The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for authentication with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1973-1981 (18) 1982-1984 (22) 1985-1986 (22) 1987 (21) 1988 (25) 1989 (33) 1990 (36) 1991 (31) 1992 (40) 1993 (50) 1994 (65) 1995 (55) 1996 (112) 1997 (145) 1998 (98) 1999 (167) 2000 (208) 2001 (294) 2002 (330) 2003 (618) 2004 (905) 2005 (1106) 2006 (1033) 2007 (1140) 2008 (1183) 2009 (1031) 2010 (805) 2011 (788) 2012 (820) 2013 (879) 2014 (955) 2015 (1035) 2016 (1133) 2017 (1173) 2018 (1332) 2019 (1500) 2020 (1379) 2021 (1410) 2022 (1499) 2023 (1523) 2024 (379)
Publication types (Num. hits)
article(10875) book(17) data(3) incollection(161) inproceedings(14078) phdthesis(247) proceedings(17)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 8079 occurrences of 2235 keywords

Results
Found 25398 publication records. Showing 25398 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
25Wendy Moncur, Grégory Leplâtre Pictures at the ATM: exploring the usability of multiple graphical passwords. Search on Bibsonomy CHI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF authentication mechanisms, ATMs, usable security, user authentication, graphical passwords
25Mauricio Orozco Trujillo, Yednek Asfaw, Shervin Shirmohammadi, Andy Adler, Abdulmotaleb El-Saddik Haptic-Based Biometrics: A Feasibility Study. Search on Bibsonomy HAPTICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Haptic Authentication, Continuous Authentication, Biometrics
25Mourad Debbabi, Mohamed Mejri, Nadia Tawbi, I. Yahmadi From Protocol Specifications to Flaws and Attack Scenarios: An Automatic and Formal Algorithm. Search on Bibsonomy WETICE The full citation details ... 1997 DBLP  DOI  BibTeX  RDF authentication protocol specifications, flaws, automatic formal algorithm, protocol roles, intruder communication abilities, intruder computational abilities, protocol instrumentations, formal verification, encryption, message authentication, decryption, attack scenarios, deductive system
25Chooi-Tian Lee, Jack W. Harris Designing a Virtual Access Control Configuration Protocol for Implementation over ISDN and Shared-Media Networks. Search on Bibsonomy LCN The full citation details ... 1996 DBLP  DOI  BibTeX  RDF virtual access control configuration protocol, shared-media networks, corporate environment, trade-secret information protection, secure network, secure communication environment, encryption mechanisms, user password authentication, user-interface based access control, network interface based access control, authentication security mechanisms, virtual dedicated-media network system, dynamic security access authorization, token-based access security control, dedicated-media communication, network session-layer protocol, operating systems, WAN, LAN, application programs, ISDN, ISDN, security program
23Jie Liu, F. Richard Yu, Chung-Horng Lung, Helen Tang Optimal combined intrusion detection and biometric-based continuous authentication in high security mobile ad hoc networks. Search on Bibsonomy IEEE Trans. Wirel. Commun. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
23Tian-Fu Lee, Tzonelih Hwang, Shu-Hui Chang, Song-Kong Chong Enhanced delegation-based authentication protocol for PCSs. Search on Bibsonomy IEEE Trans. Wirel. Commun. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
23Marc Bächlin, Johannes Schumm, Daniel Roggen, Gerhard Tröster Quantifying Gait Similarity: User Authentication and Real-World Challenge. Search on Bibsonomy ICB The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
23Manabu Inuma, Akira Otsuka, Hideki Imai Theoretical Framework for Constructing Matching Algorithms in Biometric Authentication Systems. Search on Bibsonomy ICB The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
23Jianquan Xie, Qing Xie, Chunhua Yang 0001 An Accurate Image Juggling Authentication Algorithm. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
23Nathan L. Clarke, Sevasti Karatzouni, Steven Furnell Flexible and Transparent User Authentication for Mobile Devices. Search on Bibsonomy SEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
23Stavros Papadopoulos 0001, Dimitris Papadias, Weiwei Cheng, Kian-Lee Tan Separating Authentication from Query Execution in Outsourced Databases. Search on Bibsonomy ICDE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
23Charlott Eliasson, Markus Fiedler, Ivar Jørstad A Criteria-Based Evaluation Framework for Authentication Schemes in IMS. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
23Eun-Jun Yoon, Kee-Young Yoo Robust ID-Based Remote Mutual Authentication with Key Agreement Scheme for Mobile Devices on ECC. Search on Bibsonomy CSE (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
23Li Wang 0039, Mei Song, Ping Wang, Jie Li, Junde Song Performance modeling on dynamic authentication data management in heterogeneous interworking networks. Search on Bibsonomy CCECE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
23Naveed Ahmed 0005, Christian Damsgaard Jensen A Mechanism for Identity Delegation at Authentication Level. Search on Bibsonomy NordSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Identity Delegation, Usability of Security, Nomadic User, Practical Security
23Shouhong Wang, Hai Wang 0008 Password Authentication Using Hopfield Neural Networks. Search on Bibsonomy IEEE Trans. Syst. Man Cybern. Part C The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
23Sufyan Ababneh, Ashfaq A. Khokhar, Rashid Ansari A multimedia-content authentication and recovery protocol in peer-to-peer networks. Search on Bibsonomy EIT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
23Jie Liu, F. Richard Yu, Chung-Horng Lung, Helen Tang A Framework of Combining Intrusion Detection and Continuous Authentication in Mobile Ad Hoc Networks. Search on Bibsonomy ICC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
23Liang Xiao 0003, Larry J. Greenstein, Narayan B. Mandayam, Wade Trappe A Physical-Layer Technique to Enhance Authentication for Mobile Terminals. Search on Bibsonomy ICC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
23Yingfang Fu, Jingsha He, Rong Wang, Guorui Li Mutual Authentication in Wireless Mesh Networks. Search on Bibsonomy ICC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
23David P. Varodayan, Yao-Chung Lin, Bernd Girod Audio authentication based on distributed source coding. Search on Bibsonomy ICASSP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
23Jiansheng Chen, Yiu Sang Moon Using SIFT features in palmprint authentication. Search on Bibsonomy ICPR The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
23Helen Tang, Mazda Salmanian Lightweight Integrated Authentication for Tactical MANETs. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
23Wei Wang 0015, Dongming Peng, Honggang Wang 0001, Hamid Sharif, Hsiao-Hwa Chen Energy-Distortion-Authentication Optimized Resource Allocation for Secure Wireless Image Streaming. Search on Bibsonomy WCNC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
23Yu-Tso Chen, Ahren Studer, Adrian Perrig Combining TLS and TPMs to Achieve Device and User Authentication for Wi-Fi and WiMAX Citywide Networks. Search on Bibsonomy WCNC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
23Wensheng Zhang 0001, Nalin Subramanian, Guiling Wang 0001 Lightweight and Compromise-Resilient Message Authentication in Sensor Networks. Search on Bibsonomy INFOCOM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
23Jenq-Shiou Leu Empirical Analysis of Authentication Process in a Cooperative B3G Network. Search on Bibsonomy ICCCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
23M. Vipin, A. V. Sarad, Sankar Kuppan A Multi Way Tree for Token Based Authentication. Search on Bibsonomy CSSE (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
23Alireza Sadighian, Rasool Jalili FLMAP: A fast lightweight mutual authentication protocol for RFID systems. Search on Bibsonomy ICON The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
23David A. Knox, Thomas Kunz Secure Authentication in Wireless Sensor Networks Using RF Fingerprints. Search on Bibsonomy EUC (1) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
23Ashutosh Saxena Dynamic authentication: Need than a choice. Search on Bibsonomy COMSWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
23Rajeswari Mukesh, A. Damodaram, V. Subbiah Bharathi A robust finger print based two-server authentication and key exchange system. Search on Bibsonomy COMSWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
23Wen-Gong Shieh, Wen-Bing Horng Efficient and complete remote authentication scheme with smart cards. Search on Bibsonomy ISI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
23Muhammad Sharif 0001, Tariq Faiz, Mudassar Raza Time signatures - an implementation of Keystroke and click patterns for practical and secure authentication. Search on Bibsonomy ICDIM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
23Xiaole Bai, Wenjun Gu, Sriram Chellappan, Xun Wang, Dong Xuan, Bin Ma 0002 PAS: Predicate-Based Authentication Services Against Powerful Passive Adversaries. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
23Lakshmi Santhanam, Bin Xie 0001, Dharma P. Agrawal Secure and efficient authentication in Wireless Mesh Networks using merkle trees. Search on Bibsonomy LCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
23Lin-Yi Wu, Yi-Bing Lin Authentication Vector Management for UMTS. Search on Bibsonomy IEEE Trans. Wirel. Commun. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
23Kui Ren 0001, Wenjing Lou, Kai Zeng 0001, Patrick J. Moran On Broadcast Authentication in Wireless Sensor Networks. Search on Bibsonomy IEEE Trans. Wirel. Commun. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
23Zhi Li 0001, Qibin Sun, Yong Lian 0001, Chang Wen Chen Joint Source-Channel-Authentication Resource Allocation and Unequal Authenticity Protection for Multimedia Over Wireless Networks. Search on Bibsonomy IEEE Trans. Multim. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
23Tobias Scheidat, Claus Vielhauer, Jana Dittmann Single-Semantic Multi-Instance Fusion of Handwriting Based Biometric Authentication Systems. Search on Bibsonomy ICIP (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
23Yao-Chung Lin, David P. Varodayan, Bernd Girod Image Authentication Based on Distributed Source Coding. Search on Bibsonomy ICIP (3) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
23Sufyan Ababneh, Ashfaq A. Khokhar, Rashid Ansari Compensated Signature Embedding Based Multimedia Content Authentication System. Search on Bibsonomy ICIP (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
23Zhishou Zhang, John G. Apostolopoulos, Qibin Sun, Susie J. Wee, Wai-Choong Wong Stream Authentication Based on Generlized Butterfly Graph. Search on Bibsonomy ICIP (6) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
23Adrian Leung, Chris J. Mitchell Ninja: Non Identity Based, Privacy Preserving Authentication for Ubiquitous Environments. Search on Bibsonomy UbiComp The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Security, Privacy, Trusted Computing, Ubiquitous
23Yan Zhu 0010, Chang-Tsun Li, Hong-Jia Zhao Structural Digital Signature and Semi-Fragile Fingerprinting for Image Authentication in Wavelet Domain. Search on Bibsonomy IAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
23Aleksandra Nenadic, Ning Zhang 0001, Li Yao, Terry Morrow Levels of Authentication Assurance: an Investigation. Search on Bibsonomy IAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
23Taekyoung Kwon 0002, Hyeonjoon Moon Knowledge-Based User Authentication Associated with Biometrics. Search on Bibsonomy HCI (5) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
23Leila Ismail Evaluation of Authentication Mechanisms for Mobile Agents on top of Java. Search on Bibsonomy ACIS-ICIS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
23Somchart Fugkeaw, Piyawit Manpanpanich, Sekpon Juntapremjitt Exploiting X.509 Certificate and Multi-agent System Architecture for Role-Based Access Control and Authentication Management. Search on Bibsonomy CIT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
23Patrick Schaller, Srdjan Capkun, David A. Basin BAP: Broadcast Authentication Using Cryptographic Puzzles. Search on Bibsonomy ACNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
23Song Han 0004, Tharam S. Dillon, Elizabeth Chang 0001 Anonymous Mutual Authentication Protocol for RFID Tag Without Back-End Database. Search on Bibsonomy MSN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
23Hefu Liu Fulfillment of HTTP Authentication Based on Alcatel OmniSwitch 9700. Search on Bibsonomy I3E (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
23Hisashi Naito, Shoji Kajita, Yasushi Hirano, Kenji Mase Multiple-Tiered Security Hierarchy for Web Applications Using Central Authentication and Authorization Service. Search on Bibsonomy SAINT Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
23Jongpil Jeong, Min Young Chung, Hyunseung Choo Integrated OTP-Based User Authentication and Access Control Scheme in Home Networks. Search on Bibsonomy APNOMS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
23Rolf Oppliger, Ralf Hauser, David A. Basin, Aldo Rodenhaeuser, Bruno Kaiser A Proof of Concept Implementation of SSL/TLS Session-Aware User Authentication (TLS-SA). Search on Bibsonomy KiVS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
23Kenneth Revett, Sérgio Tenreiro de Magalhães, Henrique M. Dinis Santos On the Use of Rough Sets for User Authentication Via Keystroke Dynamics. Search on Bibsonomy EPIA Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF behavioral biometrics, rough sets, reducts, multiple sequence alignment, keystroke dynamics
23Philippe Golle, David A. Wagner 0001 Cryptanalysis of a Cognitive Authentication Scheme (Extended Abstract). Search on Bibsonomy S&P The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
23Qijun Gu, Jawad Drissi Dominating Set based Overhead Reduction for Broadcast Authentication in Large Sensor Networks. Search on Bibsonomy ICNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
23Xiangqian Wu 0002, Kuanquan Wang, David Zhang 0001, Ning Qi Combining Left and Right Irises for Personal Authentication. Search on Bibsonomy EMMCVPR The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
23Yueh-Min Huang, Hua-Yi Lin, Tzone-I Wang Inter-Cluster Routing Authentication for Ad Hoc Networks by a Hierarchical Key Scheme. Search on Bibsonomy J. Comput. Sci. Technol. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF CBSRP, inter-cluster, cluster-based, CA (Certificate Authority), ad hoc network, PKI, ID-based
23Yongdong Wu, Robert H. Deng Scalable authentication of MPEG-4 streams. Search on Bibsonomy IEEE Trans. Multim. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
23Renwei Ge, Gonzalo R. Arce, Giovanni Di Crescenzo Approximate Message Authentication Codes for N-ary Alphabets. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
23Mehmet Utku Celik, Gaurav Sharma 0001, A. Murat Tekalp Lossless watermarking for image authentication: a new framework and an implementation. Search on Bibsonomy IEEE Trans. Image Process. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
23Maria Teresa Carta, Daniele D. Giusto, Cristian Perra, Barbara Podda Exploiting JPEG2000 and Jpip for Image Based Authentication. Search on Bibsonomy ICIP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
23Sinjini Mitra, Marios Savvides, Anthony Brockwell The Role of Statistical Models in Biometric Authentication. Search on Bibsonomy ICB The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
23Reouven Elbaz, Lionel Torres, Gilles Sassatelli, Pierre Guillemin, Michel Bardouillet, Albert Martinez A Comparison of Two Approaches Providing Data Encryption and Authentication on a Processor Memory Bus. Search on Bibsonomy PATMOS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
23Pietro Michiardi, Refik Molva Identity Based Message Authentication for Dynamic Networks. Search on Bibsonomy SEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
23Kui Ren 0001, Kai Zeng 0001, Wenjing Lou, Patrick J. Moran On Broadcast Authentication in Wireless Sensor Networks. Search on Bibsonomy WASA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
23Najwa Aaraj, Srivaths Ravi 0001, Anand Raghunathan, Niraj K. Jha Architectures for efficient face authentication in embedded systems. Search on Bibsonomy DATE Designers' Forum The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
23Asad M. Ali Zero Footprint Secure Internet Authentication Using Network Smart Card. Search on Bibsonomy CARDIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
23Arjan Durresi, Lyn Evans, Vamsi Paruchuri, Leonard Barolli Secure 3G User Authentication in Adhoc Serving Networks. Search on Bibsonomy ARES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
23Jinwei Wang, Shiguo Lian, Zhen Ren, Yuewei Dai, Zhiquan Wang Semi-Fragile Watermarking Authentication with Local and Global Watermarks. Search on Bibsonomy AIAI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
23Youtao Zhang, Jun Yang 0002, Hai Trong Vu The interleaved authentication for filtering false reports in multipath routing based sensor networks. Search on Bibsonomy IPDPS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
23Yoann Hinard, Hatem Bettahar, Yacine Challal, Abdelmadjid Bouabdallah Layered Multicast Data Origin Authentication and Non-repudiation over Lossy Networks. Search on Bibsonomy ISCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
23Daniele Quercia, Stephen Hailes, Licia Capra TATA: Towards Anonymous Trusted Authentication. Search on Bibsonomy iTrust The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
23Binod Vaidya, SangDuck Lee, Jae-Kyun Han, Seung Jo Han Authentication Mechanism Using One-Time Password for 802.11 Wireless LAN. Search on Bibsonomy CSR The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
23Michiru Tanaka, Yoshimi Teshigawara A Method and Its Usability for User Authentication by Utilizing a Matrix Code Reader on Mobile Phones. Search on Bibsonomy WISA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
23Ke-Zhao Chen, Yao-Jen Chang, Chia-Wen Lin Video-based face authentication using appearance models and HMMs. Search on Bibsonomy ISCAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
23Seung-Yeon Lee, Eui-nam Huh, Yang-Woo Kim, Kyesan Lee An Efficient Authentication Mechanism for Fast Mobility Service in MIPv6. Search on Bibsonomy ICCSA (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
23Jongpil Jeong, Min Young Chung, Hyunseung Choo Secure User Authentication Mechanism in Digital Home Network Environments. Search on Bibsonomy EUC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
23Jin-Bum Hwang, Hyungkyu Lee, Jong Wook Han Efficient and User Friendly Inter-domain Device Authentication/Access Control for Home Networks. Search on Bibsonomy EUC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
23Jingshu Chen, Hong Wu, Qingyang Wang 0001, Qingguan Wang, Xuebin Chi A Reflective Framework for Authentication in Grid Computing Environments. Search on Bibsonomy GCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
23Hiroshi Dozono, Masanori Nakakuni, Hiroaki Sanada, Yoshio Noguchi The Analysis of Pen Inputs of Handwritten Symbols using Self Organizing Maps and its Application to User Authentication. Search on Bibsonomy IJCNN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
23Rongxing Lu, Zhenfu Cao, Xiaolei Dong, Renwang Su Group Oriented Deniable Authentication Protocol. Search on Bibsonomy IMSCCS (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
23Sergio Roberto de Lima e Silva Filho, Mauro Roisenberg Continuous Authentication by Keystroke Dynamics Using Committee Machines. Search on Bibsonomy ISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
23Khanh V. Nguyen Simplifying Peer-to-Peer Device Authentication Using Identity-Based Cryptography. Search on Bibsonomy ICNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
23Jun Liu 0009, Xiaoyan Hong, Qunwei Zheng, Lei Tang Privacy-Preserving Quick Authentication in Fast Roaming Networks. Search on Bibsonomy LCN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
23Audun Wangensteen, Lars Lunde, Ivar Jørstad, Than van Do Secured enterprise access with strong SIM authentication. Search on Bibsonomy EDOC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
23Michele Bugliesi, Riccardo Focardi, Matteo Maffei Analysis of Typed Analyses of Authentication Protocols. Search on Bibsonomy CSFW The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
23Ya-Fen Chang, Chin-Chen Chang 0001 An Improvement on Strong-Password Authentication Protocols. Search on Bibsonomy ICESS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
23Fabio Dianda, Filippo Giuntini, Fabio Martinelli, Anna Vaccarelli A Flexible Framework for Access Control Based on Ability Authentication. Search on Bibsonomy SAINT Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
23Su-Mi Lee, Young Ju Hwang, Dong Hoon Lee 0001, Jong In Lim 0001 Efficient Authentication for Low-Cost RFID Systems. Search on Bibsonomy ICCSA (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
23Joaquín Torres Márquez, Antonio Izquierdo, Arturo Ribagorda, Almudena Alcaide Secure Electronic Payments in Heterogeneous Networking: New Authentication Protocols Approach. Search on Bibsonomy ICCSA (3) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
23Miyoung Kim, Misun Kim, Youngsong Mun An Effective Authentication Scheme for Mobile Node with Fast Roaming Property. Search on Bibsonomy ICCSA (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
23Bogdan Groza, Dorina Petrica Cryptanalysis of an Authentication Protocol. Search on Bibsonomy SYNASC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
23Dimitris Glynos, Panayiotis Kotzanikolaou, Christos Douligeris Preventing Impersonation Attacks in MANET with Multi-Factor Authentication. Search on Bibsonomy WiOpt The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
23Roberto Di Pietro, Gianluigi Me, Maurizio Adriano Strangio A Two-Factor Mobile Authentication Scheme for Secure Financial Transactions. Search on Bibsonomy ICMB The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
23Maria Teresa Carta, Barbara Podda, Cristian Perra User Authentication Based on JPEG2000 Images. Search on Bibsonomy VLBV The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
23Mohamed Ali Kâafar, Lamia Ben Azzouz, Farouk Kamoun, Davor Males A Kerberos-Based Authentication Architecture for Wireless LANs. Search on Bibsonomy NETWORKING The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
23Willy Susilo, Yi Mu 0001 Deniable Ring Authentication Revisited. Search on Bibsonomy ACNS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
Displaying result #501 - #600 of 25398 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license