authentication. Search on Bibsonomy ICDCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Authentication, Key Distribution, Collusion resistance
27Manik Lal Das, V. Lakshmi Narasimhan Towards a Formal Verification of an Authentication Protocol Using Non-Monotonic Logic. Search on Bibsonomy ITNG The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Authentication, Hash function, Password, Key agreement, Non-monotonic logic
27Sven Laur, Sylvain Pasini SAS-Based Group Authentication and Key Agreement Protocols. Search on Bibsonomy Public Key Cryptography The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Groups, key agreement, message authentication, multi-party
27Sascha Zmudzinski, Martin Steinebach Psycho-acoustic model-based message authentication coding for audio data. Search on Bibsonomy MM&Sec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF authentication watermarking, psycho-acoustic modelling, audio fingerprinting, perceptual hash, robust hash
27Samir Kumar Bandyopadhyay, Debnath Bhattacharyya, Poulami Das 0001, Deepsikha Debnath Handwritten Signature Authentication Using Statistical Estimation. Search on Bibsonomy MUE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF mean variance, Security, authentication, biometric, watermarking, image analysis
27Kyu-Hwan Lee, Jae-Hyun Kim, Jun-Hee Park, Dong-Hee Kim, Kyung-Duk Moon Routing based authentication for mobile ad hoc network in home environment. Search on Bibsonomy ICUIMC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security, mobile ad-hoc network, authentication, home network, secure routing
27Slawomir Grzonkowski, Wojciech Zaremba, Maciej Zaremba, Bill McDaniel Extending web applications with a lightweight zero knowledge proof authentication. Search on Bibsonomy CSTST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF web 2.0 authentication, protocols, web 2.0, password, graph isomorphism, zero knowledge proof
27Yong-Dong Zhang 0001, Sheng Tang, Jin-Tao Li 0001 Secure and Incidental Distortion Tolerant Digital Signature for Image Authentication. Search on Bibsonomy J. Comput. Sci. Technol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF PCA (Principal Component Analysis), Hotelling’s T-square statistic, digital signature, image authentication
27Shuiming Ye, Qibin Sun, Ee-Chien Chang Statistics- and Spatiality-Based Feature Distance Measure for Error Resilient Image Authentication. Search on Bibsonomy Trans. Data Hiding Multim. Secur. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Feature Distance Measure, Digital Signature, Digital Watermarking, Error Concealment, Image Authentication, Image Transmission
27Ye Chen, Divakaran Liginlal Bayesian Networks for Knowledge-Based Authentication. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF knowledge-based authentication, Security, simulation, metrics, Bayesian networks, entropy, information theory
27Reihaneh Safavi-Naini, Shuhong Wang, Yvo Desmedt Unconditionally secure ring authentication. Search on Bibsonomy AsiaCCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF ring signature, unconditional security, authentication codes
27Lanlan Hu, Yixian Yang, Xinxin Niu Improved Remote User Authentication Scheme Preserving User Anonymity. Search on Bibsonomy CNSR The full citation details ... 2007 DBLP  DOI  BibTeX  RDF authentication, anonymity, Smart cards
27Rehan Akbani, Turgay Korkmaz, G. V. S. Raju 0001 HEAP: hop-by-hop efficient authentication protocol for Mobile Ad-hoc Networks. Search on Bibsonomy SpringSim (1) The full citation details ... 2007 DBLP  BibTeX  RDF security, MANETs, mobile ad-hoc networks, authentication, HEAP
27Eun-Jun Yoon, Kee-Young Yoo Two Security Problems of Efficient Remote Mutual Authentication and Key Agreement. Search on Bibsonomy FGCN (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Authentication, Cryptanalysis, Smart card, Password, Key agreement
27Hyun Seok Kim, Jin-Young Choi The Design and Verification of RFID Authentication Protocol for Ubiquitous Computing. Search on Bibsonomy DEXA Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Model Checking, RFID, Authentication Protocol
27Jae-Wook Lee, Sung-Soon Choi, Byung Ro Moon An evolutionary keystroke authentication based on ellipsoidal hypothesis space. Search on Bibsonomy GECCO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF keystroke biometrics, biometric authentication, keystroke dynamics, identity verification
27Arisa Fujii, Go Ohtake, Goichiro Hanaoka, Kazuto Ogawa Anonymous Authentication Scheme for Subscription Services. Search on Bibsonomy KES (3) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF authentication, anonymity, privacy preservation, group signature, linkability
Displaying result #301 - #400 of 25398 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license