|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 8079 occurrences of 2235 keywords
|
|
|
Results
Found 25398 publication records. Showing 25398 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
25 | Wendy Moncur, Grégory Leplâtre |
Pictures at the ATM: exploring the usability of multiple graphical passwords. |
CHI |
2007 |
DBLP DOI BibTeX RDF |
authentication mechanisms, ATMs, usable security, user authentication, graphical passwords |
25 | Mauricio Orozco Trujillo, Yednek Asfaw, Shervin Shirmohammadi, Andy Adler, Abdulmotaleb El-Saddik |
Haptic-Based Biometrics: A Feasibility Study. |
HAPTICS |
2006 |
DBLP DOI BibTeX RDF |
Haptic Authentication, Continuous Authentication, Biometrics |
25 | Mourad Debbabi, Mohamed Mejri, Nadia Tawbi, I. Yahmadi |
From Protocol Specifications to Flaws and Attack Scenarios: An Automatic and Formal Algorithm. |
WETICE |
1997 |
DBLP DOI BibTeX RDF |
authentication protocol specifications, flaws, automatic formal algorithm, protocol roles, intruder communication abilities, intruder computational abilities, protocol instrumentations, formal verification, encryption, message authentication, decryption, attack scenarios, deductive system |
25 | Chooi-Tian Lee, Jack W. Harris |
Designing a Virtual Access Control Configuration Protocol for Implementation over ISDN and Shared-Media Networks. |
LCN |
1996 |
DBLP DOI BibTeX RDF |
virtual access control configuration protocol, shared-media networks, corporate environment, trade-secret information protection, secure network, secure communication environment, encryption mechanisms, user password authentication, user-interface based access control, network interface based access control, authentication security mechanisms, virtual dedicated-media network system, dynamic security access authorization, token-based access security control, dedicated-media communication, network session-layer protocol, operating systems, WAN, LAN, application programs, ISDN, ISDN, security program |
23 | Jie Liu, F. Richard Yu, Chung-Horng Lung, Helen Tang |
Optimal combined intrusion detection and biometric-based continuous authentication in high security mobile ad hoc networks. |
IEEE Trans. Wirel. Commun. |
2009 |
DBLP DOI BibTeX RDF |
|
23 | Tian-Fu Lee, Tzonelih Hwang, Shu-Hui Chang, Song-Kong Chong |
Enhanced delegation-based authentication protocol for PCSs. |
IEEE Trans. Wirel. Commun. |
2009 |
DBLP DOI BibTeX RDF |
|
23 | Marc Bächlin, Johannes Schumm, Daniel Roggen, Gerhard Tröster |
Quantifying Gait Similarity: User Authentication and Real-World Challenge. |
ICB |
2009 |
DBLP DOI BibTeX RDF |
|
23 | Manabu Inuma, Akira Otsuka, Hideki Imai |
Theoretical Framework for Constructing Matching Algorithms in Biometric Authentication Systems. |
ICB |
2009 |
DBLP DOI BibTeX RDF |
|
23 | Jianquan Xie, Qing Xie, Chunhua Yang 0001 |
An Accurate Image Juggling Authentication Algorithm. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
23 | Nathan L. Clarke, Sevasti Karatzouni, Steven Furnell |
Flexible and Transparent User Authentication for Mobile Devices. |
SEC |
2009 |
DBLP DOI BibTeX RDF |
|
23 | Stavros Papadopoulos 0001, Dimitris Papadias, Weiwei Cheng, Kian-Lee Tan |
Separating Authentication from Query Execution in Outsourced Databases. |
ICDE |
2009 |
DBLP DOI BibTeX RDF |
|
23 | Charlott Eliasson, Markus Fiedler, Ivar Jørstad |
A Criteria-Based Evaluation Framework for Authentication Schemes in IMS. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
23 | Eun-Jun Yoon, Kee-Young Yoo |
Robust ID-Based Remote Mutual Authentication with Key Agreement Scheme for Mobile Devices on ECC. |
CSE (2) |
2009 |
DBLP DOI BibTeX RDF |
|
23 | Li Wang 0039, Mei Song, Ping Wang, Jie Li, Junde Song |
Performance modeling on dynamic authentication data management in heterogeneous interworking networks. |
CCECE |
2009 |
DBLP DOI BibTeX RDF |
|
23 | Naveed Ahmed 0005, Christian Damsgaard Jensen |
A Mechanism for Identity Delegation at Authentication Level. |
NordSec |
2009 |
DBLP DOI BibTeX RDF |
Identity Delegation, Usability of Security, Nomadic User, Practical Security |
23 | Shouhong Wang, Hai Wang 0008 |
Password Authentication Using Hopfield Neural Networks. |
IEEE Trans. Syst. Man Cybern. Part C |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Sufyan Ababneh, Ashfaq A. Khokhar, Rashid Ansari |
A multimedia-content authentication and recovery protocol in peer-to-peer networks. |
EIT |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Jie Liu, F. Richard Yu, Chung-Horng Lung, Helen Tang |
A Framework of Combining Intrusion Detection and Continuous Authentication in Mobile Ad Hoc Networks. |
ICC |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Liang Xiao 0003, Larry J. Greenstein, Narayan B. Mandayam, Wade Trappe |
A Physical-Layer Technique to Enhance Authentication for Mobile Terminals. |
ICC |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Yingfang Fu, Jingsha He, Rong Wang, Guorui Li |
Mutual Authentication in Wireless Mesh Networks. |
ICC |
2008 |
DBLP DOI BibTeX RDF |
|
23 | David P. Varodayan, Yao-Chung Lin, Bernd Girod |
Audio authentication based on distributed source coding. |
ICASSP |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Jiansheng Chen, Yiu Sang Moon |
Using SIFT features in palmprint authentication. |
ICPR |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Helen Tang, Mazda Salmanian |
Lightweight Integrated Authentication for Tactical MANETs. |
ICYCS |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Wei Wang 0015, Dongming Peng, Honggang Wang 0001, Hamid Sharif, Hsiao-Hwa Chen |
Energy-Distortion-Authentication Optimized Resource Allocation for Secure Wireless Image Streaming. |
WCNC |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Yu-Tso Chen, Ahren Studer, Adrian Perrig |
Combining TLS and TPMs to Achieve Device and User Authentication for Wi-Fi and WiMAX Citywide Networks. |
WCNC |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Wensheng Zhang 0001, Nalin Subramanian, Guiling Wang 0001 |
Lightweight and Compromise-Resilient Message Authentication in Sensor Networks. |
INFOCOM |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Jenq-Shiou Leu |
Empirical Analysis of Authentication Process in a Cooperative B3G Network. |
ICCCN |
2008 |
DBLP DOI BibTeX RDF |
|
23 | M. Vipin, A. V. Sarad, Sankar Kuppan |
A Multi Way Tree for Token Based Authentication. |
CSSE (3) |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Alireza Sadighian, Rasool Jalili |
FLMAP: A fast lightweight mutual authentication protocol for RFID systems. |
ICON |
2008 |
DBLP DOI BibTeX RDF |
|
23 | David A. Knox, Thomas Kunz |
Secure Authentication in Wireless Sensor Networks Using RF Fingerprints. |
EUC (1) |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Ashutosh Saxena |
Dynamic authentication: Need than a choice. |
COMSWARE |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Rajeswari Mukesh, A. Damodaram, V. Subbiah Bharathi |
A robust finger print based two-server authentication and key exchange system. |
COMSWARE |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Wen-Gong Shieh, Wen-Bing Horng |
Efficient and complete remote authentication scheme with smart cards. |
ISI |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Muhammad Sharif 0001, Tariq Faiz, Mudassar Raza |
Time signatures - an implementation of Keystroke and click patterns for practical and secure authentication. |
ICDIM |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Xiaole Bai, Wenjun Gu, Sriram Chellappan, Xun Wang, Dong Xuan, Bin Ma 0002 |
PAS: Predicate-Based Authentication Services Against Powerful Passive Adversaries. |
ACSAC |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Lakshmi Santhanam, Bin Xie 0001, Dharma P. Agrawal |
Secure and efficient authentication in Wireless Mesh Networks using merkle trees. |
LCN |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Lin-Yi Wu, Yi-Bing Lin |
Authentication Vector Management for UMTS. |
IEEE Trans. Wirel. Commun. |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Kui Ren 0001, Wenjing Lou, Kai Zeng 0001, Patrick J. Moran |
On Broadcast Authentication in Wireless Sensor Networks. |
IEEE Trans. Wirel. Commun. |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Zhi Li 0001, Qibin Sun, Yong Lian 0001, Chang Wen Chen |
Joint Source-Channel-Authentication Resource Allocation and Unequal Authenticity Protection for Multimedia Over Wireless Networks. |
IEEE Trans. Multim. |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Tobias Scheidat, Claus Vielhauer, Jana Dittmann |
Single-Semantic Multi-Instance Fusion of Handwriting Based Biometric Authentication Systems. |
ICIP (2) |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Yao-Chung Lin, David P. Varodayan, Bernd Girod |
Image Authentication Based on Distributed Source Coding. |
ICIP (3) |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Sufyan Ababneh, Ashfaq A. Khokhar, Rashid Ansari |
Compensated Signature Embedding Based Multimedia Content Authentication System. |
ICIP (1) |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Zhishou Zhang, John G. Apostolopoulos, Qibin Sun, Susie J. Wee, Wai-Choong Wong |
Stream Authentication Based on Generlized Butterfly Graph. |
ICIP (6) |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Adrian Leung, Chris J. Mitchell |
Ninja: Non Identity Based, Privacy Preserving Authentication for Ubiquitous Environments. |
UbiComp |
2007 |
DBLP DOI BibTeX RDF |
Security, Privacy, Trusted Computing, Ubiquitous |
23 | Yan Zhu 0010, Chang-Tsun Li, Hong-Jia Zhao |
Structural Digital Signature and Semi-Fragile Fingerprinting for Image Authentication in Wavelet Domain. |
IAS |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Aleksandra Nenadic, Ning Zhang 0001, Li Yao, Terry Morrow |
Levels of Authentication Assurance: an Investigation. |
IAS |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Taekyoung Kwon 0002, Hyeonjoon Moon |
Knowledge-Based User Authentication Associated with Biometrics. |
HCI (5) |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Leila Ismail |
Evaluation of Authentication Mechanisms for Mobile Agents on top of Java. |
ACIS-ICIS |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Somchart Fugkeaw, Piyawit Manpanpanich, Sekpon Juntapremjitt |
Exploiting X.509 Certificate and Multi-agent System Architecture for Role-Based Access Control and Authentication Management. |
CIT |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Patrick Schaller, Srdjan Capkun, David A. Basin |
BAP: Broadcast Authentication Using Cryptographic Puzzles. |
ACNS |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Song Han 0004, Tharam S. Dillon, Elizabeth Chang 0001 |
Anonymous Mutual Authentication Protocol for RFID Tag Without Back-End Database. |
MSN |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Hefu Liu |
Fulfillment of HTTP Authentication Based on Alcatel OmniSwitch 9700. |
I3E (2) |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Hisashi Naito, Shoji Kajita, Yasushi Hirano, Kenji Mase |
Multiple-Tiered Security Hierarchy for Web Applications Using Central Authentication and Authorization Service. |
SAINT Workshops |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Jongpil Jeong, Min Young Chung, Hyunseung Choo |
Integrated OTP-Based User Authentication and Access Control Scheme in Home Networks. |
APNOMS |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Rolf Oppliger, Ralf Hauser, David A. Basin, Aldo Rodenhaeuser, Bruno Kaiser |
A Proof of Concept Implementation of SSL/TLS Session-Aware User Authentication (TLS-SA). |
KiVS |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Kenneth Revett, Sérgio Tenreiro de Magalhães, Henrique M. Dinis Santos |
On the Use of Rough Sets for User Authentication Via Keystroke Dynamics. |
EPIA Workshops |
2007 |
DBLP DOI BibTeX RDF |
behavioral biometrics, rough sets, reducts, multiple sequence alignment, keystroke dynamics |
23 | Philippe Golle, David A. Wagner 0001 |
Cryptanalysis of a Cognitive Authentication Scheme (Extended Abstract). |
S&P |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Qijun Gu, Jawad Drissi |
Dominating Set based Overhead Reduction for Broadcast Authentication in Large Sensor Networks. |
ICNS |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Xiangqian Wu 0002, Kuanquan Wang, David Zhang 0001, Ning Qi |
Combining Left and Right Irises for Personal Authentication. |
EMMCVPR |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Yueh-Min Huang, Hua-Yi Lin, Tzone-I Wang |
Inter-Cluster Routing Authentication for Ad Hoc Networks by a Hierarchical Key Scheme. |
J. Comput. Sci. Technol. |
2006 |
DBLP DOI BibTeX RDF |
CBSRP, inter-cluster, cluster-based, CA (Certificate Authority), ad hoc network, PKI, ID-based |
23 | Yongdong Wu, Robert H. Deng |
Scalable authentication of MPEG-4 streams. |
IEEE Trans. Multim. |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Renwei Ge, Gonzalo R. Arce, Giovanni Di Crescenzo |
Approximate Message Authentication Codes for N-ary Alphabets. |
IEEE Trans. Inf. Forensics Secur. |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Mehmet Utku Celik, Gaurav Sharma 0001, A. Murat Tekalp |
Lossless watermarking for image authentication: a new framework and an implementation. |
IEEE Trans. Image Process. |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Maria Teresa Carta, Daniele D. Giusto, Cristian Perra, Barbara Podda |
Exploiting JPEG2000 and Jpip for Image Based Authentication. |
ICIP |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Sinjini Mitra, Marios Savvides, Anthony Brockwell |
The Role of Statistical Models in Biometric Authentication. |
ICB |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Reouven Elbaz, Lionel Torres, Gilles Sassatelli, Pierre Guillemin, Michel Bardouillet, Albert Martinez |
A Comparison of Two Approaches Providing Data Encryption and Authentication on a Processor Memory Bus. |
PATMOS |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Pietro Michiardi, Refik Molva |
Identity Based Message Authentication for Dynamic Networks. |
SEC |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Kui Ren 0001, Kai Zeng 0001, Wenjing Lou, Patrick J. Moran |
On Broadcast Authentication in Wireless Sensor Networks. |
WASA |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Najwa Aaraj, Srivaths Ravi 0001, Anand Raghunathan, Niraj K. Jha |
Architectures for efficient face authentication in embedded systems. |
DATE Designers' Forum |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Asad M. Ali |
Zero Footprint Secure Internet Authentication Using Network Smart Card. |
CARDIS |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Arjan Durresi, Lyn Evans, Vamsi Paruchuri, Leonard Barolli |
Secure 3G User Authentication in Adhoc Serving Networks. |
ARES |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Jinwei Wang, Shiguo Lian, Zhen Ren, Yuewei Dai, Zhiquan Wang |
Semi-Fragile Watermarking Authentication with Local and Global Watermarks. |
AIAI |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Youtao Zhang, Jun Yang 0002, Hai Trong Vu |
The interleaved authentication for filtering false reports in multipath routing based sensor networks. |
IPDPS |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Yoann Hinard, Hatem Bettahar, Yacine Challal, Abdelmadjid Bouabdallah |
Layered Multicast Data Origin Authentication and Non-repudiation over Lossy Networks. |
ISCC |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Daniele Quercia, Stephen Hailes, Licia Capra |
TATA: Towards Anonymous Trusted Authentication. |
iTrust |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Binod Vaidya, SangDuck Lee, Jae-Kyun Han, Seung Jo Han |
Authentication Mechanism Using One-Time Password for 802.11 Wireless LAN. |
CSR |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Michiru Tanaka, Yoshimi Teshigawara |
A Method and Its Usability for User Authentication by Utilizing a Matrix Code Reader on Mobile Phones. |
WISA |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Ke-Zhao Chen, Yao-Jen Chang, Chia-Wen Lin |
Video-based face authentication using appearance models and HMMs. |
ISCAS |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Seung-Yeon Lee, Eui-nam Huh, Yang-Woo Kim, Kyesan Lee |
An Efficient Authentication Mechanism for Fast Mobility Service in MIPv6. |
ICCSA (2) |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Jongpil Jeong, Min Young Chung, Hyunseung Choo |
Secure User Authentication Mechanism in Digital Home Network Environments. |
EUC |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Jin-Bum Hwang, Hyungkyu Lee, Jong Wook Han |
Efficient and User Friendly Inter-domain Device Authentication/Access Control for Home Networks. |
EUC |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Jingshu Chen, Hong Wu, Qingyang Wang 0001, Qingguan Wang, Xuebin Chi |
A Reflective Framework for Authentication in Grid Computing Environments. |
GCC |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Hiroshi Dozono, Masanori Nakakuni, Hiroaki Sanada, Yoshio Noguchi |
The Analysis of Pen Inputs of Handwritten Symbols using Self Organizing Maps and its Application to User Authentication. |
IJCNN |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Rongxing Lu, Zhenfu Cao, Xiaolei Dong, Renwang Su |
Group Oriented Deniable Authentication Protocol. |
IMSCCS (2) |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Sergio Roberto de Lima e Silva Filho, Mauro Roisenberg |
Continuous Authentication by Keystroke Dynamics Using Committee Machines. |
ISI |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Khanh V. Nguyen |
Simplifying Peer-to-Peer Device Authentication Using Identity-Based Cryptography. |
ICNS |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Jun Liu 0009, Xiaoyan Hong, Qunwei Zheng, Lei Tang |
Privacy-Preserving Quick Authentication in Fast Roaming Networks. |
LCN |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Audun Wangensteen, Lars Lunde, Ivar Jørstad, Than van Do |
Secured enterprise access with strong SIM authentication. |
EDOC |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Michele Bugliesi, Riccardo Focardi, Matteo Maffei |
Analysis of Typed Analyses of Authentication Protocols. |
CSFW |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Ya-Fen Chang, Chin-Chen Chang 0001 |
An Improvement on Strong-Password Authentication Protocols. |
ICESS |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Fabio Dianda, Filippo Giuntini, Fabio Martinelli, Anna Vaccarelli |
A Flexible Framework for Access Control Based on Ability Authentication. |
SAINT Workshops |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Su-Mi Lee, Young Ju Hwang, Dong Hoon Lee 0001, Jong In Lim 0001 |
Efficient Authentication for Low-Cost RFID Systems. |
ICCSA (1) |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Joaquín Torres Márquez, Antonio Izquierdo, Arturo Ribagorda, Almudena Alcaide |
Secure Electronic Payments in Heterogeneous Networking: New Authentication Protocols Approach. |
ICCSA (3) |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Miyoung Kim, Misun Kim, Youngsong Mun |
An Effective Authentication Scheme for Mobile Node with Fast Roaming Property. |
ICCSA (1) |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Bogdan Groza, Dorina Petrica |
Cryptanalysis of an Authentication Protocol. |
SYNASC |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Dimitris Glynos, Panayiotis Kotzanikolaou, Christos Douligeris |
Preventing Impersonation Attacks in MANET with Multi-Factor Authentication. |
WiOpt |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Roberto Di Pietro, Gianluigi Me, Maurizio Adriano Strangio |
A Two-Factor Mobile Authentication Scheme for Secure Financial Transactions. |
ICMB |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Maria Teresa Carta, Barbara Podda, Cristian Perra |
User Authentication Based on JPEG2000 Images. |
VLBV |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Mohamed Ali Kâafar, Lamia Ben Azzouz, Farouk Kamoun, Davor Males |
A Kerberos-Based Authentication Architecture for Wireless LANs. |
NETWORKING |
2004 |
DBLP DOI BibTeX RDF |
|
23 | Willy Susilo, Yi Mu 0001 |
Deniable Ring Authentication Revisited. |
ACNS |
2004 |
DBLP DOI BibTeX RDF |
|
Displaying result #501 - #600 of 25398 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ 15][ >>] |
|