|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 8079 occurrences of 2235 keywords
|
|
|
Results
Found 25398 publication records. Showing 25398 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
27 | Shuihua Han, Chao-Hsien Chu, Shuangyuan Yang |
Content-based Image Authentication: Current Status, Issues, and Challenges. |
ICSC |
2007 |
DBLP DOI BibTeX RDF |
content-based authentication, security, performance trade-off, Image hash |
27 | Junbeom Hur, Chanil Park, Hyunsoo Yoon |
An Efficient Pre-authentication Scheme for IEEE 802.11-Based Vehicular Networks. |
IWSEC |
2007 |
DBLP DOI BibTeX RDF |
proactive key distribution, pre-authentication, IEEE 802.11 network, vehicular network, fast handoff |
27 | Rafael Marín López, Santiago Zapata Hernandez, Antonio Fernandez Gómez-Skarmeta |
Secure Protocol for Fast Authentication in EAP-Based Wireless Networks. |
ICCSA (2) |
2007 |
DBLP DOI BibTeX RDF |
security, authentication, Fast handover, network access control |
27 | Jun-Won Lee, Sang-Won Min, Byung K. Choi |
An Efficient Authentication Procedure for Fast Handoff in Mobile IPv6 Networks. |
ICOIN |
2007 |
DBLP DOI BibTeX RDF |
temporary authentication, fast handoff and wireless mobile networks, MIPv6, AAA |
27 | Pedro Felix, Carlos Ribeiro |
A scalable and flexible web services authentication model. |
SWS |
2007 |
DBLP DOI BibTeX RDF |
authentication, trust management, web services security |
27 | Christophe Tartary, Huaxiong Wang, Josef Pieprzyk |
An Hybrid Approach for Efficient Multicast Stream Authentication over Unsecured Channels. |
ProvSec |
2007 |
DBLP DOI BibTeX RDF |
Unsecured Channel, Erasure Code, Stream Authentication, Merkle Hash Tree, Polynomial Reconstruction |
27 | JaeCheol Ha, Sang-Jae Moon, Juan Manuel González Nieto, Colin Boyd |
Security Analysis and Enhancement of One-Way Hash Based Low-Cost Authentication Protocol (OHLCAP). |
PAKDD Workshops |
2007 |
DBLP DOI BibTeX RDF |
group-based authentication, traceability, RFID system, indistinguishability |
27 | Abdallah Mhamed, Cecilia Fred, Arab Farah |
An Authentication Architecture Dedicated to Dependent People in Smart Environments. |
ICOST |
2007 |
DBLP DOI BibTeX RDF |
dependent people, security, authentication, Pervasive computing, biometrics, user profile, smart home |
27 | Song Y. Yan, Carsten Maple, Glyn James |
A New Scheme for Deniable/Repudiable Authentication. |
CASC |
2007 |
DBLP DOI BibTeX RDF |
Deniable/repudiable authentication, quadratic residuosity problem, intractability |
27 | Anthony J. Nicholson, Mark D. Corner, Brian D. Noble |
Mobile Device Security Using Transient Authentication. |
IEEE Trans. Mob. Comput. |
2006 |
DBLP DOI BibTeX RDF |
Transient authentication, security, privacy, mobile computing, human factors, cryptographic controls |
27 | Patrick P. C. Lee, John C. S. Lui, David K. Y. Yau |
Distributed collaborative key agreement and authentication protocols for dynamic peer groups. |
IEEE/ACM Trans. Netw. |
2006 |
DBLP DOI BibTeX RDF |
dynamic peer groups, security, authentication, group key agreement, secure group communication, rekeying |
27 | Alain P. Hiltgen, Thorsten Kramp, Thomas Weigold |
Secure Internet Banking Authentication. |
IEEE Secur. Priv. |
2006 |
DBLP DOI BibTeX RDF |
short-time passwords, short-lived passwords, taxonomy of attacks, authentication, Internet banking, public-key certificates |
27 | Liyan Zhang, Anshuman Razdan, Gerald E. Farin, John Femiani 0001, MyungSoo Bae, Charles Lockwood |
3D face authentication and recognition based on bilateral symmetry analysis. |
Vis. Comput. |
2006 |
DBLP DOI BibTeX RDF |
Symmetry analysis, Face recognition, Face authentication, 3D faces |
27 | Ya-Jeng Lin, Shiuhpyng Shieh, Warren W. Lin |
Lightweight, pollution-attack resistant multicast authentication scheme. |
AsiaCCS |
2006 |
DBLP DOI BibTeX RDF |
signature amortization, authentication, multicast, erasure code, pollution-attack |
27 | Wen-Guey Tzeng |
A secure system for data access based on anonymous authentication and time-dependent hierarchical keys. |
AsiaCCS |
2006 |
DBLP DOI BibTeX RDF |
entity security, hierarchical keys, trapdoor time-sharable sequence, world wide web security, anonymous authentication |
27 | Eun-Jun Yoon, Kee-Young Yoo |
An Improved Lu-Cao's Remote User Authentication Scheme Using Smart Card. |
EuroPKI |
2006 |
DBLP DOI BibTeX RDF |
Authentication, Network security, Smart card, Password |
27 | Kirk H. M. Wong, Yuan Zheng 0001, Jiannong Cao 0001, Shengwei Wang |
A Dynamic User Authentication Scheme for Wireless Sensor Networks. |
SUTC (1) |
2006 |
DBLP DOI BibTeX RDF |
IEEE 802.15.4 Specification, Security, Sensor Networks, User Authentication |
27 | Qiming Li, Ee-Chien Chang |
Robust, short and sensitive authentication tags using secure sketch. |
MM&Sec |
2006 |
DBLP DOI BibTeX RDF |
two-level quantization, authentication, robustness, sensitivity, secure sketch |
27 | Gábor Fehér |
Enhancing wireless video streaming using lightweight approximate authentication. |
Q2SWinet |
2006 |
DBLP DOI BibTeX RDF |
approximate authentication, security, QoS, wireless video streaming, error resilient video coding |
27 | Christophe Tartary, Huaxiong Wang |
Rateless Codes for the Multicast Stream Authentication Problem. |
IWSEC |
2006 |
DBLP DOI BibTeX RDF |
rateless codes, stream authentication, polynomial reconstruction |
27 | Eun-Jun Yoon, Kee-Young Yoo |
One-Time Password Authentication Scheme Using Smart Cards Providing User Anonymity. |
ICCSA (5) |
2006 |
DBLP DOI BibTeX RDF |
Security, Cryptography, Smart card, User authentication, One-time password, Denial-of-Service attacks |
27 | Song Han 0004, Geoff Skinner, Vidyasagar M. Potdar, Elizabeth Chang 0001 |
A framework of authentication and authorization for e-health services. |
SWS |
2006 |
DBLP DOI BibTeX RDF |
privacy, authentication, authorization, e-health, personal data |
27 | Lan Nguyen |
Efficient Dynamic k-Times Anonymous Authentication. |
VIETCRYPT |
2006 |
DBLP DOI BibTeX RDF |
dynamic k-times anonymous authentication, k-show anonymous credentials, e-tag, privacy, anonymity |
27 | Christophe Tartary, Huaxiong Wang |
Achieving Multicast Stream Authentication Using MDS Codes. |
CANS |
2006 |
DBLP DOI BibTeX RDF |
erasure codes, stream authentication, polynomial reconstruction |
27 | Guilin Wang, Feng Bao 0001 |
Cryptanalysis of Timestamp-Based Password Authentication Schemes Using Smart Cards. |
ICICS |
2006 |
DBLP DOI BibTeX RDF |
smart card, hash function, attack, password authentication |
27 | Yukio Itakura, Shigeo Tsujii |
Proposal on a multifactor biometric authentication method based on cryptosystem keys containing biometric signatures. |
Int. J. Inf. Sec. |
2005 |
DBLP DOI BibTeX RDF |
Biological information, Authentication security, Biometrics-cryptographic key, Public-key cryptography, Personal identification |
27 | Michael Backes 0001, Birgit Pfitzmann, Michael Waidner |
Symmetric authentication in a simulatable Dolev-Yao-style cryptographic library. |
Int. J. Inf. Sec. |
2005 |
DBLP DOI BibTeX RDF |
Dolev-Yao, Symmetric authentication, Computational soundness |
27 | Michel Abdalla, David Pointcheval |
Interactive Diffie-Hellman Assumptions with Applications to Password-Based Authentication. |
Financial Cryptography |
2005 |
DBLP DOI BibTeX RDF |
Password-based authentication, multi-party protocols, Diffie-Hellman assumptions |
27 | Chang N. Zhang, Chunren Lai, Honglan Zhong |
An Efficient Authentication Scheme with Fault Tolerance for Database Systems. |
ICITA (2) |
2005 |
DBLP DOI BibTeX RDF |
fault tolerance, authentication, digital signature, error detection, error correction |
27 | Woo-Hun Kim, Eun-Jun Yoon, Kee-Young Yoo |
New Authentication Protocol Providing User Anonymity in Open Network. |
WINE |
2005 |
DBLP DOI BibTeX RDF |
Error-correcting codes, Mobile network, Key exchange, User authentication, User anonymity |
27 | Sheng Tang, Jin-Tao Li 0001, Yong-Dong Zhang 0001 |
SSF fingerprint for image authentication: an incidental distortion resistant scheme. |
ACM Multimedia |
2005 |
DBLP DOI BibTeX RDF |
PCA, digital signature, image authentication |
27 | Farid Ahmed, Ira S. Moskowitz |
Composite signature based watermarking for fingerprint authentication. |
MM&Sec |
2005 |
DBLP DOI BibTeX RDF |
Phasemark™, composite filter, phase only filter, watermarking, fingerprint, biometric authentication |
27 | Eun-Jun Yoon, Kee-Young Yoo |
A New Efficient Fingerprint-Based Remote User Authentication Scheme for Multimedia Systems. |
KES (3) |
2005 |
DBLP DOI BibTeX RDF |
Security techniques, Multimedia, Biometrics, Smart card, User authentication, Fingerprint verification |
27 | Michael Szydlo, Burton S. Kaliski Jr. |
Proofs for Two-Server Password Authentication. |
CT-RSA |
2005 |
DBLP DOI BibTeX RDF |
concrete security reduction, secret sharing, password authentication |
27 | Donggang Liu, Peng Ning |
Multilevel µTESLA: Broadcast authentication for distributed sensor networks. |
ACM Trans. Embed. Comput. Syst. |
2004 |
DBLP DOI BibTeX RDF |
sensor networks, Broadcast authentication, TESLA |
27 | Wei-Chi Ku |
A hash-based strong-password authentication scheme without using smart cards. |
ACM SIGOPS Oper. Syst. Rev. |
2004 |
DBLP DOI BibTeX RDF |
password-file compromise attack, strong password, user authentication, replay attack, denial-of-service attack |
27 | Min-Hui Lin 0001, Chin-Chen Chang 0001 |
A secure one-time password authentication scheme with low-computation for mobile communications. |
ACM SIGOPS Oper. Syst. Rev. |
2004 |
DBLP DOI BibTeX RDF |
off-line dictionary attack, server spoofing attack, authentication, smart card, replay attack, one-time password |
27 | Chou Chen Yang, Ren-Chiun Wang |
An improvement of security enhancement for the timestamp-based password authentication scheme using smart cards. |
ACM SIGOPS Oper. Syst. Rev. |
2004 |
DBLP DOI BibTeX RDF |
authentication, smart card, password, forgery attack |
27 | Chin-Chen Chang 0001, Iuon-Chang Lin |
Remarks on fingerprint-based remote user authentication scheme using smart cards. |
ACM SIGOPS Oper. Syst. Rev. |
2004 |
DBLP DOI BibTeX RDF |
conspiring attack, smart card, user authentication |
27 | Min-Shiang Hwang, Li-Hua Li, Cheng-Chi Lee |
A key authentication scheme with non-repudiation. |
ACM SIGOPS Oper. Syst. Rev. |
2004 |
DBLP DOI BibTeX RDF |
non-repudiation security, authentication, certificate, discrete logarithm, public key |
27 | Dacheng Zhang, Jie Xu 0007 |
Multi-Party Authentication for Web Services: Protocols, Implementation and Evaluation. |
ISORC |
2004 |
DBLP DOI BibTeX RDF |
security, Web services, fault tolerance, Authentication, key exchange, Internet computing |
27 | Mortaza S. Bargh, R. J. Hulsebosch, Henk Eertink, Anand R. Prasad, Hu Wang, Peter Schoo |
Fast authentication methods for handovers between IEEE 802.11 wireless LANs. |
WMASH |
2004 |
DBLP DOI BibTeX RDF |
inter/intra-domain, authentication, WLAN, handover, seamless |
27 | Yongsu Park, Yookun Cho |
The eSAIDA Stream Authentication Scheme. |
ICCSA (4) |
2004 |
DBLP DOI BibTeX RDF |
stream distribution, authentication, Network security, digital signature |
27 | Yongwha Chung, Daesung Moon, Taehae Kim, Jin-Won Park |
Workload Dispatch Planning for Real-Time Fingerprint Authentication on a Sensor-Client-Server Model. |
PDCAT |
2004 |
DBLP DOI BibTeX RDF |
Performance Evaluation, Authentication Protocol, Fingerprint Verification |
27 | Wei-Chi Ku, Chien-Ming Chen 0001, Hui-Lung Lee |
Weaknesses of Lee-Li-Hwang's hash-based password authentication scheme. |
ACM SIGOPS Oper. Syst. Rev. |
2003 |
DBLP DOI BibTeX RDF |
hash function, password authentication, guessing attack, denial-of-service attack, stolen-verifier attack |
27 | Jinshen Wang, Yuewei Dai, Stefan Thiemert, Zhiquan Wang |
A Feature-Watermarking Scheme for JPEG Image Authentication. |
IWDW |
2003 |
DBLP DOI BibTeX RDF |
semi-fragile, authentication, watermarking, features |
27 | Taekyoung Kwon 0002, Seongan Lim |
Automation-Considered Logic of Authentication and Key Distribution. |
WISA |
2003 |
DBLP DOI BibTeX RDF |
formal methods in security, Authentication protocols |
27 | André Weimerskirch, Dirk Westhoff |
Identity certified authentication for ad-hoc networks. |
SASN |
2003 |
DBLP DOI BibTeX RDF |
key-chains, security, ad-hoc networks, authentication, identification |
27 | Cheng-Chi Lee, Min-Shiang Hwang, Wei-Pang Yang |
A flexible remote user authentication scheme using smart cards. |
ACM SIGOPS Oper. Syst. Rev. |
2002 |
DBLP DOI BibTeX RDF |
security, authentication, cryptography, password |
27 | Arslan Brömme, Marcel Kronberg, Oliver Ellenbeck, Oliver Kasch |
A conceptual framework for testing biometric algorithms within operating systems' authentication. |
SAC |
2002 |
DBLP DOI BibTeX RDF |
testing biometric algorithms, evaluation, robustness, operating system, biometric authentication |
27 | Howard Barnum, Claude Crépeau, Daniel Gottesman, Adam D. Smith, Alain Tapp |
Authentication of Quantum Messages. |
FOCS |
2002 |
DBLP DOI BibTeX RDF |
Authentication, quantum information |
27 | Nicolas T. Courtois |
Efficient Zero-Knowledge Authentication Based on a Linear Algebra Problem MinRank. |
ASIACRYPT |
2001 |
DBLP DOI BibTeX RDF |
MinRank problem, rank-distance codes, syndrome decoding (SD), identification, NP-complete problems, group signatures, Zero-knowledge, ring signatures, multivariate cryptography, entity authentication |
27 | Woei-Jiunn Tsaur |
A Flexible User Authentication Scheme for Multi-server Internet Services. |
ICN (1) |
2001 |
DBLP DOI BibTeX RDF |
Internet, Smart card, Password authentication, Communications security, Lagrange interpolating polynomial |
27 | Stelvio Cimato |
Design of an Authentication Protocol for Gsm Javacards. |
ICISC |
2001 |
DBLP DOI BibTeX RDF |
Javacard, E-commerce and M- commerce security, Authentication protocol |
27 | Yoshiaki Isobe, Yoichi Seto, Masanori Kataoka |
Development of Personal Authentication System using Fingerprint with Digital Signature Technologies. |
HICSS |
2001 |
DBLP DOI BibTeX RDF |
Biometrics, Smart card, Public Key Infrastructure, Fingerprints verification, Personal authentication |
27 | Tsang Hin Chung, Kwong-Sak Leung, Kin-Hong Lee |
Design and Analysis of Smart Card Based Remote Authentication Protocol for Internet-Based System. |
WETICE |
2001 |
DBLP DOI BibTeX RDF |
security, java, Authentication, smart card |
27 | Michael K. Reiter, Stuart G. Stubblebine |
Authentication Metric Analysis and Design. |
ACM Trans. Inf. Syst. Secur. |
1999 |
DBLP DOI BibTeX RDF |
metrics of authentication, public key infrastructure |
27 | Khalid Al-Tawil, Ali Akrami |
A New Authentication Protocol for Roaming Users in GSM Networks. |
ISCC |
1999 |
DBLP DOI BibTeX RDF |
signaling traffic, authentication, Mobile communication, GSM, roaming |
27 | Mustafa Atici, Douglas R. Stinson |
Universal Hashing and Multiple Authentication. |
CRYPTO |
1996 |
DBLP DOI BibTeX RDF |
universal hashing, Authentication code |
27 | A. H. Wadaa, Hussein M. Abdel-Wahab, John McHugh |
Heuristic authentication protocol for TCP/IP network applications under UNIX. |
ACM Southeast Regional Conference |
1992 |
DBLP DOI BibTeX RDF |
UNIX Network Programming, Security, Distributed Systems, Authentication, Encryption, Client/Server Model, TCP/IP Protocols |
27 | Kalid Elmufti, Dasun Weerasinghe, Muttukrishnan Rajarajan, Veselin Rakocevic, Sanowar Khan, John A. MacDonald |
Mobile Web services authentication using SAML and 3GPP generic bootstrapping architecture. |
Int. J. Inf. Sec. |
2009 |
DBLP DOI BibTeX RDF |
3GPP generic bootstrapping architecture, Mobile Authentication Protocol, Authentication, SAML, Mobile Web Services, GAA |
27 | Lawrence C. Paulson |
Mechanized proofs for a recursive authentication protocol. |
CSFW |
1997 |
DBLP DOI BibTeX RDF |
mechanized proofs, recursive authentication protocol, inductive approach, message nesting, basic security theorem, adjacent pairs, honest agents, protocol complexity, agents, protocols, specification, symmetry, mutual authentication, Isabelle/HOL, session keys |
27 | Suan-Suan Chew, Kok-Leong Ng, Chye-Lin Chee |
IAuth: An authentication system for Internet applications. |
COMPSAC |
1997 |
DBLP DOI BibTeX RDF |
IAuth, authentication system, digital signing, Web application server, distributed computing, Internet applications, message authentication, client server, Web-based application, data encryption, security breach, cryptographic keys |
27 | S. Cheung |
An Efficient Message Authentication Scheme for Link State Routing. |
ACSAC |
1997 |
DBLP DOI BibTeX RDF |
message authentication scheme, routing cost reduction, routing updates, border routers, public-key based schemes, computationally expensive, detection-diagnosis-recovery approach, multiple-valued cost metrics, routing protocols, message authentication, link state routing, large networks |
27 | Leonid M. Tombak, Reihaneh Safavi-Naini |
Authentication Codes That Are r-Fold Secure Against Spoofing. |
CCS |
1994 |
DBLP DOI BibTeX RDF |
r-fold security, authentication, cryptography, computer security, authentication codes |
25 | Hector Ouilhet |
Google Sky Map: using your phone as an interface. |
Mobile HCI |
2010 |
DBLP DOI BibTeX RDF |
|
25 | Shangping Zhong, Xiangwen Liao, Xue Zhang, Jingqu Lin |
A Novel Distributed Single Sign-On Scheme with Dynamically Changed Threshold Value. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
25 | Zhishou Zhang, Qibin Sun, Wai-Choong Wong, John G. Apostolopoulos, Susie J. Wee |
Rate-Distortion Optimized Streaming of Authenticated Video. |
ICIP |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Helmut Scherzer, Ran Canetti, Paul A. Karger, Hugo Krawczyk, Tal Rabin, David C. Toll |
Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card. |
ESORICS |
2003 |
DBLP DOI BibTeX RDF |
|
25 | Benny Pinkas, Tomas Sander |
Securing passwords against dictionary attacks. |
CCS |
2002 |
DBLP DOI BibTeX RDF |
|
25 | Shai Halevi, Hugo Krawczyk |
Public-Key Cryptography and Password Protocols. |
ACM Trans. Inf. Syst. Secur. |
1999 |
DBLP DOI BibTeX RDF |
hand-held certificates, public passwords, public-key protocols, passwords, key exchange, dictionary attacks |
25 | Jochen Liedtke |
A Short Note on Implementing Thread Exclusiveness and Address Space Locking. |
ACM SIGOPS Oper. Syst. Rev. |
1994 |
DBLP DOI BibTeX RDF |
|
25 | Dan M. Nessett |
A Critique of the Burrows, Abadi and Needham Logic. |
ACM SIGOPS Oper. Syst. Rev. |
1990 |
DBLP DOI BibTeX RDF |
|
25 | Guoqiang Li 0001, Mizuhito Ogawa |
Authentication Revisited: Flaw or Not, the Recursive Authentication Protocol. |
ATVA |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Sun-Hwa Lim, Sang-Ho Lee |
Efficient IMS Authentication Architecture based on Initial Access Authentication in WiBro-Evolution (WiBro-EVO) System. |
VTC Spring |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Seongseob Hwang, Hyoungjoo Lee, Sungzoon Cho |
Improving Authentication Accuracy of Unfamiliar Passwords with Pauses and Cues for Keystroke Dynamics-Based Authentication. |
WISI |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Jeonil Kang, DaeHun Nyang, KyungHee Lee |
Two Factor Face Authentication Scheme with Cancelable Feature. |
IWBRS |
2005 |
DBLP DOI BibTeX RDF |
|
25 | Shaoning Pang, Seiichi Ozawa, Nikola K. Kasabov |
One-Pass Incremental Membership Authentication by Face Classification. |
ICBA |
2004 |
DBLP DOI BibTeX RDF |
|
25 | David Zhang 0001, Guangming Lu, Adams Wai-Kin Kong, Michael Wong |
Palmprint Authentication Technologies, Systems and Applications. |
SINOBIOMETRICS |
2004 |
DBLP DOI BibTeX RDF |
|
25 | Sébastien Marcel, Yann Rodriguez |
Biometric Face Authentication Using Pixel-Based Weak Classifiers. |
ECCV Workshop BioAW |
2004 |
DBLP DOI BibTeX RDF |
|
25 | Marios Savvides, B. V. K. Vijaya Kumar |
Quad Phase Minimum Average Correlation Energy Filters for Reduced Memory Illumination Tolerant Face Authentication. |
AVBPA |
2003 |
DBLP DOI BibTeX RDF |
|
25 | Huaqun Guo, Fan Yu, Wai-Choong Wong, Vivy Suhendra, Yongdong Wu |
Secure wireless communication platform for EV-to-Grid research. |
IWCMC |
2010 |
DBLP DOI BibTeX RDF |
secure wireless communication, authentication protocol, power grid, electric vehicle |
25 | R. Aparna, B. B. Amberker |
Authenticated Secure Group Communication using Broadcast Encryption Key Computation. |
ITNG |
2008 |
DBLP DOI BibTeX RDF |
Authentication, Threshold, Broadcast encryption, Secure Group Communication, Secret key |
25 | Takeshi Nishimura, Hiroyuki Sato |
LESSO: Legacy Enabling SSO. |
SAINT |
2008 |
DBLP DOI BibTeX RDF |
authentication, web application, PKI, SSO |
25 | Manhee Lee, Eun Jung Kim 0001 |
A Comprehensive Framework for Enhancing Security in InfiniBand Architecture. |
IEEE Trans. Parallel Distributed Syst. |
2007 |
DBLP DOI BibTeX RDF |
Cluster Security, InfiniBand Architecture, Galois/Counter Mode, Availability DoS, Authentication, Encryption |
25 | Michael Backes 0001, Agostino Cortesi, Riccardo Focardi, Matteo Maffei |
A calculus of challenges and responses. |
FMSE |
2007 |
DBLP DOI BibTeX RDF |
static analysis, authentication protocols, process calculi |
25 | Chris Karlof, Umesh Shankar, J. Doug Tygar, David A. Wagner 0001 |
Dynamic pharming attacks and locked same-origin policies for web browsers. |
CCS |
2007 |
DBLP DOI BibTeX RDF |
same-origin policy, pharming, web authentication |
25 | Rafael Marín López, Pedro J. Fernández, Antonio Fernandez Gómez-Skarmeta |
3-Party Approach for Fast Handover in EAP-Based Wireless Networks. |
OTM Conferences (2) |
2007 |
DBLP DOI BibTeX RDF |
security, authentication, key distribution, Fast handover |
25 | He Ge, Stephen R. Tate |
A Direct Anonymous Attestation Scheme for Embedded Devices. |
Public Key Cryptography |
2007 |
DBLP DOI BibTeX RDF |
Direct Anonymous Attestation, Trusted Computing Platform, Privacy, Authentication, Cryptographic Protocol, Group signature |
25 | Jong Sik Moon, Im-Yeong Lee |
A Study on Ticket-Based AAA Mechanism Including Time Synchronization OTP in Ubiquitous Environment. |
ICCSA (1) |
2007 |
DBLP DOI BibTeX RDF |
OTP, Authentication, Ubiquitous, AAA, Ticket |
25 | Alexander De Luca, Roman Weiss, Heinrich Hussmann |
PassShape: stroke based shape passwords. |
OZCHI |
2007 |
DBLP DOI BibTeX RDF |
PassShape, shape passwords, security, authentication |
25 | Krzysztof Golofit |
Click Passwords Under Investigation. |
ESORICS |
2007 |
DBLP DOI BibTeX RDF |
Click Passwords, PassPoints, Passlogix, graphical authentication, picture passwords, human factor, dictionary attacks, keypad |
25 | Vedat Coskun, Erdal Cayirci, Albert Levi, Serdar Sancak |
Quarantine Region Scheme to Mitigate Spam Attacks in Wireless Sensor Networks. |
IEEE Trans. Mob. Comput. |
2006 |
DBLP DOI BibTeX RDF |
quarantine region, spam attacks, wireless sensor networks, authentication, Network-level security and protection |
25 | Youngsook Lee, Junghyun Nam, Dongho Won |
An Inter-domain Key Agreement Protocol Using Weak Passwords. |
ICCSA (3) |
2006 |
DBLP DOI BibTeX RDF |
authentication, password, Key exchange, public key |
25 | He Ge, Stephen R. Tate |
Traceable Signature: Better Efficiency and Beyond. |
ICCSA (3) |
2006 |
DBLP DOI BibTeX RDF |
Variable Anonymity, Cryptographic Protocol, Group signature, Anonymous Authentication, Traceable Signature |
25 | Sanggon Lee, Yvonne Hitchcock, Youngho Park 0005, Sang-Jae Moon |
Provably Secure Tripartite Password Protected Key Exchange Protocol Based on Elliptic Curves. |
Selected Areas in Cryptography |
2005 |
DBLP DOI BibTeX RDF |
Tripartite key agreement, bilinear Diffie-Hellman problem, Joux’s protocol, provable security, password-based authentication |
25 | Michel Abdalla, Olivier Chevassut, Pierre-Alain Fouque, David Pointcheval |
A Simple Threshold Authenticated Key Exchange from Short Secrets. |
ASIACRYPT |
2005 |
DBLP DOI BibTeX RDF |
Threshold Protocols, Password-based Authentication |
25 | Ulrike Meyer, Susanne Wetzel |
A man-in-the-middle attack on UMTS. |
Workshop on Wireless Security |
2004 |
DBLP DOI BibTeX RDF |
authentication, UMTS, mobile communication, GSM, man-in-the-middle attack |
25 | Chang N. Zhang, Honglan Zhong |
An Integrated Approach for Database Security and Fault Tolerance. |
ITCC (1) |
2004 |
DBLP DOI BibTeX RDF |
database encryption, redundant residue number, fault tolerance, authentication, error detection, error correction |
25 | Masafumi Yamada, Kazuhiro Kamiya, Mineichi Kudo, Hidetoshi Nonaka, Jun Toyama |
Soft authentication and behavior analysis using a chair with sensors attached: hipprint authentication. |
Pattern Anal. Appl. |
2009 |
DBLP DOI BibTeX RDF |
Soft authentication, Sensor-attached chair, Posture analysis, Behavior analysis |
Displaying result #401 - #500 of 25398 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ >>] |
|