The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for authentication with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1973-1981 (18) 1982-1984 (22) 1985-1986 (22) 1987 (21) 1988 (25) 1989 (33) 1990 (36) 1991 (31) 1992 (40) 1993 (50) 1994 (65) 1995 (55) 1996 (112) 1997 (145) 1998 (98) 1999 (167) 2000 (208) 2001 (294) 2002 (330) 2003 (618) 2004 (905) 2005 (1106) 2006 (1033) 2007 (1140) 2008 (1183) 2009 (1031) 2010 (805) 2011 (788) 2012 (820) 2013 (879) 2014 (955) 2015 (1035) 2016 (1133) 2017 (1173) 2018 (1332) 2019 (1500) 2020 (1379) 2021 (1410) 2022 (1499) 2023 (1523) 2024 (379)
Publication types (Num. hits)
article(10875) book(17) data(3) incollection(161) inproceedings(14078) phdthesis(247) proceedings(17)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 8079 occurrences of 2235 keywords

Results
Found 25398 publication records. Showing 25398 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
27Shuihua Han, Chao-Hsien Chu, Shuangyuan Yang Content-based Image Authentication: Current Status, Issues, and Challenges. Search on Bibsonomy ICSC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF content-based authentication, security, performance trade-off, Image hash
27Junbeom Hur, Chanil Park, Hyunsoo Yoon An Efficient Pre-authentication Scheme for IEEE 802.11-Based Vehicular Networks. Search on Bibsonomy IWSEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF proactive key distribution, pre-authentication, IEEE 802.11 network, vehicular network, fast handoff
27Rafael Marín López, Santiago Zapata Hernandez, Antonio Fernandez Gómez-Skarmeta Secure Protocol for Fast Authentication in EAP-Based Wireless Networks. Search on Bibsonomy ICCSA (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security, authentication, Fast handover, network access control
27Jun-Won Lee, Sang-Won Min, Byung K. Choi An Efficient Authentication Procedure for Fast Handoff in Mobile IPv6 Networks. Search on Bibsonomy ICOIN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF temporary authentication, fast handoff and wireless mobile networks, MIPv6, AAA
27Pedro Felix, Carlos Ribeiro A scalable and flexible web services authentication model. Search on Bibsonomy SWS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF authentication, trust management, web services security
27Christophe Tartary, Huaxiong Wang, Josef Pieprzyk An Hybrid Approach for Efficient Multicast Stream Authentication over Unsecured Channels. Search on Bibsonomy ProvSec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Unsecured Channel, Erasure Code, Stream Authentication, Merkle Hash Tree, Polynomial Reconstruction
27JaeCheol Ha, Sang-Jae Moon, Juan Manuel González Nieto, Colin Boyd Security Analysis and Enhancement of One-Way Hash Based Low-Cost Authentication Protocol (OHLCAP). Search on Bibsonomy PAKDD Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF group-based authentication, traceability, RFID system, indistinguishability
27Abdallah Mhamed, Cecilia Fred, Arab Farah An Authentication Architecture Dedicated to Dependent People in Smart Environments. Search on Bibsonomy ICOST The full citation details ... 2007 DBLP  DOI  BibTeX  RDF dependent people, security, authentication, Pervasive computing, biometrics, user profile, smart home
27Song Y. Yan, Carsten Maple, Glyn James A New Scheme for Deniable/Repudiable Authentication. Search on Bibsonomy CASC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Deniable/repudiable authentication, quadratic residuosity problem, intractability
27Anthony J. Nicholson, Mark D. Corner, Brian D. Noble Mobile Device Security Using Transient Authentication. Search on Bibsonomy IEEE Trans. Mob. Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Transient authentication, security, privacy, mobile computing, human factors, cryptographic controls
27Patrick P. C. Lee, John C. S. Lui, David K. Y. Yau Distributed collaborative key agreement and authentication protocols for dynamic peer groups. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF dynamic peer groups, security, authentication, group key agreement, secure group communication, rekeying
27Alain P. Hiltgen, Thorsten Kramp, Thomas Weigold Secure Internet Banking Authentication. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF short-time passwords, short-lived passwords, taxonomy of attacks, authentication, Internet banking, public-key certificates
27Liyan Zhang, Anshuman Razdan, Gerald E. Farin, John Femiani 0001, MyungSoo Bae, Charles Lockwood 3D face authentication and recognition based on bilateral symmetry analysis. Search on Bibsonomy Vis. Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Symmetry analysis, Face recognition, Face authentication, 3D faces
27Ya-Jeng Lin, Shiuhpyng Shieh, Warren W. Lin Lightweight, pollution-attack resistant multicast authentication scheme. Search on Bibsonomy AsiaCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF signature amortization, authentication, multicast, erasure code, pollution-attack
27Wen-Guey Tzeng A secure system for data access based on anonymous authentication and time-dependent hierarchical keys. Search on Bibsonomy AsiaCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF entity security, hierarchical keys, trapdoor time-sharable sequence, world wide web security, anonymous authentication
27Eun-Jun Yoon, Kee-Young Yoo An Improved Lu-Cao's Remote User Authentication Scheme Using Smart Card. Search on Bibsonomy EuroPKI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Authentication, Network security, Smart card, Password
27Kirk H. M. Wong, Yuan Zheng 0001, Jiannong Cao 0001, Shengwei Wang A Dynamic User Authentication Scheme for Wireless Sensor Networks. Search on Bibsonomy SUTC (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF IEEE 802.15.4 Specification, Security, Sensor Networks, User Authentication
27Qiming Li, Ee-Chien Chang Robust, short and sensitive authentication tags using secure sketch. Search on Bibsonomy MM&Sec The full citation details ... 2006 DBLP  DOI  BibTeX  RDF two-level quantization, authentication, robustness, sensitivity, secure sketch
27Gábor Fehér Enhancing wireless video streaming using lightweight approximate authentication. Search on Bibsonomy Q2SWinet The full citation details ... 2006 DBLP  DOI  BibTeX  RDF approximate authentication, security, QoS, wireless video streaming, error resilient video coding
27Christophe Tartary, Huaxiong Wang Rateless Codes for the Multicast Stream Authentication Problem. Search on Bibsonomy IWSEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF rateless codes, stream authentication, polynomial reconstruction
27Eun-Jun Yoon, Kee-Young Yoo One-Time Password Authentication Scheme Using Smart Cards Providing User Anonymity. Search on Bibsonomy ICCSA (5) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Security, Cryptography, Smart card, User authentication, One-time password, Denial-of-Service attacks
27Song Han 0004, Geoff Skinner, Vidyasagar M. Potdar, Elizabeth Chang 0001 A framework of authentication and authorization for e-health services. Search on Bibsonomy SWS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF privacy, authentication, authorization, e-health, personal data
27Lan Nguyen Efficient Dynamic k-Times Anonymous Authentication. Search on Bibsonomy VIETCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF dynamic k-times anonymous authentication, k-show anonymous credentials, e-tag, privacy, anonymity
27Christophe Tartary, Huaxiong Wang Achieving Multicast Stream Authentication Using MDS Codes. Search on Bibsonomy CANS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF erasure codes, stream authentication, polynomial reconstruction
27Guilin Wang, Feng Bao 0001 Cryptanalysis of Timestamp-Based Password Authentication Schemes Using Smart Cards. Search on Bibsonomy ICICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF smart card, hash function, attack, password authentication
27Yukio Itakura, Shigeo Tsujii Proposal on a multifactor biometric authentication method based on cryptosystem keys containing biometric signatures. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Biological information, Authentication security, Biometrics-cryptographic key, Public-key cryptography, Personal identification
27Michael Backes 0001, Birgit Pfitzmann, Michael Waidner Symmetric authentication in a simulatable Dolev-Yao-style cryptographic library. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Dolev-Yao, Symmetric authentication, Computational soundness
27Michel Abdalla, David Pointcheval Interactive Diffie-Hellman Assumptions with Applications to Password-Based Authentication. Search on Bibsonomy Financial Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Password-based authentication, multi-party protocols, Diffie-Hellman assumptions
27Chang N. Zhang, Chunren Lai, Honglan Zhong An Efficient Authentication Scheme with Fault Tolerance for Database Systems. Search on Bibsonomy ICITA (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF fault tolerance, authentication, digital signature, error detection, error correction
27Woo-Hun Kim, Eun-Jun Yoon, Kee-Young Yoo New Authentication Protocol Providing User Anonymity in Open Network. Search on Bibsonomy WINE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Error-correcting codes, Mobile network, Key exchange, User authentication, User anonymity
27Sheng Tang, Jin-Tao Li 0001, Yong-Dong Zhang 0001 SSF fingerprint for image authentication: an incidental distortion resistant scheme. Search on Bibsonomy ACM Multimedia The full citation details ... 2005 DBLP  DOI  BibTeX  RDF PCA, digital signature, image authentication
27Farid Ahmed, Ira S. Moskowitz Composite signature based watermarking for fingerprint authentication. Search on Bibsonomy MM&Sec The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Phasemark™, composite filter, phase only filter, watermarking, fingerprint, biometric authentication
27Eun-Jun Yoon, Kee-Young Yoo A New Efficient Fingerprint-Based Remote User Authentication Scheme for Multimedia Systems. Search on Bibsonomy KES (3) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Security techniques, Multimedia, Biometrics, Smart card, User authentication, Fingerprint verification
27Michael Szydlo, Burton S. Kaliski Jr. Proofs for Two-Server Password Authentication. Search on Bibsonomy CT-RSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF concrete security reduction, secret sharing, password authentication
27Donggang Liu, Peng Ning Multilevel µTESLA: Broadcast authentication for distributed sensor networks. Search on Bibsonomy ACM Trans. Embed. Comput. Syst. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF sensor networks, Broadcast authentication, TESLA
27Wei-Chi Ku A hash-based strong-password authentication scheme without using smart cards. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF password-file compromise attack, strong password, user authentication, replay attack, denial-of-service attack
27Min-Hui Lin 0001, Chin-Chen Chang 0001 A secure one-time password authentication scheme with low-computation for mobile communications. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF off-line dictionary attack, server spoofing attack, authentication, smart card, replay attack, one-time password
27Chou Chen Yang, Ren-Chiun Wang An improvement of security enhancement for the timestamp-based password authentication scheme using smart cards. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF authentication, smart card, password, forgery attack
27Chin-Chen Chang 0001, Iuon-Chang Lin Remarks on fingerprint-based remote user authentication scheme using smart cards. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF conspiring attack, smart card, user authentication
27Min-Shiang Hwang, Li-Hua Li, Cheng-Chi Lee A key authentication scheme with non-repudiation. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF non-repudiation security, authentication, certificate, discrete logarithm, public key
27Dacheng Zhang, Jie Xu 0007 Multi-Party Authentication for Web Services: Protocols, Implementation and Evaluation. Search on Bibsonomy ISORC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF security, Web services, fault tolerance, Authentication, key exchange, Internet computing
27Mortaza S. Bargh, R. J. Hulsebosch, Henk Eertink, Anand R. Prasad, Hu Wang, Peter Schoo Fast authentication methods for handovers between IEEE 802.11 wireless LANs. Search on Bibsonomy WMASH The full citation details ... 2004 DBLP  DOI  BibTeX  RDF inter/intra-domain, authentication, WLAN, handover, seamless
27Yongsu Park, Yookun Cho The eSAIDA Stream Authentication Scheme. Search on Bibsonomy ICCSA (4) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF stream distribution, authentication, Network security, digital signature
27Yongwha Chung, Daesung Moon, Taehae Kim, Jin-Won Park Workload Dispatch Planning for Real-Time Fingerprint Authentication on a Sensor-Client-Server Model. Search on Bibsonomy PDCAT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Performance Evaluation, Authentication Protocol, Fingerprint Verification
27Wei-Chi Ku, Chien-Ming Chen 0001, Hui-Lung Lee Weaknesses of Lee-Li-Hwang's hash-based password authentication scheme. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF hash function, password authentication, guessing attack, denial-of-service attack, stolen-verifier attack
27Jinshen Wang, Yuewei Dai, Stefan Thiemert, Zhiquan Wang A Feature-Watermarking Scheme for JPEG Image Authentication. Search on Bibsonomy IWDW The full citation details ... 2003 DBLP  DOI  BibTeX  RDF semi-fragile, authentication, watermarking, features
27Taekyoung Kwon 0002, Seongan Lim Automation-Considered Logic of Authentication and Key Distribution. Search on Bibsonomy WISA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF formal methods in security, Authentication protocols
27André Weimerskirch, Dirk Westhoff Identity certified authentication for ad-hoc networks. Search on Bibsonomy SASN The full citation details ... 2003 DBLP  DOI  BibTeX  RDF key-chains, security, ad-hoc networks, authentication, identification
27Cheng-Chi Lee, Min-Shiang Hwang, Wei-Pang Yang A flexible remote user authentication scheme using smart cards. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF security, authentication, cryptography, password
27Arslan Brömme, Marcel Kronberg, Oliver Ellenbeck, Oliver Kasch A conceptual framework for testing biometric algorithms within operating systems' authentication. Search on Bibsonomy SAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF testing biometric algorithms, evaluation, robustness, operating system, biometric authentication
27Howard Barnum, Claude Crépeau, Daniel Gottesman, Adam D. Smith, Alain Tapp Authentication of Quantum Messages. Search on Bibsonomy FOCS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Authentication, quantum information
27Nicolas T. Courtois Efficient Zero-Knowledge Authentication Based on a Linear Algebra Problem MinRank. Search on Bibsonomy ASIACRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF MinRank problem, rank-distance codes, syndrome decoding (SD), identification, NP-complete problems, group signatures, Zero-knowledge, ring signatures, multivariate cryptography, entity authentication
27Woei-Jiunn Tsaur A Flexible User Authentication Scheme for Multi-server Internet Services. Search on Bibsonomy ICN (1) The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Internet, Smart card, Password authentication, Communications security, Lagrange interpolating polynomial
27Stelvio Cimato Design of an Authentication Protocol for Gsm Javacards. Search on Bibsonomy ICISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Javacard, E-commerce and M- commerce security, Authentication protocol
27Yoshiaki Isobe, Yoichi Seto, Masanori Kataoka Development of Personal Authentication System using Fingerprint with Digital Signature Technologies. Search on Bibsonomy HICSS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Biometrics, Smart card, Public Key Infrastructure, Fingerprints verification, Personal authentication
27Tsang Hin Chung, Kwong-Sak Leung, Kin-Hong Lee Design and Analysis of Smart Card Based Remote Authentication Protocol for Internet-Based System. Search on Bibsonomy WETICE The full citation details ... 2001 DBLP  DOI  BibTeX  RDF security, java, Authentication, smart card
27Michael K. Reiter, Stuart G. Stubblebine Authentication Metric Analysis and Design. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 1999 DBLP  DOI  BibTeX  RDF metrics of authentication, public key infrastructure
27Khalid Al-Tawil, Ali Akrami A New Authentication Protocol for Roaming Users in GSM Networks. Search on Bibsonomy ISCC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF signaling traffic, authentication, Mobile communication, GSM, roaming
27Mustafa Atici, Douglas R. Stinson Universal Hashing and Multiple Authentication. Search on Bibsonomy CRYPTO The full citation details ... 1996 DBLP  DOI  BibTeX  RDF universal hashing, Authentication code
27A. H. Wadaa, Hussein M. Abdel-Wahab, John McHugh Heuristic authentication protocol for TCP/IP network applications under UNIX. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 1992 DBLP  DOI  BibTeX  RDF UNIX Network Programming, Security, Distributed Systems, Authentication, Encryption, Client/Server Model, TCP/IP Protocols
27Kalid Elmufti, Dasun Weerasinghe, Muttukrishnan Rajarajan, Veselin Rakocevic, Sanowar Khan, John A. MacDonald Mobile Web services authentication using SAML and 3GPP generic bootstrapping architecture. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF 3GPP generic bootstrapping architecture, Mobile Authentication Protocol, Authentication, SAML, Mobile Web Services, GAA
27Lawrence C. Paulson Mechanized proofs for a recursive authentication protocol. Search on Bibsonomy CSFW The full citation details ... 1997 DBLP  DOI  BibTeX  RDF mechanized proofs, recursive authentication protocol, inductive approach, message nesting, basic security theorem, adjacent pairs, honest agents, protocol complexity, agents, protocols, specification, symmetry, mutual authentication, Isabelle/HOL, session keys
27Suan-Suan Chew, Kok-Leong Ng, Chye-Lin Chee IAuth: An authentication system for Internet applications. Search on Bibsonomy COMPSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF IAuth, authentication system, digital signing, Web application server, distributed computing, Internet applications, message authentication, client server, Web-based application, data encryption, security breach, cryptographic keys
27S. Cheung An Efficient Message Authentication Scheme for Link State Routing. Search on Bibsonomy ACSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF message authentication scheme, routing cost reduction, routing updates, border routers, public-key based schemes, computationally expensive, detection-diagnosis-recovery approach, multiple-valued cost metrics, routing protocols, message authentication, link state routing, large networks
27Leonid M. Tombak, Reihaneh Safavi-Naini Authentication Codes That Are r-Fold Secure Against Spoofing. Search on Bibsonomy CCS The full citation details ... 1994 DBLP  DOI  BibTeX  RDF r-fold security, authentication, cryptography, computer security, authentication codes
25Hector Ouilhet Google Sky Map: using your phone as an interface. Search on Bibsonomy Mobile HCI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
25Shangping Zhong, Xiangwen Liao, Xue Zhang, Jingqu Lin A Novel Distributed Single Sign-On Scheme with Dynamically Changed Threshold Value. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
25Zhishou Zhang, Qibin Sun, Wai-Choong Wong, John G. Apostolopoulos, Susie J. Wee Rate-Distortion Optimized Streaming of Authenticated Video. Search on Bibsonomy ICIP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
25Helmut Scherzer, Ran Canetti, Paul A. Karger, Hugo Krawczyk, Tal Rabin, David C. Toll Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card. Search on Bibsonomy ESORICS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
25Benny Pinkas, Tomas Sander Securing passwords against dictionary attacks. Search on Bibsonomy CCS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
25Shai Halevi, Hugo Krawczyk Public-Key Cryptography and Password Protocols. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 1999 DBLP  DOI  BibTeX  RDF hand-held certificates, public passwords, public-key protocols, passwords, key exchange, dictionary attacks
25Jochen Liedtke A Short Note on Implementing Thread Exclusiveness and Address Space Locking. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
25Dan M. Nessett A Critique of the Burrows, Abadi and Needham Logic. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
25Guoqiang Li 0001, Mizuhito Ogawa Authentication Revisited: Flaw or Not, the Recursive Authentication Protocol. Search on Bibsonomy ATVA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
25Sun-Hwa Lim, Sang-Ho Lee Efficient IMS Authentication Architecture based on Initial Access Authentication in WiBro-Evolution (WiBro-EVO) System. Search on Bibsonomy VTC Spring The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
25Seongseob Hwang, Hyoungjoo Lee, Sungzoon Cho Improving Authentication Accuracy of Unfamiliar Passwords with Pauses and Cues for Keystroke Dynamics-Based Authentication. Search on Bibsonomy WISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
25Jeonil Kang, DaeHun Nyang, KyungHee Lee Two Factor Face Authentication Scheme with Cancelable Feature. Search on Bibsonomy IWBRS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
25Shaoning Pang, Seiichi Ozawa, Nikola K. Kasabov One-Pass Incremental Membership Authentication by Face Classification. Search on Bibsonomy ICBA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
25David Zhang 0001, Guangming Lu, Adams Wai-Kin Kong, Michael Wong Palmprint Authentication Technologies, Systems and Applications. Search on Bibsonomy SINOBIOMETRICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
25Sébastien Marcel, Yann Rodriguez Biometric Face Authentication Using Pixel-Based Weak Classifiers. Search on Bibsonomy ECCV Workshop BioAW The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
25Marios Savvides, B. V. K. Vijaya Kumar Quad Phase Minimum Average Correlation Energy Filters for Reduced Memory Illumination Tolerant Face Authentication. Search on Bibsonomy AVBPA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
25Huaqun Guo, Fan Yu, Wai-Choong Wong, Vivy Suhendra, Yongdong Wu Secure wireless communication platform for EV-to-Grid research. Search on Bibsonomy IWCMC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF secure wireless communication, authentication protocol, power grid, electric vehicle
25R. Aparna, B. B. Amberker Authenticated Secure Group Communication using Broadcast Encryption Key Computation. Search on Bibsonomy ITNG The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Authentication, Threshold, Broadcast encryption, Secure Group Communication, Secret key
25Takeshi Nishimura, Hiroyuki Sato LESSO: Legacy Enabling SSO. Search on Bibsonomy SAINT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF authentication, web application, PKI, SSO
25Manhee Lee, Eun Jung Kim 0001 A Comprehensive Framework for Enhancing Security in InfiniBand Architecture. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Cluster Security, InfiniBand Architecture, Galois/Counter Mode, Availability DoS, Authentication, Encryption
25Michael Backes 0001, Agostino Cortesi, Riccardo Focardi, Matteo Maffei A calculus of challenges and responses. Search on Bibsonomy FMSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF static analysis, authentication protocols, process calculi
25Chris Karlof, Umesh Shankar, J. Doug Tygar, David A. Wagner 0001 Dynamic pharming attacks and locked same-origin policies for web browsers. Search on Bibsonomy CCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF same-origin policy, pharming, web authentication
25Rafael Marín López, Pedro J. Fernández, Antonio Fernandez Gómez-Skarmeta 3-Party Approach for Fast Handover in EAP-Based Wireless Networks. Search on Bibsonomy OTM Conferences (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security, authentication, key distribution, Fast handover
25He Ge, Stephen R. Tate A Direct Anonymous Attestation Scheme for Embedded Devices. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Direct Anonymous Attestation, Trusted Computing Platform, Privacy, Authentication, Cryptographic Protocol, Group signature
25Jong Sik Moon, Im-Yeong Lee A Study on Ticket-Based AAA Mechanism Including Time Synchronization OTP in Ubiquitous Environment. Search on Bibsonomy ICCSA (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF OTP, Authentication, Ubiquitous, AAA, Ticket
25Alexander De Luca, Roman Weiss, Heinrich Hussmann PassShape: stroke based shape passwords. Search on Bibsonomy OZCHI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF PassShape, shape passwords, security, authentication
25Krzysztof Golofit Click Passwords Under Investigation. Search on Bibsonomy ESORICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Click Passwords, PassPoints, Passlogix, graphical authentication, picture passwords, human factor, dictionary attacks, keypad
25Vedat Coskun, Erdal Cayirci, Albert Levi, Serdar Sancak Quarantine Region Scheme to Mitigate Spam Attacks in Wireless Sensor Networks. Search on Bibsonomy IEEE Trans. Mob. Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF quarantine region, spam attacks, wireless sensor networks, authentication, Network-level security and protection
25Youngsook Lee, Junghyun Nam, Dongho Won An Inter-domain Key Agreement Protocol Using Weak Passwords. Search on Bibsonomy ICCSA (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF authentication, password, Key exchange, public key
25He Ge, Stephen R. Tate Traceable Signature: Better Efficiency and Beyond. Search on Bibsonomy ICCSA (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Variable Anonymity, Cryptographic Protocol, Group signature, Anonymous Authentication, Traceable Signature
25Sanggon Lee, Yvonne Hitchcock, Youngho Park 0005, Sang-Jae Moon Provably Secure Tripartite Password Protected Key Exchange Protocol Based on Elliptic Curves. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Tripartite key agreement, bilinear Diffie-Hellman problem, Joux’s protocol, provable security, password-based authentication
25Michel Abdalla, Olivier Chevassut, Pierre-Alain Fouque, David Pointcheval A Simple Threshold Authenticated Key Exchange from Short Secrets. Search on Bibsonomy ASIACRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Threshold Protocols, Password-based Authentication
25Ulrike Meyer, Susanne Wetzel A man-in-the-middle attack on UMTS. Search on Bibsonomy Workshop on Wireless Security The full citation details ... 2004 DBLP  DOI  BibTeX  RDF authentication, UMTS, mobile communication, GSM, man-in-the-middle attack
25Chang N. Zhang, Honglan Zhong An Integrated Approach for Database Security and Fault Tolerance. Search on Bibsonomy ITCC (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF database encryption, redundant residue number, fault tolerance, authentication, error detection, error correction
25Masafumi Yamada, Kazuhiro Kamiya, Mineichi Kudo, Hidetoshi Nonaka, Jun Toyama Soft authentication and behavior analysis using a chair with sensors attached: hipprint authentication. Search on Bibsonomy Pattern Anal. Appl. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Soft authentication, Sensor-attached chair, Posture analysis, Behavior analysis
Displaying result #401 - #500 of 25398 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license