|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 8079 occurrences of 2235 keywords
|
|
|
Results
Found 25398 publication records. Showing 25398 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
27 | Shuihua Han, Chao-Hsien Chu, Shuangyuan Yang |
Content-based Image Authentication: Current Status, Issues, and Challenges. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSC ![In: Proceedings of the First IEEE International Conference on Semantic Computing (ICSC 2007), September 17-19, 2007, Irvine, California, USA, pp. 630-636, 2007, IEEE Computer Society, 0-7695-2997-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
content-based authentication, security, performance trade-off, Image hash |
27 | Junbeom Hur, Chanil Park, Hyunsoo Yoon |
An Efficient Pre-authentication Scheme for IEEE 802.11-Based Vehicular Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security, Second International Workshop on Security, IWSEC 2007, Nara, Japan, October 29-31, 2007, Proceedings, pp. 121-136, 2007, Springer, 978-3-540-75650-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
proactive key distribution, pre-authentication, IEEE 802.11 network, vehicular network, fast handoff |
27 | Rafael Marín López, Santiago Zapata Hernandez, Antonio Fernandez Gómez-Skarmeta |
Secure Protocol for Fast Authentication in EAP-Based Wireless Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (2) ![In: Computational Science and Its Applications - ICCSA 2007, International Conference, Kuala Lumpur, Malaysia, August 26-29, 2007. Proceedings, Part II, pp. 1038-1051, 2007, Springer, 978-3-540-74475-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
security, authentication, Fast handover, network access control |
27 | Jun-Won Lee, Sang-Won Min, Byung K. Choi |
An Efficient Authentication Procedure for Fast Handoff in Mobile IPv6 Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICOIN ![In: Information Networking. Towards Ubiquitous Networking and Services, International Conference, ICOIN 2007, Estoril, Portugal, January 23-25, 2007. Revised Selected Papers, pp. 639-648, 2007, Springer, 978-3-540-89523-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
temporary authentication, fast handoff and wireless mobile networks, MIPv6, AAA |
27 | Pedro Felix, Carlos Ribeiro |
A scalable and flexible web services authentication model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SWS ![In: Proceedings of the 4th ACM Workshop On Secure Web Services, SWS 2007, Fairfax, VA, USA, November 2, 2007, pp. 66-72, 2007, ACM, 978-1-59593-892-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
authentication, trust management, web services security |
27 | Christophe Tartary, Huaxiong Wang, Josef Pieprzyk |
An Hybrid Approach for Efficient Multicast Stream Authentication over Unsecured Channels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security, First International Conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007, Proceedings, pp. 17-34, 2007, Springer, 978-3-540-75669-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Unsecured Channel, Erasure Code, Stream Authentication, Merkle Hash Tree, Polynomial Reconstruction |
27 | JaeCheol Ha, Sang-Jae Moon, Juan Manuel González Nieto, Colin Boyd |
Security Analysis and Enhancement of One-Way Hash Based Low-Cost Authentication Protocol (OHLCAP). ![Search on Bibsonomy](Pics/bibsonomy.png) |
PAKDD Workshops ![In: Emerging Technologies in Knowledge Discovery and Data Mining, PAKDD 2007, International Workshops, Nanjing, China, May 22-25, 2007, Revised Selected Papers, pp. 574-583, 2007, Springer, 978-3-540-77016-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
group-based authentication, traceability, RFID system, indistinguishability |
27 | Abdallah Mhamed, Cecilia Fred, Arab Farah |
An Authentication Architecture Dedicated to Dependent People in Smart Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICOST ![In: Pervasive Computing for Quality of Life Enhancement, 5th International Conference On Smart Homes and Health Telematics, ICOST 2007, Nara, Japan, June 21-23, 2007, Proceedings, pp. 90-98, 2007, Springer, 978-3-540-73034-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
dependent people, security, authentication, Pervasive computing, biometrics, user profile, smart home |
27 | Song Y. Yan, Carsten Maple, Glyn James |
A New Scheme for Deniable/Repudiable Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CASC ![In: Computer Algebra in Scientific Computing, 10th International Workshop, CASC 2007, Bonn, Germany, September 16-20, 2007, Proceedings, pp. 424-432, 2007, Springer, 978-3-540-75186-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Deniable/repudiable authentication, quadratic residuosity problem, intractability |
27 | Anthony J. Nicholson, Mark D. Corner, Brian D. Noble |
Mobile Device Security Using Transient Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Mob. Comput. ![In: IEEE Trans. Mob. Comput. 5(11), pp. 1489-1502, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Transient authentication, security, privacy, mobile computing, human factors, cryptographic controls |
27 | Patrick P. C. Lee, John C. S. Lui, David K. Y. Yau |
Distributed collaborative key agreement and authentication protocols for dynamic peer groups. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE/ACM Trans. Netw. ![In: IEEE/ACM Trans. Netw. 14(2), pp. 263-276, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
dynamic peer groups, security, authentication, group key agreement, secure group communication, rekeying |
27 | Alain P. Hiltgen, Thorsten Kramp, Thomas Weigold |
Secure Internet Banking Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 4(2), pp. 21-29, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
short-time passwords, short-lived passwords, taxonomy of attacks, authentication, Internet banking, public-key certificates |
27 | Liyan Zhang, Anshuman Razdan, Gerald E. Farin, John Femiani 0001, MyungSoo Bae, Charles Lockwood |
3D face authentication and recognition based on bilateral symmetry analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Vis. Comput. ![In: Vis. Comput. 22(1), pp. 43-55, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Symmetry analysis, Face recognition, Face authentication, 3D faces |
27 | Ya-Jeng Lin, Shiuhpyng Shieh, Warren W. Lin |
Lightweight, pollution-attack resistant multicast authentication scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2006, Taipei, Taiwan, March 21-24, 2006, pp. 148-156, 2006, ACM, 1-59593-272-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
signature amortization, authentication, multicast, erasure code, pollution-attack |
27 | Wen-Guey Tzeng |
A secure system for data access based on anonymous authentication and time-dependent hierarchical keys. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2006, Taipei, Taiwan, March 21-24, 2006, pp. 223-230, 2006, ACM, 1-59593-272-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
entity security, hierarchical keys, trapdoor time-sharable sequence, world wide web security, anonymous authentication |
27 | Eun-Jun Yoon, Kee-Young Yoo |
An Improved Lu-Cao's Remote User Authentication Scheme Using Smart Card. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, Third European PKI Workshop: Theory and Practice, EuroPKI 2006, Turin, Italy, June 19-20, 2006, Proceedings, pp. 45-53, 2006, Springer, 3-540-35151-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Authentication, Network security, Smart card, Password |
27 | Kirk H. M. Wong, Yuan Zheng 0001, Jiannong Cao 0001, Shengwei Wang |
A Dynamic User Authentication Scheme for Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SUTC (1) ![In: IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC 2006), 5-7 June 2006, Taichung, Taiwan, pp. 244-251, 2006, IEEE Computer Society, 0-7695-2553-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
IEEE 802.15.4 Specification, Security, Sensor Networks, User Authentication |
27 | Qiming Li, Ee-Chien Chang |
Robust, short and sensitive authentication tags using secure sketch. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MM&Sec ![In: Proceedings of the 8th workshop on Multimedia & Security, MM&Sec 2006, Geneva, Switzerland, September 26-27, 2006, pp. 56-61, 2006, ACM, 1-59593-493-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
two-level quantization, authentication, robustness, sensitivity, secure sketch |
27 | Gábor Fehér |
Enhancing wireless video streaming using lightweight approximate authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Q2SWinet ![In: Q2SWinet'06 - Proceedings of the Second ACM Workshop on Q2S and Security for Wireless and Mobile Networks, Terromolinos, Spain, October 2, 2006, pp. 9-16, 2006, ACM, 1-59593-486-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
approximate authentication, security, QoS, wireless video streaming, error resilient video coding |
27 | Christophe Tartary, Huaxiong Wang |
Rateless Codes for the Multicast Stream Authentication Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security, First International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006, Proceedings, pp. 136-151, 2006, Springer, 3-540-47699-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
rateless codes, stream authentication, polynomial reconstruction |
27 | Eun-Jun Yoon, Kee-Young Yoo |
One-Time Password Authentication Scheme Using Smart Cards Providing User Anonymity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (5) ![In: Computational Science and Its Applications - ICCSA 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part V, pp. 303-311, 2006, Springer, 3-540-34079-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Security, Cryptography, Smart card, User authentication, One-time password, Denial-of-Service attacks |
27 | Song Han 0004, Geoff Skinner, Vidyasagar M. Potdar, Elizabeth Chang 0001 |
A framework of authentication and authorization for e-health services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SWS ![In: Proceedings of the 3rd ACM Workshop On Secure Web Services, SWS 2006, Alexandria, VA, USA, November 3, 2006, pp. 105-106, 2006, ACM, 1-59593-546-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
privacy, authentication, authorization, e-health, personal data |
27 | Lan Nguyen |
Efficient Dynamic k-Times Anonymous Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VIETCRYPT ![In: Progressin Cryptology - VIETCRYPT 2006, First International Conference on Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006, Revised Selected Papers, pp. 81-98, 2006, Springer, 3-540-68799-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
dynamic k-times anonymous authentication, k-show anonymous credentials, e-tag, privacy, anonymity |
27 | Christophe Tartary, Huaxiong Wang |
Achieving Multicast Stream Authentication Using MDS Codes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 5th International Conference, CANS 2006, Suzhou, China, December 8-10, 2006, Proceedings, pp. 108-125, 2006, Springer, 3-540-49462-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
erasure codes, stream authentication, polynomial reconstruction |
27 | Guilin Wang, Feng Bao 0001 |
Cryptanalysis of Timestamp-Based Password Authentication Schemes Using Smart Cards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings, pp. 399-409, 2006, Springer, 3-540-49496-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
smart card, hash function, attack, password authentication |
27 | Yukio Itakura, Shigeo Tsujii |
Proposal on a multifactor biometric authentication method based on cryptosystem keys containing biometric signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 4(4), pp. 288-296, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Biological information, Authentication security, Biometrics-cryptographic key, Public-key cryptography, Personal identification |
27 | Michael Backes 0001, Birgit Pfitzmann, Michael Waidner |
Symmetric authentication in a simulatable Dolev-Yao-style cryptographic library. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 4(3), pp. 135-154, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Dolev-Yao, Symmetric authentication, Computational soundness |
27 | Michel Abdalla, David Pointcheval |
Interactive Diffie-Hellman Assumptions with Applications to Password-Based Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 9th International Conference, FC 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers, pp. 341-356, 2005, Springer, 3-540-26656-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Password-based authentication, multi-party protocols, Diffie-Hellman assumptions |
27 | Chang N. Zhang, Chunren Lai, Honglan Zhong |
An Efficient Authentication Scheme with Fault Tolerance for Database Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITA (2) ![In: Third International Conference on Information Technology and Applications (ICITA 2005), 4-7 July 2005, Sydney, Australia, pp. 448-453, 2005, IEEE Computer Society, 0-7695-2316-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
fault tolerance, authentication, digital signature, error detection, error correction |
27 | Woo-Hun Kim, Eun-Jun Yoon, Kee-Young Yoo |
New Authentication Protocol Providing User Anonymity in Open Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WINE ![In: Internet and Network Economics, First International Workshop, WINE 2005, Hong Kong, China, December 15-17, 2005, Proceedings, pp. 414-423, 2005, Springer, 3-540-30900-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Error-correcting codes, Mobile network, Key exchange, User authentication, User anonymity |
27 | Sheng Tang, Jin-Tao Li 0001, Yong-Dong Zhang 0001 |
SSF fingerprint for image authentication: an incidental distortion resistant scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Multimedia ![In: Proceedings of the 13th ACM International Conference on Multimedia, Singapore, November 6-11, 2005, pp. 523-526, 2005, ACM, 1-59593-044-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
PCA, digital signature, image authentication |
27 | Farid Ahmed, Ira S. Moskowitz |
Composite signature based watermarking for fingerprint authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MM&Sec ![In: Proceedings of the 7th workshop on Multimedia & Security, MM&Sec 2005, New York, NY, USA, August 1-2, 2005, 2006, pp. 137-142, 2005, ACM, 1-59593-032-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Phasemark™, composite filter, phase only filter, watermarking, fingerprint, biometric authentication |
27 | Eun-Jun Yoon, Kee-Young Yoo |
A New Efficient Fingerprint-Based Remote User Authentication Scheme for Multimedia Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES (3) ![In: Knowledge-Based Intelligent Information and Engineering Systems, 9th International Conference, KES 2005, Melbourne, Australia, September 14-16, 2005, Proceedings, Part III, pp. 332-338, 2005, Springer, 3-540-28896-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Security techniques, Multimedia, Biometrics, Smart card, User authentication, Fingerprint verification |
27 | Michael Szydlo, Burton S. Kaliski Jr. |
Proofs for Two-Server Password Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2005, The Cryptographers' Track at the RSA Conference 2005, San Francisco, CA, USA, February 14-18, 2005, Proceedings, pp. 227-244, 2005, Springer, 3-540-24399-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
concrete security reduction, secret sharing, password authentication |
27 | Donggang Liu, Peng Ning |
Multilevel µTESLA: Broadcast authentication for distributed sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Embed. Comput. Syst. ![In: ACM Trans. Embed. Comput. Syst. 3(4), pp. 800-836, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
sensor networks, Broadcast authentication, TESLA |
27 | Wei-Chi Ku |
A hash-based strong-password authentication scheme without using smart cards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGOPS Oper. Syst. Rev. ![In: ACM SIGOPS Oper. Syst. Rev. 38(1), pp. 29-34, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
password-file compromise attack, strong password, user authentication, replay attack, denial-of-service attack |
27 | Min-Hui Lin 0001, Chin-Chen Chang 0001 |
A secure one-time password authentication scheme with low-computation for mobile communications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGOPS Oper. Syst. Rev. ![In: ACM SIGOPS Oper. Syst. Rev. 38(2), pp. 76-84, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
off-line dictionary attack, server spoofing attack, authentication, smart card, replay attack, one-time password |
27 | Chou Chen Yang, Ren-Chiun Wang |
An improvement of security enhancement for the timestamp-based password authentication scheme using smart cards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGOPS Oper. Syst. Rev. ![In: ACM SIGOPS Oper. Syst. Rev. 38(3), pp. 91-96, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
authentication, smart card, password, forgery attack |
27 | Chin-Chen Chang 0001, Iuon-Chang Lin |
Remarks on fingerprint-based remote user authentication scheme using smart cards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGOPS Oper. Syst. Rev. ![In: ACM SIGOPS Oper. Syst. Rev. 38(4), pp. 91-96, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
conspiring attack, smart card, user authentication |
27 | Min-Shiang Hwang, Li-Hua Li, Cheng-Chi Lee |
A key authentication scheme with non-repudiation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGOPS Oper. Syst. Rev. ![In: ACM SIGOPS Oper. Syst. Rev. 38(3), pp. 75-78, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
non-repudiation security, authentication, certificate, discrete logarithm, public key |
27 | Dacheng Zhang, Jie Xu 0007 |
Multi-Party Authentication for Web Services: Protocols, Implementation and Evaluation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISORC ![In: 7th IEEE International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC 2004), 12-14 May 2004, Vienna, Austria, pp. 227-234, 2004, IEEE Computer Society, 0-7695-2124-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
security, Web services, fault tolerance, Authentication, key exchange, Internet computing |
27 | Mortaza S. Bargh, R. J. Hulsebosch, Henk Eertink, Anand R. Prasad, Hu Wang, Peter Schoo |
Fast authentication methods for handovers between IEEE 802.11 wireless LANs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WMASH ![In: Proceedings of the 2nd ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots, WMASH 2004, Philadelphia, PA, USA, October 1, 2004, pp. 51-60, 2004, ACM, 1-58113-877-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
inter/intra-domain, authentication, WLAN, handover, seamless |
27 | Yongsu Park, Yookun Cho |
The eSAIDA Stream Authentication Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (4) ![In: Computational Science and Its Applications - ICCSA 2004, International Conference, Assisi, Italy, May 14-17, 2004, Proceedings, Part IV, pp. 799-807, 2004, Springer, 3-540-22060-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
stream distribution, authentication, Network security, digital signature |
27 | Yongwha Chung, Daesung Moon, Taehae Kim, Jin-Won Park |
Workload Dispatch Planning for Real-Time Fingerprint Authentication on a Sensor-Client-Server Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PDCAT ![In: Parallel and Distributed Computing: Applications and Technologies, 5th International Conference, PDCAT 2004, Singapore, December 8-10, 2004, Proceedings, pp. 833-838, 2004, Springer, 3-540-24013-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Performance Evaluation, Authentication Protocol, Fingerprint Verification |
27 | Wei-Chi Ku, Chien-Ming Chen 0001, Hui-Lung Lee |
Weaknesses of Lee-Li-Hwang's hash-based password authentication scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGOPS Oper. Syst. Rev. ![In: ACM SIGOPS Oper. Syst. Rev. 37(4), pp. 19-25, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
hash function, password authentication, guessing attack, denial-of-service attack, stolen-verifier attack |
27 | Jinshen Wang, Yuewei Dai, Stefan Thiemert, Zhiquan Wang |
A Feature-Watermarking Scheme for JPEG Image Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWDW ![In: Digital Watermarking, Second International Workshop, IWDW 2003, Seoul, Korea, October 20-22, 2003, Revised Papers, pp. 212-222, 2003, Springer, 3-540-21061-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
semi-fragile, authentication, watermarking, features |
27 | Taekyoung Kwon 0002, Seongan Lim |
Automation-Considered Logic of Authentication and Key Distribution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 4th International Workshop, WISA 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers, pp. 442-457, 2003, Springer, 3-540-20827-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
formal methods in security, Authentication protocols |
27 | André Weimerskirch, Dirk Westhoff |
Identity certified authentication for ad-hoc networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SASN ![In: Proceedings of the 1st ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2003, Fairfax, Virginia, USA, 2003, pp. 33-40, 2003, ACM, 1-58113-783-4. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
key-chains, security, ad-hoc networks, authentication, identification |
27 | Cheng-Chi Lee, Min-Shiang Hwang, Wei-Pang Yang |
A flexible remote user authentication scheme using smart cards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGOPS Oper. Syst. Rev. ![In: ACM SIGOPS Oper. Syst. Rev. 36(3), pp. 46-52, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
security, authentication, cryptography, password |
27 | Arslan Brömme, Marcel Kronberg, Oliver Ellenbeck, Oliver Kasch |
A conceptual framework for testing biometric algorithms within operating systems' authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2002 ACM Symposium on Applied Computing (SAC), March 10-14, 2002, Madrid, Spain, pp. 273-280, 2002, ACM, 1-58113-445-2. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
testing biometric algorithms, evaluation, robustness, operating system, biometric authentication |
27 | Howard Barnum, Claude Crépeau, Daniel Gottesman, Adam D. Smith, Alain Tapp |
Authentication of Quantum Messages. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOCS ![In: 43rd Symposium on Foundations of Computer Science (FOCS 2002), 16-19 November 2002, Vancouver, BC, Canada, Proceedings, pp. 449-458, 2002, IEEE Computer Society, 0-7695-1822-2. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Authentication, quantum information |
27 | Nicolas T. Courtois |
Efficient Zero-Knowledge Authentication Based on a Linear Algebra Problem MinRank. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2001, 7th International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia, December 9-13, 2001, Proceedings, pp. 402-421, 2001, Springer, 3-540-42987-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
MinRank problem, rank-distance codes, syndrome decoding (SD), identification, NP-complete problems, group signatures, Zero-knowledge, ring signatures, multivariate cryptography, entity authentication |
27 | Woei-Jiunn Tsaur |
A Flexible User Authentication Scheme for Multi-server Internet Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICN (1) ![In: Networking - ICN 2001, First International Conference, Colmar, France, July 9-13, 2001 Proceedings, Part 1, pp. 174-183, 2001, Springer, 3-540-42302-8. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Internet, Smart card, Password authentication, Communications security, Lagrange interpolating polynomial |
27 | Stelvio Cimato |
Design of an Authentication Protocol for Gsm Javacards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2001, 4th International Conference Seoul, Korea, December 6-7, 2001, Proceedings, pp. 355-368, 2001, Springer, 3-540-43319-8. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Javacard, E-commerce and M- commerce security, Authentication protocol |
27 | Yoshiaki Isobe, Yoichi Seto, Masanori Kataoka |
Development of Personal Authentication System using Fingerprint with Digital Signature Technologies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 34th Annual Hawaii International Conference on System Sciences (HICSS-34), January 3-6, 2001, Maui, Hawaii, USA, 2001, IEEE Computer Society, 0-7695-0981-9. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Biometrics, Smart card, Public Key Infrastructure, Fingerprints verification, Personal authentication |
27 | Tsang Hin Chung, Kwong-Sak Leung, Kin-Hong Lee |
Design and Analysis of Smart Card Based Remote Authentication Protocol for Internet-Based System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WETICE ![In: 10th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2001), 20-22 June 2001, Cambridge, MA, USA, pp. 229-230, 2001, IEEE Computer Society, 0-7695-1269-0. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
security, java, Authentication, smart card |
27 | Michael K. Reiter, Stuart G. Stubblebine |
Authentication Metric Analysis and Design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 2(2), pp. 138-158, 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
metrics of authentication, public key infrastructure |
27 | Khalid Al-Tawil, Ali Akrami |
A New Authentication Protocol for Roaming Users in GSM Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the Fourth IEEE Symposium on Computers and Communications (ISCC 1999), 6-8 July 1999, Sharm El Sheikh, Red Sea, Egypt, pp. 93-99, 1999, IEEE Computer Society, 0-7695-0250-4. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
signaling traffic, authentication, Mobile communication, GSM, roaming |
27 | Mustafa Atici, Douglas R. Stinson |
Universal Hashing and Multiple Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '96, 16th Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 1996, Proceedings, pp. 16-30, 1996, Springer, 3-540-61512-1. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
universal hashing, Authentication code |
27 | A. H. Wadaa, Hussein M. Abdel-Wahab, John McHugh |
Heuristic authentication protocol for TCP/IP network applications under UNIX. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Southeast Regional Conference ![In: Proceedings of the 30th Annual Southeast Regional Conference, 1992, Raleigh, North Carolina, USA, April 8-10, 1992, pp. 61-68, 1992, ACM, 0-89791-506-2. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
UNIX Network Programming, Security, Distributed Systems, Authentication, Encryption, Client/Server Model, TCP/IP Protocols |
27 | Kalid Elmufti, Dasun Weerasinghe, Muttukrishnan Rajarajan, Veselin Rakocevic, Sanowar Khan, John A. MacDonald |
Mobile Web services authentication using SAML and 3GPP generic bootstrapping architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 8(2), pp. 77-87, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
3GPP generic bootstrapping architecture, Mobile Authentication Protocol, Authentication, SAML, Mobile Web Services, GAA |
27 | Lawrence C. Paulson |
Mechanized proofs for a recursive authentication protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 10th Computer Security Foundations Workshop (CSFW '97), June 10-12, 1997, Rockport, Massachusetts, USA, pp. 84-95, 1997, IEEE Computer Society, 0-8186-7990-5. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
mechanized proofs, recursive authentication protocol, inductive approach, message nesting, basic security theorem, adjacent pairs, honest agents, protocol complexity, agents, protocols, specification, symmetry, mutual authentication, Isabelle/HOL, session keys |
27 | Suan-Suan Chew, Kok-Leong Ng, Chye-Lin Chee |
IAuth: An authentication system for Internet applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC ![In: 21st International Computer Software and Applications Conference (COMPSAC '97), 11-15 August 1997, Washington, DC, USA, pp. 654-659, 1997, IEEE Computer Society, 0-8186-8105-5. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
IAuth, authentication system, digital signing, Web application server, distributed computing, Internet applications, message authentication, client server, Web-based application, data encryption, security breach, cryptographic keys |
27 | S. Cheung |
An Efficient Message Authentication Scheme for Link State Routing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 13th Annual Computer Security Applications Conference (ACSAC 1997), 8-12 December 1997, San Diego, CA, USA, pp. 90-98, 1997, IEEE Computer Society, 0-8186-8274-4. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
message authentication scheme, routing cost reduction, routing updates, border routers, public-key based schemes, computationally expensive, detection-diagnosis-recovery approach, multiple-valued cost metrics, routing protocols, message authentication, link state routing, large networks |
27 | Leonid M. Tombak, Reihaneh Safavi-Naini |
Authentication Codes That Are r-Fold Secure Against Spoofing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: CCS '94, Proceedings of the 2nd ACM Conference on Computer and Communications Security, Fairfax, Virginia, USA, November 2-4, 1994., pp. 166-169, 1994, ACM, 0-89791-732-4. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
r-fold security, authentication, cryptography, computer security, authentication codes |
25 | Hector Ouilhet |
Google Sky Map: using your phone as an interface. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mobile HCI ![In: Proceedings of the 12th Conference on Human-Computer Interaction with Mobile Devices and Services, Mobile HCI 2010, Lisbon, Portugal, September 7-10, 2010, pp. 419-422, 2010, ACM, 978-1-60558-835-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
25 | Shangping Zhong, Xiangwen Liao, Xue Zhang, Jingqu Lin |
A Novel Distributed Single Sign-On Scheme with Dynamically Changed Threshold Value. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Fifth International Conference on Information Assurance and Security, IAS 2009, Xi'An, China, 18-20 August 2009, pp. 563-566, 2009, IEEE Computer Society, 978-0-7695-3744-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
25 | Zhishou Zhang, Qibin Sun, Wai-Choong Wong, John G. Apostolopoulos, Susie J. Wee |
Rate-Distortion Optimized Streaming of Authenticated Video. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIP ![In: Proceedings of the International Conference on Image Processing, ICIP 2006, October 8-11, Atlanta, Georgia, USA, pp. 1661-1664, 2006, IEEE, 1-4244-0480-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Helmut Scherzer, Ran Canetti, Paul A. Karger, Hugo Krawczyk, Tal Rabin, David C. Toll |
Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2003, 8th European Symposium on Research in Computer Security, Gjøvik, Norway, October 13-15, 2003, Proceedings, pp. 181-200, 2003, Springer, 3-540-20300-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
25 | Benny Pinkas, Tomas Sander |
Securing passwords against dictionary attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS 2002, Washington, DC, USA, November 18-22, 2002, pp. 161-170, 2002, ACM, 1-58113-612-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
25 | Shai Halevi, Hugo Krawczyk |
Public-Key Cryptography and Password Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 2(3), pp. 230-268, 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
hand-held certificates, public passwords, public-key protocols, passwords, key exchange, dictionary attacks |
25 | Jochen Liedtke |
A Short Note on Implementing Thread Exclusiveness and Address Space Locking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGOPS Oper. Syst. Rev. ![In: ACM SIGOPS Oper. Syst. Rev. 28(3), pp. 38-42, 1994. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
25 | Dan M. Nessett |
A Critique of the Burrows, Abadi and Needham Logic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGOPS Oper. Syst. Rev. ![In: ACM SIGOPS Oper. Syst. Rev. 24(2), pp. 35-38, 1990. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
25 | Guoqiang Li 0001, Mizuhito Ogawa |
Authentication Revisited: Flaw or Not, the Recursive Authentication Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ATVA ![In: Automated Technology for Verification and Analysis, 6th International Symposium, ATVA 2008, Seoul, Korea, October 20-23, 2008. Proceedings, pp. 374-385, 2008, Springer, 978-3-540-88386-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Sun-Hwa Lim, Sang-Ho Lee |
Efficient IMS Authentication Architecture based on Initial Access Authentication in WiBro-Evolution (WiBro-EVO) System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VTC Spring ![In: Proceedings of the 65th IEEE Vehicular Technology Conference, VTC Spring 2007, 22-25 April 2007, Dublin, Ireland, pp. 904-908, 2007, IEEE. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Seongseob Hwang, Hyoungjoo Lee, Sungzoon Cho |
Improving Authentication Accuracy of Unfamiliar Passwords with Pauses and Cues for Keystroke Dynamics-Based Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISI ![In: Intelligence and Security Informatics, International Workshop, WISI 2006, Singapore, April 9, 2006, Proceedings, pp. 73-78, 2006, Springer, 3-540-33361-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Jeonil Kang, DaeHun Nyang, KyungHee Lee |
Two Factor Face Authentication Scheme with Cancelable Feature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWBRS ![In: Advances in Biometric Person Authentication, International Workshop on Biometric Recognition Systems, IWBRS2005, Beijing, China, October 22-23, 2005, Proceedings, pp. 67-76, 2005, Springer, 3-540-29431-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
25 | Shaoning Pang, Seiichi Ozawa, Nikola K. Kasabov |
One-Pass Incremental Membership Authentication by Face Classification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICBA ![In: Biometric Authentication, First International Conference, ICBA 2004, Hong Kong, China, July 15-17, 2004, Proceedings, pp. 155-161, 2004, Springer, 3-540-22146-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
25 | David Zhang 0001, Guangming Lu, Adams Wai-Kin Kong, Michael Wong |
Palmprint Authentication Technologies, Systems and Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SINOBIOMETRICS ![In: Advances in Biometric Person Authentication, 5th Chinese Conference on Biometric Recognition, SINOBIOMETRICS 2004, Guangzhou, China, December 13-14, 2004, Proceedings, pp. 78-89, 2004, Springer, 3-540-24029-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
25 | Sébastien Marcel, Yann Rodriguez |
Biometric Face Authentication Using Pixel-Based Weak Classifiers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECCV Workshop BioAW ![In: Biometric Authentication, ECCV 2004 International Workshop, BioAW 2004, Prague, Czech Republic, May 15, 2004, Proceedings, pp. 24-31, 2004, Springer, 3-540-22499-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
25 | Marios Savvides, B. V. K. Vijaya Kumar |
Quad Phase Minimum Average Correlation Energy Filters for Reduced Memory Illumination Tolerant Face Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AVBPA ![In: Audio-and Video-Based Biometrie Person Authentication, 4th International Conference, AVBPA 2003, Guildford, UK, June 9-11, 2003 Proceedings, pp. 19-26, 2003, Springer, 3-540-40302-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
25 | Huaqun Guo, Fan Yu, Wai-Choong Wong, Vivy Suhendra, Yongdong Wu |
Secure wireless communication platform for EV-to-Grid research. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWCMC ![In: Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, IWCMC 2010, Caen, France, June 28 - July 2, 2010, pp. 21-25, 2010, ACM, 978-1-4503-0062-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
secure wireless communication, authentication protocol, power grid, electric vehicle |
25 | R. Aparna, B. B. Amberker |
Authenticated Secure Group Communication using Broadcast Encryption Key Computation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Fifth International Conference on Information Technology: New Generations (ITNG 2008), 7-8 April 2008, Las Vegas, Nevada, USA, pp. 348-353, 2008, IEEE Computer Society, 978-0-7695-3099-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Authentication, Threshold, Broadcast encryption, Secure Group Communication, Secret key |
25 | Takeshi Nishimura, Hiroyuki Sato |
LESSO: Legacy Enabling SSO. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAINT ![In: Proceedings of the 2008 International Symposium on Applications and the Internet, SAINT 2008, 28 July - 1 August 2008, Turku, Finland, pp. 301-304, 2008, IEEE Computer Society, 978-0-7695-3297-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
authentication, web application, PKI, SSO |
25 | Manhee Lee, Eun Jung Kim 0001 |
A Comprehensive Framework for Enhancing Security in InfiniBand Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Parallel Distributed Syst. ![In: IEEE Trans. Parallel Distributed Syst. 18(10), pp. 1393-1406, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Cluster Security, InfiniBand Architecture, Galois/Counter Mode, Availability DoS, Authentication, Encryption |
25 | Michael Backes 0001, Agostino Cortesi, Riccardo Focardi, Matteo Maffei |
A calculus of challenges and responses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMSE ![In: Proceedings of the 2007 ACM workshop on Formal methods in security engineering, FMSE 2007, Fairfax, VA, USA, November 2, 2007, pp. 51-60, 2007, ACM, 978-1-59593-887-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
static analysis, authentication protocols, process calculi |
25 | Chris Karlof, Umesh Shankar, J. Doug Tygar, David A. Wagner 0001 |
Dynamic pharming attacks and locked same-origin policies for web browsers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, October 28-31, 2007, pp. 58-71, 2007, ACM, 978-1-59593-703-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
same-origin policy, pharming, web authentication |
25 | Rafael Marín López, Pedro J. Fernández, Antonio Fernandez Gómez-Skarmeta |
3-Party Approach for Fast Handover in EAP-Based Wireless Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OTM Conferences (2) ![In: On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE, GADA, and IS, OTM Confederated International Conferences CoopIS, DOA, ODBASE, GADA, and IS 2007, Vilamoura, Portugal, November 25-30, 2007, Proceedings, Part II, pp. 1734-1751, 2007, Springer, 978-3-540-76835-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
security, authentication, key distribution, Fast handover |
25 | He Ge, Stephen R. Tate |
A Direct Anonymous Attestation Scheme for Embedded Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings, pp. 16-30, 2007, Springer, 978-3-540-71676-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Direct Anonymous Attestation, Trusted Computing Platform, Privacy, Authentication, Cryptographic Protocol, Group signature |
25 | Jong Sik Moon, Im-Yeong Lee |
A Study on Ticket-Based AAA Mechanism Including Time Synchronization OTP in Ubiquitous Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (1) ![In: Computational Science and Its Applications - ICCSA 2007, International Conference, Kuala Lumpur, Malaysia, August 26-29, 2007. Proceedings, Part I, pp. 666-677, 2007, Springer, 978-3-540-74468-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
OTP, Authentication, Ubiquitous, AAA, Ticket |
25 | Alexander De Luca, Roman Weiss, Heinrich Hussmann |
PassShape: stroke based shape passwords. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OZCHI ![In: Proceedings of the 2007 Australasian Computer-Human Interaction Conference, OZCHI 2007, Adelaide, Australia, November 28-30, 2007, pp. 239-240, 2007, ACM, 978-1-59593-872-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
PassShape, shape passwords, security, authentication |
25 | Krzysztof Golofit |
Click Passwords Under Investigation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2007, 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24-26, 2007, Proceedings, pp. 343-358, 2007, Springer, 978-3-540-74834-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Click Passwords, PassPoints, Passlogix, graphical authentication, picture passwords, human factor, dictionary attacks, keypad |
25 | Vedat Coskun, Erdal Cayirci, Albert Levi, Serdar Sancak |
Quarantine Region Scheme to Mitigate Spam Attacks in Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Mob. Comput. ![In: IEEE Trans. Mob. Comput. 5(8), pp. 1074-1086, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
quarantine region, spam attacks, wireless sensor networks, authentication, Network-level security and protection |
25 | Youngsook Lee, Junghyun Nam, Dongho Won |
An Inter-domain Key Agreement Protocol Using Weak Passwords. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (3) ![In: Computational Science and Its Applications - ICCSA 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part III, pp. 517-526, 2006, Springer, 3-540-34075-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
authentication, password, Key exchange, public key |
25 | He Ge, Stephen R. Tate |
Traceable Signature: Better Efficiency and Beyond. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (3) ![In: Computational Science and Its Applications - ICCSA 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part III, pp. 327-337, 2006, Springer, 3-540-34075-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Variable Anonymity, Cryptographic Protocol, Group signature, Anonymous Authentication, Traceable Signature |
25 | Sanggon Lee, Yvonne Hitchcock, Youngho Park 0005, Sang-Jae Moon |
Provably Secure Tripartite Password Protected Key Exchange Protocol Based on Elliptic Curves. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 12th International Workshop, SAC 2005, Kingston, ON, Canada, August 11-12, 2005, Revised Selected Papers, pp. 205-220, 2005, Springer, 3-540-33108-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Tripartite key agreement, bilinear Diffie-Hellman problem, Joux’s protocol, provable security, password-based authentication |
25 | Michel Abdalla, Olivier Chevassut, Pierre-Alain Fouque, David Pointcheval |
A Simple Threshold Authenticated Key Exchange from Short Secrets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2005, 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings, pp. 566-584, 2005, Springer, 3-540-30684-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Threshold Protocols, Password-based Authentication |
25 | Ulrike Meyer, Susanne Wetzel |
A man-in-the-middle attack on UMTS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Workshop on Wireless Security ![In: Proceedings of the 2004 ACM Workshop on Wireless Security, Philadelphia, PA, USA, October 1, 2004, pp. 90-97, 2004, ACM, 1-58113-925-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
authentication, UMTS, mobile communication, GSM, man-in-the-middle attack |
25 | Chang N. Zhang, Honglan Zhong |
An Integrated Approach for Database Security and Fault Tolerance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITCC (1) ![In: International Conference on Information Technology: Coding and Computing (ITCC'04), Volume 1, April 5-7, 2004, Las Vegas, Nevada, USA, pp. 762-766, 2004, IEEE Computer Society, 0-7695-2108-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
database encryption, redundant residue number, fault tolerance, authentication, error detection, error correction |
25 | Masafumi Yamada, Kazuhiro Kamiya, Mineichi Kudo, Hidetoshi Nonaka, Jun Toyama |
Soft authentication and behavior analysis using a chair with sensors attached: hipprint authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Pattern Anal. Appl. ![In: Pattern Anal. Appl. 12(3), pp. 251-260, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Soft authentication, Sensor-attached chair, Posture analysis, Behavior analysis |
Displaying result #401 - #500 of 25398 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ >>] |
|