|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 8079 occurrences of 2235 keywords
|
|
|
Results
Found 25398 publication records. Showing 25398 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
25 | Wendy Moncur, Grégory Leplâtre |
Pictures at the ATM: exploring the usability of multiple graphical passwords. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI ![In: Proceedings of the 2007 Conference on Human Factors in Computing Systems, CHI 2007, San Jose, California, USA, April 28 - May 3, 2007, pp. 887-894, 2007, ACM, 978-1-59593-593-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
authentication mechanisms, ATMs, usable security, user authentication, graphical passwords |
25 | Mauricio Orozco Trujillo, Yednek Asfaw, Shervin Shirmohammadi, Andy Adler, Abdulmotaleb El-Saddik |
Haptic-Based Biometrics: A Feasibility Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HAPTICS ![In: 14th International Symposium on Haptic Interfaces for Virtual Environment and Teleoperator Systems (HAPTICS 2006), 25-26 March 2006, Arlington, VA, USA, Proceedings, pp. 38, 2006, IEEE Computer Society, 1-4244-0226-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Haptic Authentication, Continuous Authentication, Biometrics |
25 | Mourad Debbabi, Mohamed Mejri, Nadia Tawbi, I. Yahmadi |
From Protocol Specifications to Flaws and Attack Scenarios: An Automatic and Formal Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WETICE ![In: 6th Workshop on Enabling Technologies (WET-ICE '97), Infrastructure for Collaborative Enterprises, 18-20 June 1997, MIT, Cambridge, MA, USA, Proceedings, pp. 256-262, 1997, IEEE Computer Society, 0-8186-7967-0. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
authentication protocol specifications, flaws, automatic formal algorithm, protocol roles, intruder communication abilities, intruder computational abilities, protocol instrumentations, formal verification, encryption, message authentication, decryption, attack scenarios, deductive system |
25 | Chooi-Tian Lee, Jack W. Harris |
Designing a Virtual Access Control Configuration Protocol for Implementation over ISDN and Shared-Media Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: Proceedings 21st Conference on Local Computer Networks, Minneapolis, Minnesota, USA, October 13-16, 1996, pp. 116-125, 1996, IEEE Computer Society, 0-8186-7617-5. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
virtual access control configuration protocol, shared-media networks, corporate environment, trade-secret information protection, secure network, secure communication environment, encryption mechanisms, user password authentication, user-interface based access control, network interface based access control, authentication security mechanisms, virtual dedicated-media network system, dynamic security access authorization, token-based access security control, dedicated-media communication, network session-layer protocol, operating systems, WAN, LAN, application programs, ISDN, ISDN, security program |
23 | Jie Liu, F. Richard Yu, Chung-Horng Lung, Helen Tang |
Optimal combined intrusion detection and biometric-based continuous authentication in high security mobile ad hoc networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Wirel. Commun. ![In: IEEE Trans. Wirel. Commun. 8(2), pp. 806-815, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
23 | Tian-Fu Lee, Tzonelih Hwang, Shu-Hui Chang, Song-Kong Chong |
Enhanced delegation-based authentication protocol for PCSs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Wirel. Commun. ![In: IEEE Trans. Wirel. Commun. 8(5), pp. 2166-2171, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
23 | Marc Bächlin, Johannes Schumm, Daniel Roggen, Gerhard Tröster |
Quantifying Gait Similarity: User Authentication and Real-World Challenge. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICB ![In: Advances in Biometrics, Third International Conference, ICB 2009, Alghero, Italy, June 2-5, 2009. Proceedings, pp. 1040-1049, 2009, Springer, 978-3-642-01792-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
23 | Manabu Inuma, Akira Otsuka, Hideki Imai |
Theoretical Framework for Constructing Matching Algorithms in Biometric Authentication Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICB ![In: Advances in Biometrics, Third International Conference, ICB 2009, Alghero, Italy, June 2-5, 2009. Proceedings, pp. 806-815, 2009, Springer, 978-3-642-01792-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
23 | Jianquan Xie, Qing Xie, Chunhua Yang 0001 |
An Accurate Image Juggling Authentication Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Fifth International Conference on Information Assurance and Security, IAS 2009, Xi'An, China, 18-20 August 2009, pp. 774-777, 2009, IEEE Computer Society, 978-0-7695-3744-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
23 | Nathan L. Clarke, Sevasti Karatzouni, Steven Furnell |
Flexible and Transparent User Authentication for Mobile Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Emerging Challenges for Security, Privacy and Trust, 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009. Proceedings, pp. 1-12, 2009, Springer, 978-3-642-01243-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
23 | Stavros Papadopoulos 0001, Dimitris Papadias, Weiwei Cheng, Kian-Lee Tan |
Separating Authentication from Query Execution in Outsourced Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDE ![In: Proceedings of the 25th International Conference on Data Engineering, ICDE 2009, March 29 2009 - April 2 2009, Shanghai, China, pp. 1148-1151, 2009, IEEE Computer Society, 978-0-7695-3545-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
23 | Charlott Eliasson, Markus Fiedler, Ivar Jørstad |
A Criteria-Based Evaluation Framework for Authentication Schemes in IMS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Forth International Conference on Availability, Reliability and Security, ARES 2009, March 16-19, 2009, Fukuoka, Japan, pp. 865-869, 2009, IEEE Computer Society, 978-1-4244-3572-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
23 | Eun-Jun Yoon, Kee-Young Yoo |
Robust ID-Based Remote Mutual Authentication with Key Agreement Scheme for Mobile Devices on ECC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSE (2) ![In: Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, CSE 2009, Vancouver, BC, Canada, August 29-31, 2009, pp. 633-640, 2009, IEEE Computer Society, 978-1-4244-5334-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
23 | Li Wang 0039, Mei Song, Ping Wang, Jie Li, Junde Song |
Performance modeling on dynamic authentication data management in heterogeneous interworking networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCECE ![In: Proceedings of the 22nd Canadian Conference on Electrical and Computer Engineering, CCECE 2009, 3-6 May 2009, Delta St. John's Hotel and Conference Centre, St. John's, Newfoundland, Canada, pp. 403-406, 2009, IEEE, 978-1-4244-3508-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
23 | Naveed Ahmed 0005, Christian Damsgaard Jensen |
A Mechanism for Identity Delegation at Authentication Level. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NordSec ![In: Identity and Privacy in the Internet Age, 14th Nordic Conference on Secure IT Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009. Proceedings, pp. 148-162, 2009, Springer, 978-3-642-04765-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Identity Delegation, Usability of Security, Nomadic User, Practical Security |
23 | Shouhong Wang, Hai Wang 0008 |
Password Authentication Using Hopfield Neural Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Syst. Man Cybern. Part C ![In: IEEE Trans. Syst. Man Cybern. Part C 38(2), pp. 265-268, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Sufyan Ababneh, Ashfaq A. Khokhar, Rashid Ansari |
A multimedia-content authentication and recovery protocol in peer-to-peer networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EIT ![In: 2008 IEEE International Conference on Electro/Information Technology, EIT 2008, held at Iowa State University, Ames, Iowa, USA, May 18-20, 2008, pp. 90-95, 2008, IEEE, 978-1-4244-2030-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Jie Liu, F. Richard Yu, Chung-Horng Lung, Helen Tang |
A Framework of Combining Intrusion Detection and Continuous Authentication in Mobile Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: Proceedings of IEEE International Conference on Communications, ICC 2008, Beijing, China, 19-23 May 2008, pp. 1515-1519, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Liang Xiao 0003, Larry J. Greenstein, Narayan B. Mandayam, Wade Trappe |
A Physical-Layer Technique to Enhance Authentication for Mobile Terminals. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: Proceedings of IEEE International Conference on Communications, ICC 2008, Beijing, China, 19-23 May 2008, pp. 1520-1524, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Yingfang Fu, Jingsha He, Rong Wang, Guorui Li |
Mutual Authentication in Wireless Mesh Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: Proceedings of IEEE International Conference on Communications, ICC 2008, Beijing, China, 19-23 May 2008, pp. 1690-1694, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
23 | David P. Varodayan, Yao-Chung Lin, Bernd Girod |
Audio authentication based on distributed source coding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICASSP ![In: Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2008, March 30 - April 4, 2008, Caesars Palace, Las Vegas, Nevada, USA, pp. 225-228, 2008, IEEE, 1-4244-1484-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Jiansheng Chen, Yiu Sang Moon |
Using SIFT features in palmprint authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPR ![In: 19th International Conference on Pattern Recognition (ICPR 2008), December 8-11, 2008, Tampa, Florida, USA, pp. 1-4, 2008, IEEE Computer Society, 978-1-4244-2175-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Helen Tang, Mazda Salmanian |
Lightweight Integrated Authentication for Tactical MANETs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICYCS ![In: Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008, Zhang Jia Jie, Hunan, China, November 18-21, 2008, pp. 2266-2271, 2008, IEEE Computer Society, 978-0-7695-3398-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Wei Wang 0015, Dongming Peng, Honggang Wang 0001, Hamid Sharif, Hsiao-Hwa Chen |
Energy-Distortion-Authentication Optimized Resource Allocation for Secure Wireless Image Streaming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNC ![In: WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008 - April 3 2008, Las Vegas, Nevada, USA, Conference Proceedings, pp. 2810-2815, 2008, IEEE, 978-1-4244-1997-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Yu-Tso Chen, Ahren Studer, Adrian Perrig |
Combining TLS and TPMs to Achieve Device and User Authentication for Wi-Fi and WiMAX Citywide Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNC ![In: WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008 - April 3 2008, Las Vegas, Nevada, USA, Conference Proceedings, pp. 2804-2809, 2008, IEEE, 978-1-4244-1997-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Wensheng Zhang 0001, Nalin Subramanian, Guiling Wang 0001 |
Lightweight and Compromise-Resilient Message Authentication in Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INFOCOM ![In: INFOCOM 2008. 27th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 13-18 April 2008, Phoenix, AZ, USA, pp. 1418-1426, 2008, IEEE, 978-1-4244-2026-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Jenq-Shiou Leu |
Empirical Analysis of Authentication Process in a Cooperative B3G Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCCN ![In: Proceedings of the 17th International Conference on Computer Communications and Networks, IEEE ICCCN 2008, St. Thomas, U.S. Virgin Islands, August 3-7, 2008, pp. 169-173, 2008, IEEE, 978-1-4244-2390-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
23 | M. Vipin, A. V. Sarad, Sankar Kuppan |
A Multi Way Tree for Token Based Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSSE (3) ![In: International Conference on Computer Science and Software Engineering, CSSE 2008, Volume 3: Grid Computing / Distributed and Parallel Computing / Information Security, December 12-14, 2008, Wuhan, China, pp. 1011-1014, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Alireza Sadighian, Rasool Jalili |
FLMAP: A fast lightweight mutual authentication protocol for RFID systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICON ![In: Proceedings of the 16th International Conference on Networks, ICON 2008, December 12-14, 2008, held at India Habitat Centre, New Delhi, India, pp. 1-6, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
23 | David A. Knox, Thomas Kunz |
Secure Authentication in Wireless Sensor Networks Using RF Fingerprints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC (1) ![In: 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), Shanghai, China, December 17-20, 2008, Volume I, pp. 230-237, 2008, IEEE Computer Society, 978-0-7695-3492-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Ashutosh Saxena |
Dynamic authentication: Need than a choice. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMSWARE ![In: Proceedings of the Third International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2008), January 5-10, 2008, Bangalore, India, pp. 214-218, 2008, IEEE, 978-1-4244-1797-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Rajeswari Mukesh, A. Damodaram, V. Subbiah Bharathi |
A robust finger print based two-server authentication and key exchange system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMSWARE ![In: Proceedings of the Third International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2008), January 5-10, 2008, Bangalore, India, pp. 167-174, 2008, IEEE, 978-1-4244-1797-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Wen-Gong Shieh, Wen-Bing Horng |
Efficient and complete remote authentication scheme with smart cards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: IEEE International Conference on Intelligence and Security Informatics, ISI 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings, pp. 122-127, 2008, IEEE, 978-1-4244-2414-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Muhammad Sharif 0001, Tariq Faiz, Mudassar Raza |
Time signatures - an implementation of Keystroke and click patterns for practical and secure authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDIM ![In: Third IEEE International Conference on Digital Information Management (ICDIM), November 13-16, 2008, London, UK, Proceedings, pp. 559-562, 2008, IEEE, 978-1-4244-2917-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Xiaole Bai, Wenjun Gu, Sriram Chellappan, Xun Wang, Dong Xuan, Bin Ma 0002 |
PAS: Predicate-Based Authentication Services Against Powerful Passive Adversaries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Fourth Annual Computer Security Applications Conference, ACSAC 2008, Anaheim, California, USA, 8-12 December 2008, pp. 433-442, 2008, IEEE Computer Society, 978-0-7695-3447-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Lakshmi Santhanam, Bin Xie 0001, Dharma P. Agrawal |
Secure and efficient authentication in Wireless Mesh Networks using merkle trees. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: LCN 2008, The 33rd IEEE Conference on Local Computer Networks, The Conference on Leading Edge and Practical Computer Networking, Hyatt Regency Montreal, Montreal, Quebec, Canada, 14-17 October 2008, Proceedings, pp. 966-972, 2008, IEEE Computer Society, 978-1-4244-2412-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Lin-Yi Wu, Yi-Bing Lin |
Authentication Vector Management for UMTS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Wirel. Commun. ![In: IEEE Trans. Wirel. Commun. 6(11), pp. 4101-4107, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Kui Ren 0001, Wenjing Lou, Kai Zeng 0001, Patrick J. Moran |
On Broadcast Authentication in Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Wirel. Commun. ![In: IEEE Trans. Wirel. Commun. 6(11), pp. 4136-4144, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Zhi Li 0001, Qibin Sun, Yong Lian 0001, Chang Wen Chen |
Joint Source-Channel-Authentication Resource Allocation and Unequal Authenticity Protection for Multimedia Over Wireless Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Multim. ![In: IEEE Trans. Multim. 9(4), pp. 837-850, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Tobias Scheidat, Claus Vielhauer, Jana Dittmann |
Single-Semantic Multi-Instance Fusion of Handwriting Based Biometric Authentication Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIP (2) ![In: Proceedings of the International Conference on Image Processing, ICIP 2007, September 16-19, 2007, San Antonio, Texas, USA, pp. 393-396, 2007, IEEE, 978-1-4244-1436-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Yao-Chung Lin, David P. Varodayan, Bernd Girod |
Image Authentication Based on Distributed Source Coding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIP (3) ![In: Proceedings of the International Conference on Image Processing, ICIP 2007, September 16-19, 2007, San Antonio, Texas, USA, pp. 5-8, 2007, IEEE, 978-1-4244-1436-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Sufyan Ababneh, Ashfaq A. Khokhar, Rashid Ansari |
Compensated Signature Embedding Based Multimedia Content Authentication System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIP (1) ![In: Proceedings of the International Conference on Image Processing, ICIP 2007, September 16-19, 2007, San Antonio, Texas, USA, pp. 393-396, 2007, IEEE, 978-1-4244-1436-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Zhishou Zhang, John G. Apostolopoulos, Qibin Sun, Susie J. Wee, Wai-Choong Wong |
Stream Authentication Based on Generlized Butterfly Graph. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIP (6) ![In: Proceedings of the International Conference on Image Processing, ICIP 2007, September 16-19, 2007, San Antonio, Texas, USA, pp. 121-124, 2007, IEEE, 978-1-4244-1436-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Adrian Leung, Chris J. Mitchell |
Ninja: Non Identity Based, Privacy Preserving Authentication for Ubiquitous Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiComp ![In: UbiComp 2007: Ubiquitous Computing, 9th International Conference, UbiComp 2007, Innsbruck, Austria, September 16-19, 2007, Proceedings, pp. 73-90, 2007, Springer, 978-3-540-74852-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Security, Privacy, Trusted Computing, Ubiquitous |
23 | Yan Zhu 0010, Chang-Tsun Li, Hong-Jia Zhao |
Structural Digital Signature and Semi-Fragile Fingerprinting for Image Authentication in Wavelet Domain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Third International Symposium on Information Assurance and Security, IAS 2007, August 29-31, 2007, Manchester, United Kingdom, pp. 478-483, 2007, IEEE Computer Society, 978-0-7695-2876-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Aleksandra Nenadic, Ning Zhang 0001, Li Yao, Terry Morrow |
Levels of Authentication Assurance: an Investigation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Third International Symposium on Information Assurance and Security, IAS 2007, August 29-31, 2007, Manchester, United Kingdom, pp. 155-160, 2007, IEEE Computer Society, 978-0-7695-2876-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Taekyoung Kwon 0002, Hyeonjoon Moon |
Knowledge-Based User Authentication Associated with Biometrics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HCI (5) ![In: Universal Access in Human Computer Interaction. Coping with Diversity, 4th International Conference on Universal Access in Human-Computer Interaction, UAHCI 2007, Held as Part of HCI International 2007, Beijing, China, July 22-27, 2007, Proceedings, Part I, pp. 414-419, 2007, Springer, 978-3-540-73278-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Leila Ismail |
Evaluation of Authentication Mechanisms for Mobile Agents on top of Java. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACIS-ICIS ![In: 6th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 11-13 July 2007, Melbourne, Australia, pp. 663-668, 2007, IEEE Computer Society, 0-7695-2841-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Somchart Fugkeaw, Piyawit Manpanpanich, Sekpon Juntapremjitt |
Exploiting X.509 Certificate and Multi-agent System Architecture for Role-Based Access Control and Authentication Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIT ![In: Seventh International Conference on Computer and Information Technology (CIT 2007), October 16-19, 2007, University of Aizu, Fukushima, Japan, pp. 733-738, 2007, IEEE Computer Society, 978-0-7695-2983-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Patrick Schaller, Srdjan Capkun, David A. Basin |
BAP: Broadcast Authentication Using Cryptographic Puzzles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007, Proceedings, pp. 401-419, 2007, Springer, 978-3-540-72737-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Song Han 0004, Tharam S. Dillon, Elizabeth Chang 0001 |
Anonymous Mutual Authentication Protocol for RFID Tag Without Back-End Database. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MSN ![In: Mobile Ad-Hoc and Sensor Networks, Third International Conference, MSN 2007, Beijing, China, December 12-14, 2007, Proceedings, pp. 623-632, 2007, Springer, 978-3-540-77023-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Hefu Liu |
Fulfillment of HTTP Authentication Based on Alcatel OmniSwitch 9700. ![Search on Bibsonomy](Pics/bibsonomy.png) |
I3E (2) ![In: Integration and Innovation Orient to E-Society, Volume 2, Seventh IFIP International Conference on e-Business, e-Services, and e-Society (I3E2007), October 10-12, Wuhan, China, pp. 75-80, 2007, Springer, 978-0-387-75493-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Hisashi Naito, Shoji Kajita, Yasushi Hirano, Kenji Mase |
Multiple-Tiered Security Hierarchy for Web Applications Using Central Authentication and Authorization Service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAINT Workshops ![In: 2007 International Symposium on Applications and the Internet - Workshops (SAINT 2007 Workshops), 15-19 January 2007, Hiroshima, Japan, pp. 27, 2007, IEEE Computer Society, 0-7695-2757-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Jongpil Jeong, Min Young Chung, Hyunseung Choo |
Integrated OTP-Based User Authentication and Access Control Scheme in Home Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APNOMS ![In: Managing Next Generation Networks and Services, 10th Asia-Pacific Network Operations and Management Symposium, APNOMS 2007, Sapporo, Japan, October 10-12, 2007, Proceedings, pp. 123-133, 2007, Springer, 978-3-540-75475-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Rolf Oppliger, Ralf Hauser, David A. Basin, Aldo Rodenhaeuser, Bruno Kaiser |
A Proof of Concept Implementation of SSL/TLS Session-Aware User Authentication (TLS-SA). ![Search on Bibsonomy](Pics/bibsonomy.png) |
KiVS ![In: Kommunikation in Verteilten Systemen (KiVS), 15. Fachtagung Kommunikation in Verteilten Systemen, KiVS 2007, Bern, Schweiz, 26. Februar - 2. März 2007, pp. 225-236, 2007, Springer, 978-3-540-69961-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Kenneth Revett, Sérgio Tenreiro de Magalhães, Henrique M. Dinis Santos |
On the Use of Rough Sets for User Authentication Via Keystroke Dynamics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EPIA Workshops ![In: Progress in Artificial Intelligence, 13th Portuguese Conference on Aritficial Intelligence, EPIA 2007, Workshops: GAIW, AIASTS, ALEA, AMITA, BAOSW, BI, CMBSB, IROBOT, MASTA, STCS, and TEMA, Guimarães, Portugal, December 3-7, 2007, Proceedings, pp. 145-159, 2007, Springer, 978-3-540-77000-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
behavioral biometrics, rough sets, reducts, multiple sequence alignment, keystroke dynamics |
23 | Philippe Golle, David A. Wagner 0001 |
Cryptanalysis of a Cognitive Authentication Scheme (Extended Abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 2007 IEEE Symposium on Security and Privacy (S&P 2007), 20-23 May 2007, Oakland, California, USA, pp. 66-70, 2007, IEEE Computer Society, 0-7695-2848-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Qijun Gu, Jawad Drissi |
Dominating Set based Overhead Reduction for Broadcast Authentication in Large Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNS ![In: Third International Conference on Networking and Services (ICNS 2007), June 19-25, 2007, Athens, Greece, pp. 81, 2007, IEEE Computer Society, 978-0-7695-2858-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Xiangqian Wu 0002, Kuanquan Wang, David Zhang 0001, Ning Qi |
Combining Left and Right Irises for Personal Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EMMCVPR ![In: Energy Minimization Methods in Computer Vision and Pattern Recognition, 6th International Conference, EMMCVPR 2007, Ezhou, China, August 27-29, 2007, Proceedings, pp. 145-152, 2007, Springer, 978-3-540-74195-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Yueh-Min Huang, Hua-Yi Lin, Tzone-I Wang |
Inter-Cluster Routing Authentication for Ad Hoc Networks by a Hierarchical Key Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Sci. Technol. ![In: J. Comput. Sci. Technol. 21(6), pp. 997-1011, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
CBSRP, inter-cluster, cluster-based, CA (Certificate Authority), ad hoc network, PKI, ID-based |
23 | Yongdong Wu, Robert H. Deng |
Scalable authentication of MPEG-4 streams. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Multim. ![In: IEEE Trans. Multim. 8(1), pp. 152-161, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Renwei Ge, Gonzalo R. Arce, Giovanni Di Crescenzo |
Approximate Message Authentication Codes for N-ary Alphabets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 1(1), pp. 56-67, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Mehmet Utku Celik, Gaurav Sharma 0001, A. Murat Tekalp |
Lossless watermarking for image authentication: a new framework and an implementation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Image Process. ![In: IEEE Trans. Image Process. 15(4), pp. 1042-1049, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Maria Teresa Carta, Daniele D. Giusto, Cristian Perra, Barbara Podda |
Exploiting JPEG2000 and Jpip for Image Based Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIP ![In: Proceedings of the International Conference on Image Processing, ICIP 2006, October 8-11, Atlanta, Georgia, USA, pp. 3109-3112, 2006, IEEE, 1-4244-0480-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Sinjini Mitra, Marios Savvides, Anthony Brockwell |
The Role of Statistical Models in Biometric Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICB ![In: Advances in Biometrics, International Conference, ICB 2006, Hong Kong, China, January 5-7, 2006, Proceedings, pp. 581-588, 2006, Springer, 3-540-31111-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Reouven Elbaz, Lionel Torres, Gilles Sassatelli, Pierre Guillemin, Michel Bardouillet, Albert Martinez |
A Comparison of Two Approaches Providing Data Encryption and Authentication on a Processor Memory Bus. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PATMOS ![In: Integrated Circuit and System Design. Power and Timing Modeling, Optimization and Simulation, 16th International Workshop, PATMOS 2006, Montpellier, France, September 13-15, 2006, Proceedings, pp. 267-279, 2006, Springer, 3-540-39094-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Pietro Michiardi, Refik Molva |
Identity Based Message Authentication for Dynamic Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Security and Privacy in Dynamic Environments, Proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22-24 May 2006, Karlstad, Sweden, pp. 50-61, 2006, Springer, 0-387-33405-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Kui Ren 0001, Kai Zeng 0001, Wenjing Lou, Patrick J. Moran |
On Broadcast Authentication in Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WASA ![In: Wireless Algorithms, Systems, and Applications, First International Conference, WASA 2006, Xi'an, China, August 15-17, 2006, Proceedings, pp. 502-514, 2006, Springer, 3-540-37189-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Najwa Aaraj, Srivaths Ravi 0001, Anand Raghunathan, Niraj K. Jha |
Architectures for efficient face authentication in embedded systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DATE Designers' Forum ![In: Proceedings of the Conference on Design, Automation and Test in Europe: Designers' Forum, DATE 2006, Munich, Germany, March 6-10, 2006, pp. 1-6, 2006, European Design and Automation Association, Leuven, Belgium, 3-9810801-0-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Asad M. Ali |
Zero Footprint Secure Internet Authentication Using Network Smart Card. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CARDIS ![In: Smart Card Research and Advanced Applications, 7th IFIP WG 8.8/11.2 International Conference, CARDIS 2006, Tarragona, Spain, April 19-21, 2006, Proceedings, pp. 91-104, 2006, Springer, 3-540-33311-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Arjan Durresi, Lyn Evans, Vamsi Paruchuri, Leonard Barolli |
Secure 3G User Authentication in Adhoc Serving Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The First International Conference on Availability, Reliability and Security, ARES 2006, The International Dependability Conference - Bridging Theory and Practice, April 20-22 2006, Vienna University of Technology, Austria, pp. 488-495, 2006, IEEE Computer Society, 0-7695-2567-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Jinwei Wang, Shiguo Lian, Zhen Ren, Yuewei Dai, Zhiquan Wang |
Semi-Fragile Watermarking Authentication with Local and Global Watermarks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AIAI ![In: Artificial Intelligence Applications and Innovations, 3rd IFIP Conference on Artificial Intelligence Applications and Innovations (AIAI) 2006, June 7-9, 2006, Athens, Greece, pp. 681-688, 2006, Springer, 0-387-34223-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Youtao Zhang, Jun Yang 0002, Hai Trong Vu |
The interleaved authentication for filtering false reports in multipath routing based sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPDPS ![In: 20th International Parallel and Distributed Processing Symposium (IPDPS 2006), Proceedings, 25-29 April 2006, Rhodes Island, Greece, 2006, IEEE. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Yoann Hinard, Hatem Bettahar, Yacine Challal, Abdelmadjid Bouabdallah |
Layered Multicast Data Origin Authentication and Non-repudiation over Lossy Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the 11th IEEE Symposium on Computers and Communications (ISCC 2006), 26-29 June 2006, Cagliari, Sardinia, Italy, pp. 662-667, 2006, IEEE Computer Society, 0-7695-2588-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Daniele Quercia, Stephen Hailes, Licia Capra |
TATA: Towards Anonymous Trusted Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
iTrust ![In: Trust Management, 4th International Conference, iTrust 2006, Pisa, Italy, May 16-19, 2006, Proceedings, pp. 313-323, 2006, Springer, 3-540-34295-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Binod Vaidya, SangDuck Lee, Jae-Kyun Han, Seung Jo Han |
Authentication Mechanism Using One-Time Password for 802.11 Wireless LAN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSR ![In: Computer Science - Theory and Applications, First International Symposium on Computer Science in Russia, CSR 2006, St. Petersburg, Russia, June 8-12, 2006, Proceedings, pp. 619-628, 2006, Springer, 3-540-34166-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Michiru Tanaka, Yoshimi Teshigawara |
A Method and Its Usability for User Authentication by Utilizing a Matrix Code Reader on Mobile Phones. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers, pp. 225-236, 2006, Springer, 978-3-540-71092-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Ke-Zhao Chen, Yao-Jen Chang, Chia-Wen Lin |
Video-based face authentication using appearance models and HMMs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS ![In: International Symposium on Circuits and Systems (ISCAS 2006), 21-24 May 2006, Island of Kos, Greece, 2006, IEEE, 0-7803-9389-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Seung-Yeon Lee, Eui-nam Huh, Yang-Woo Kim, Kyesan Lee |
An Efficient Authentication Mechanism for Fast Mobility Service in MIPv6. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (2) ![In: Computational Science and Its Applications - ICCSA 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part II, pp. 905-914, 2006, Springer, 3-540-34072-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Jongpil Jeong, Min Young Chung, Hyunseung Choo |
Secure User Authentication Mechanism in Digital Home Network Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC ![In: Embedded and Ubiquitous Computing, International Conference, EUC 2006, Seoul, Korea, August 1-4, 2006, Proceedings, pp. 345-354, 2006, Springer, 3-540-36679-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Jin-Bum Hwang, Hyungkyu Lee, Jong Wook Han |
Efficient and User Friendly Inter-domain Device Authentication/Access Control for Home Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC ![In: Embedded and Ubiquitous Computing, International Conference, EUC 2006, Seoul, Korea, August 1-4, 2006, Proceedings, pp. 131-140, 2006, Springer, 3-540-36679-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Jingshu Chen, Hong Wu, Qingyang Wang 0001, Qingguan Wang, Xuebin Chi |
A Reflective Framework for Authentication in Grid Computing Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GCC ![In: Grid and Cooperative Computing - GCC 2006, 5th International Conference, Changsha, Hunan, China, 21-23 October 2006, Proceedings, pp. 404-407, 2006, IEEE Computer Society, 0-7695-2694-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Hiroshi Dozono, Masanori Nakakuni, Hiroaki Sanada, Yoshio Noguchi |
The Analysis of Pen Inputs of Handwritten Symbols using Self Organizing Maps and its Application to User Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IJCNN ![In: Proceedings of the International Joint Conference on Neural Networks, IJCNN 2006, part of the IEEE World Congress on Computational Intelligence, WCCI 2006, Vancouver, BC, Canada, 16-21 July 2006, pp. 2577-2582, 2006, IEEE, 0-7803-9490-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Rongxing Lu, Zhenfu Cao, Xiaolei Dong, Renwang Su |
Group Oriented Deniable Authentication Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMSCCS (2) ![In: Interdisciplinary and Multidisciplinary Research in Computer Science, IEEE CS Proceeding of the First International Multi-Symposium of Computer and Computational Sciences (IMSCCS|06), June 20-24, 2006, Zhejiang University, Hangzhou, China, Vol. 2, pp. 89-92, 2006, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Sergio Roberto de Lima e Silva Filho, Mauro Roisenberg |
Continuous Authentication by Keystroke Dynamics Using Committee Machines. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: Intelligence and Security Informatics, IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006, Proceedings, pp. 686-687, 2006, Springer, 3-540-34478-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Khanh V. Nguyen |
Simplifying Peer-to-Peer Device Authentication Using Identity-Based Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNS ![In: 2006 International Conference on Networking and Services (ICNS 2006), 16-21 July 2006, Silicon Valley, California, USA, pp. 43, 2006, IEEE Computer Society, 0-7695-2622-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Jun Liu 0009, Xiaoyan Hong, Qunwei Zheng, Lei Tang |
Privacy-Preserving Quick Authentication in Fast Roaming Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: LCN 2006, The 31st Annual IEEE Conference on Local Computer Networks, Tampa, Florida, USA, 14-16 November 2006, pp. 975-982, 2006, IEEE Computer Society, 1-4244-0418-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Audun Wangensteen, Lars Lunde, Ivar Jørstad, Than van Do |
Secured enterprise access with strong SIM authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDOC ![In: Tenth IEEE International Enterprise Distributed Object Computing Conference (EDOC 2006), 16-20 October 2006, Hong Kong, China, pp. 463-466, 2006, IEEE Computer Society, 0-7695-2558-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Michele Bugliesi, Riccardo Focardi, Matteo Maffei |
Analysis of Typed Analyses of Authentication Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 18th IEEE Computer Security Foundations Workshop, (CSFW-18 2005), 20-22 June 2005, Aix-en-Provence, France, pp. 112-125, 2005, IEEE Computer Society, 0-7695-2340-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Ya-Fen Chang, Chin-Chen Chang 0001 |
An Improvement on Strong-Password Authentication Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICESS ![In: Embedded Software and Systems, Second International Conference, ICESS 2005, Xi'an, China, December 16-18, 2005, Proceedings, pp. 629-637, 2005, Springer, 3-540-30881-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Fabio Dianda, Filippo Giuntini, Fabio Martinelli, Anna Vaccarelli |
A Flexible Framework for Access Control Based on Ability Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAINT Workshops ![In: 2005 IEEE/IPSJ International Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops), 31 January - 4 February 2005, Trento, Italy, pp. 106-109, 2005, IEEE Computer Society, 0-7695-2263-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Su-Mi Lee, Young Ju Hwang, Dong Hoon Lee 0001, Jong In Lim 0001 |
Efficient Authentication for Low-Cost RFID Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (1) ![In: Computational Science and Its Applications - ICCSA 2005, International Conference, Singapore, May 9-12, 2005, Proceedings, Part I, pp. 619-627, 2005, Springer, 3-540-25860-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Joaquín Torres Márquez, Antonio Izquierdo, Arturo Ribagorda, Almudena Alcaide |
Secure Electronic Payments in Heterogeneous Networking: New Authentication Protocols Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (3) ![In: Computational Science and Its Applications - ICCSA 2005, International Conference, Singapore, May 9-12, 2005, Proceedings, Part III, pp. 729-738, 2005, Springer, 3-540-25862-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Miyoung Kim, Misun Kim, Youngsong Mun |
An Effective Authentication Scheme for Mobile Node with Fast Roaming Property. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (1) ![In: Computational Science and Its Applications - ICCSA 2005, International Conference, Singapore, May 9-12, 2005, Proceedings, Part I, pp. 559-568, 2005, Springer, 3-540-25860-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Bogdan Groza, Dorina Petrica |
Cryptanalysis of an Authentication Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SYNASC ![In: Seventh International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC 2005), 25-29 September 2005, Timisoara, Romania, pp. 147-153, 2005, IEEE Computer Society, 0-7695-2453-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Dimitris Glynos, Panayiotis Kotzanikolaou, Christos Douligeris |
Preventing Impersonation Attacks in MANET with Multi-Factor Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WiOpt ![In: 3rd International Symposium on Modeling and Optimization in Mobile, Ad-Hoc and Wireless Networks (WiOpt 2005), 4-6 April 2005, Trentino, Italy, pp. 59-64, 2005, IEEE Computer Society, 0-7695-2267-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Roberto Di Pietro, Gianluigi Me, Maurizio Adriano Strangio |
A Two-Factor Mobile Authentication Scheme for Secure Financial Transactions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICMB ![In: 2005 International Conference on Mobile Business (ICMB 2005), 11-13 July 2005, Sydney, Australia, pp. 28-34, 2005, IEEE Computer Society, 0-7695-2367-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Maria Teresa Carta, Barbara Podda, Cristian Perra |
User Authentication Based on JPEG2000 Images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VLBV ![In: Visual Content Processing and Representation, 9th International Workshop, VLBV 2005, Sardinia, Italy, September 15-16, 2005, Revised Selected Papers, pp. 207-213, 2005, Springer, 3-540-33578-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Mohamed Ali Kâafar, Lamia Ben Azzouz, Farouk Kamoun, Davor Males |
A Kerberos-Based Authentication Architecture for Wireless LANs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NETWORKING ![In: NETWORKING 2004, Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication, Third International IFIP-TC6 Networking Conference, Athens, Greece, May 9-14, 2004, Proceedings, pp. 1344-1353, 2004, Springer, 3-540-21959-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
23 | Willy Susilo, Yi Mu 0001 |
Deniable Ring Authentication Revisited. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004, Proceedings, pp. 149-163, 2004, Springer, 3-540-22217-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
Displaying result #501 - #600 of 25398 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ 15][ >>] |
|