Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
20 | Yossef Oren, Adi Shamir |
Remote Password Extraction from RFID Tags. |
IEEE Trans. Computers |
2007 |
DBLP DOI BibTeX RDF |
sidechannel attacks, RFID, cryptanalysis, power analysis |
20 | Mohsen Sharifi, Alireza Saberi, Mojtaba Vahidi, Mohammad Zoroufi |
A Zero Knowledge Password Proof Mutual Authentication Technique Against Real-Time Phishing Attacks. |
ICISS |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Chun-Li Lin, Ching-Po Hung |
Masquerade on One-Time Password Authentication Scheme. |
FGCN (1) |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Ratna Dutta |
Overcome Weakness of a Password-Based Group Key Agreement Protocol. |
ISCC |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Sonia Chiasson, Paul C. van Oorschot, Robert Biddle |
Graphical Password Authentication Using Cued Click Points. |
ESORICS |
2007 |
DBLP DOI BibTeX RDF |
Authentication, User Study, Computer Security, Usable Security, Graphical Passwords |
20 | Rosario Gennaro, Yehuda Lindell |
A framework for password-based authenticated key exchange1. |
ACM Trans. Inf. Syst. Secur. |
2006 |
DBLP DOI BibTeX RDF |
projective hash functions, authentication, Passwords, dictionary attack |
20 | Binod Vaidya, SangDuck Lee, Jae-Kyun Han, Seung Jo Han |
Authentication Mechanism Using One-Time Password for 802.11 Wireless LAN. |
CSR |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Ilsun You |
A One-Time Password Authentication Scheme for Secure Remote Access in Intelligent Home Networks. |
KES (2) |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Binod Vaidya, SangDuck Lee, Eung-Kon Kim, Seung Jo Han |
Using One-Time Password Based Authentication for Wireless IP Network. |
ISI |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Jun-Cheol Jeon, Kee-Won Kim, Kee-Young Yoo |
Non-group Cellular Automata Based One Time Password Authentication Scheme in Wireless Networks. |
MADNES |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Miao Ma |
Mitigating Denial of Service Attacks with Password Puzzles. |
ITCC (2) |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Philip D. MacKenzie, Sarvar Patel |
Hard Bits of the Discrete Log with Applications to Password Authentication. |
CT-RSA |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Chin-Chen Chang 0001, Jui-Yi Kuo |
An Efficient Multi-Server Password Authenticated Key Agreement Scheme Using Smart Cards with Access Control. |
AINA |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Jeeyeon Kim, Seungjoo Kim, Jin Kwak, Dongho Won |
Cryptanalysis and Improvement of Password Authenticated Key Exchange Scheme between Clients with Different Passwords. |
ICCSA (1) |
2004 |
DBLP DOI BibTeX RDF |
|
20 | Rosario Gennaro, Yehuda Lindell |
A Framework for Password-Based Authenticated Key Exchange. |
EUROCRYPT |
2003 |
DBLP DOI BibTeX RDF |
|
20 | Panu Hämäläinen, Marko Hännikäinen, Markku Niemi, Timo Hämäläinen 0001 |
Performance evaluation of Secure Remote Password protocol. |
ISCAS (3) |
2002 |
DBLP DOI BibTeX RDF |
|
20 | Jonathan Katz, Rafail Ostrovsky, Moti Yung |
Forward Secrecy in Password-Only Key Exchange Protocols. |
SCN |
2002 |
DBLP DOI BibTeX RDF |
|
20 | Colin Boyd, Paul Montague, Khanh Quoc Nguyen |
Elliptic Curve Based Password Authenticated Key Exchange Protocols. |
ACISP |
2001 |
DBLP DOI BibTeX RDF |
|
20 | Philip D. MacKenzie |
More Efficient Password-Authenticated Key Exchange. |
CT-RSA |
2001 |
DBLP DOI BibTeX RDF |
|
20 | David A. Wagner 0001, Ian Goldberg |
Proofs of Security for the Unix Password Hashing Algorithm. |
ASIACRYPT |
2000 |
DBLP DOI BibTeX RDF |
|
16 | Matthew Canton |
The presence table: a reactive surface for ambient connection. |
TEI |
2011 |
DBLP DOI BibTeX RDF |
|
16 | Elizabeth Stobert |
Usability and strength in click-based graphical passwords. |
CHI Extended Abstracts |
2010 |
DBLP DOI BibTeX RDF |
authentication, usable security, graphical passwords |
16 | Dinei A. F. Florêncio, Cormac Herley |
Where do security policies come from? |
SOUPS |
2010 |
DBLP DOI BibTeX RDF |
|
16 | Nishanth Chandran, Bhavana Kanukurthi, Rafail Ostrovsky, Leonid Reyzin |
Privacy amplification with asymptotically optimal entropy loss. |
STOC |
2010 |
DBLP DOI BibTeX RDF |
entropy loss, information-theoretic key agreement, privacy amplification |
16 | Rubén Vera-Rodríguez, John S. D. Mason, Nicholas W. D. Evans |
Automatic Cross-Biometric Footstep Database Labelling Using Speaker Recognition. |
ICB |
2009 |
DBLP DOI BibTeX RDF |
Automatic database labelling, score normalisation, footstep biometric, speaker verification, multimodal biometrics |
16 | Yang Jian |
An Improved Scheme of Single Sign-on Protocol. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
16 | Shlomi Dolev, Marina Kopeetsky |
Anonymous Transactions in Computer Networks. |
SSS |
2009 |
DBLP DOI BibTeX RDF |
|
16 | Michel Abdalla, Céline Chevalier, David Pointcheval |
Smooth Projective Hashing for Conditionally Extractable Commitments. |
CRYPTO |
2009 |
DBLP DOI BibTeX RDF |
|
16 | Tong-Lee Lim, Tieyan Li |
Exposing an effective denial of information attack from the misuse of EPCglobal standards in an RFID authentication scheme. |
PIMRC |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Cormac Herley, Dinei A. F. Florêncio |
Protecting Financial Institutions from Brute-Force Attacks. |
SEC |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Jeheon Han, Jonghoon Kwon, Heejo Lee |
HoneyID : Unveiling Hidden Spywares by Generating Bogus Events. |
SEC |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Alain Forget |
Helping users create and remember more secure text passwords. |
BCS HCI (2) |
2008 |
DBLP DOI BibTeX RDF |
authentication, games, memory, computer security, passwords, persuasion, usable security |
16 | Sonia Chiasson, Alain Forget, Robert Biddle, Paul C. van Oorschot |
Influencing users towards better passwords: persuasive cued click-points. |
BCS HCI (1) |
2008 |
DBLP DOI BibTeX RDF |
persuasive technology, usable security, graphical passwords |
16 | T. Rakesh Kumar, S. V. Raghavan |
PassPattern System (PPS): A Pattern-Based User Authentication Scheme. |
Networking |
2008 |
DBLP DOI BibTeX RDF |
Security, User Authentication |
16 | Nitin 0001, Durg Singh Chauhan, Vivek Kumar Sehgal, Ankit Mahanot, Pallavi Singh, Sohit Ahuja, Utkarsh Shrivastava, Manisha Rana, Vineet Punjabi, Shivam Vinay, Nakul Sharma |
Security Analysis and Implementation of JUIT-Image Based Authentication System Using Kerberos Protocol. |
ACIS-ICIS |
2008 |
DBLP DOI BibTeX RDF |
Image Based Authentication System, Diffie-Hellman key Exchange, Kerberos Protocol, Keystroke Logging, Tempest Attack, Shoulder Attack, Brute-force Attack, AJAX, MySQL |
16 | Alain Forget, Sonia Chiasson, Paul C. van Oorschot, Robert Biddle |
Persuasion for Stronger Passwords: Motivation and Pilot Study. |
PERSUASIVE |
2008 |
DBLP DOI BibTeX RDF |
authentication, computer security, passwords, Persuasive Technology, usable security |
16 | Jian Wang, Haihang Wang, Chengxiang Tan |
Cryptanalysis and Improvement of an 'Efficient Remote Mutual Authentication and Key Agreement'. |
APSCC |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Golnaz Elahi, Zeev Lieber, Eric S. K. Yu |
Trade-off Analysis of Identity Management Systems with an Untrusted Identity Provider. |
COMPSAC |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Beatriz Porras, Jose A. Cordon, Juan Manuel Olazábal, Cecilia Valero, Elena Álvarez, Laura Bravo, Begoña Sanchez, Alberto Gutierrez, Angela Nuez, Segundo Polanco, Ana Garcia |
LEMAT: A Project for Innovation in Teaching Mathematics. |
ICALT |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Amitava Das, Ohil K. Manyam, Makarand Tapaswi |
Audio-Visual Person Authentication with Multiple Visualized-Speech Features and Multiple Face Profiles. |
ICVGIP |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Sukanya Suwisuthikasem, Songsri Tangsripairoj |
E-Tax Invoice System Using Web Services Technology: A Case Study of the Revenue Department of Thailand. |
SNPD |
2008 |
DBLP DOI BibTeX RDF |
Tax Invoice, Web Services |
16 | Eiji Hayashi, Rachna Dhamija, Nicolas Christin, Adrian Perrig |
Use Your Illusion: secure authentication usable anywhere. |
SOUPS |
2008 |
DBLP DOI BibTeX RDF |
distortion, graphical passwords, social engineering |
16 | Paul Dunphy, James Nicholson, Patrick Olivier |
Securing passfaces for description. |
SOUPS |
2008 |
DBLP DOI BibTeX RDF |
passfaces, graphical passwords, description |
16 | Xiaofeng Wang, Nanning Zheng 0001 |
ID-Based Authenticated Multi-party Key Agreement Protocol to Multimedia Applications Systems. |
CSSE (3) |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Jongpil Jeong, Min Young Chung, Hyunseung Choo |
Integrated OTP-Based User Authentication Scheme Using Smart Cards in Home Networks. |
HICSS |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Malika Izabachène, David Pointcheval |
New Anonymity Notions for Identity-Based Encryption. |
SCN |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Hiroshi Dozono, Masanori Nakakuni |
An integration method of multi-modal biometrics using supervised pareto learning self organizing maps. |
IJCNN |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Youngsook Lee, Junghyun Nam, Dongho Won |
Vulnerabilities in a Remote Agent Authentication Scheme Using Smart Cards. |
KES-AMSTA |
2008 |
DBLP DOI BibTeX RDF |
distributed system, smart card, impersonation attack, authentication scheme |
16 | Ahmed Alazzawe, Anis Nawaz, Duminda Wijesekera |
Extracting Kerberos passwords through RC4-HMAC encryption type analysis. |
AICCSA |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Muhammad Sharif 0001, Tariq Faiz, Mudassar Raza |
Time signatures - an implementation of Keystroke and click patterns for practical and secure authentication. |
ICDIM |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Albert Tannous, Jonathan T. Trostle, Mohamed Hassan, Stephen E. McLaughlin, Trent Jaeger |
New Side Channels Targeted at Passwords. |
ACSAC |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Eylem Kiliç |
"My Money in E-Purse" Searching Problems in Self Service User Interface. |
HCI (4) |
2007 |
DBLP DOI BibTeX RDF |
e-community, Interface design, age |
16 | Sarah Guth |
Wikis in education: : is public better? |
Int. Sym. Wikis |
2007 |
DBLP DOI BibTeX RDF |
blended course development, collective authoring, public wiki |
16 | Imad M. Abbadi |
Digital Rights Management Using a Master Control Device. |
ASIAN |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Katelin Bailey, Linden Vongsathorn, Apu Kapadia, Chris Masone, Sean W. Smith |
TwoKind authentication: usable authenticators for untrustworthy environments. |
SOUPS |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Giovanni Di Crescenzo, Munir Cochinwala, Hyong Sop Shim |
Modeling cryptographic properties of voice and voice-based entity authentication. |
Digital Identity Management |
2007 |
DBLP DOI BibTeX RDF |
modeling human factors, biometrics, voice, entity authentication |
16 | Steffen Hallsteinsen, Ivar Jørstad, Do Van Thanh 0001 |
Using the mobile phone as a security token for unified authentication. |
ICSNC |
2007 |
DBLP DOI BibTeX RDF |
authentcation, mobility |
16 | David Argles, Alex Pease, Robert John Walters |
An Improved Approach to Secure Authentication and Signing. |
AINA Workshops (1) |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Ivan Damgård, Serge Fehr, Louis Salvail, Christian Schaffner |
Secure Identification and QKD in the Bounded-Quantum-Storage Model. |
CRYPTO |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Oded Goldreich 0001, Yehuda Lindell |
Session-Key Generation Using Human Passwords Only. |
J. Cryptol. |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Andrew Teoh Beng Jin, Alwyn Goh, David Ngo Chek Ling |
Random Multispace Quantization as an Analytic Mechanism for BioHashing of Biometric and Random Identity Inputs. |
IEEE Trans. Pattern Anal. Mach. Intell. |
2006 |
DBLP DOI BibTeX RDF |
BioHashing, random multispace quantization, face recognition, Cancellable biometrics |
16 | Jean-Camille Birget, Dawei Hong, Nasir D. Memon |
Graphical passwords based on robust discretization. |
IEEE Trans. Inf. Forensics Secur. |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Massimo Merro, Matthew Hennessy |
A bisimulation-based semantic theory of Safe Ambients. |
ACM Trans. Program. Lang. Syst. |
2006 |
DBLP DOI BibTeX RDF |
distributed systems, Mobile agents, bisimulation |
16 | Maria Teresa Carta, Daniele D. Giusto, Cristian Perra, Barbara Podda |
Exploiting JPEG2000 and Jpip for Image Based Authentication. |
ICIP |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Woojin Chang |
Keystroke Biometric System Using Wavelets. |
ICB |
2006 |
DBLP DOI BibTeX RDF |
Keystroke Biometric System, Key- stroke Authentication, Discrete Wavelet Transform, Keystroke Dynamics |
16 | Xavier Boyen, Hovav Shacham, Emily Shen, Brent Waters |
Forward-secure signatures with untrusted update. |
CCS |
2006 |
DBLP DOI BibTeX RDF |
untrusted storage, digital signatures, forward security, two-factor authentication |
16 | Vladimir Kolesnikov, Charles Rackoff |
Key Exchange Using Passwords and Long Keys. |
TCC |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Marco Pistoia, Francesco Logozzo |
Program Analysis for Security and Privacy. |
ECOOP Workshops |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Kirk H. M. Wong, Yuan Zheng 0001, Jiannong Cao 0001, Shengwei Wang |
A Dynamic User Authentication Scheme for Wireless Sensor Networks. |
SUTC (1) |
2006 |
DBLP DOI BibTeX RDF |
IEEE 802.15.4 Specification, Security, Sensor Networks, User Authentication |
16 | Nick Bartlow, Bojan Cukic |
Evaluating the Reliability of Credential Hardening through Keystroke Dynamics. |
ISSRE |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Dingju Zhu, Jianping Fan 0002 |
An Introduction to Aggregation Grid. |
SKG |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Michiru Tanaka, Yoshimi Teshigawara |
A Method and Its Usability for User Authentication by Utilizing a Matrix Code Reader on Mobile Phones. |
WISA |
2006 |
DBLP DOI BibTeX RDF |
|
16 | A. Sermet Anagun |
Development of Committee Neural Network for Computer Access Security System. |
ICCSA (3) |
2006 |
DBLP DOI BibTeX RDF |
|
16 | SeongHan Shin, Kazukuni Kobara, Hideki Imai |
An Elliptic Curve Based Authenticated Key Agreement Protocol for Wireless Security. |
CIS |
2006 |
DBLP DOI BibTeX RDF |
|
16 | SeongHan Shin, Kazukuni Kobara, Hideki Imai |
Efficient and Leakage-Resilient Authenticated Key Transport Protocol Based on RSA. |
ACNS |
2005 |
DBLP DOI BibTeX RDF |
|
16 | David Del Vecchio, Marty Humphrey, Jim Basney, Nataraj Nagaratnam |
CredEx: User-Centric Credential Management for Grid and Web Services. |
ICWS |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Mike Bazakos, Yunqian Ma, Andrew H. Johnson |
Fast access control technology solutions (FACTS). |
AVSS |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Rachna Dhamija, J. Doug Tygar |
The battle against phishing: Dynamic Security Skins. |
SOUPS |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Serge Vaudenay |
Secure Communications over Insecure Channels Based on Short Authenticated Strings. |
CRYPTO |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Xiaoyuan Suo, Ying Zhu 0001, G. Scott Owen |
Graphical Passwords: A Survey. |
ACSAC |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Zhiguo Wan, Akkihebbal L. Ananda, Robert H. Deng, Feng Bao 0001 |
Anonymous DoS-Resistant Access Control Protocol Using Passwords for Wireless Networks. |
LCN |
2005 |
DBLP DOI BibTeX RDF |
Wireless Networks, Access Control, Security Protocol |
16 | Alen Peacock, Xian Ke, Matthew Wilkerson |
Typing Patterns: A Key to User Identification. |
IEEE Secur. Priv. |
2004 |
DBLP DOI BibTeX RDF |
Keystroke, Security, Pattern Recognition, Authentication, Authentication, Biometrics, Typing, Intellectual Property, User Authentication, network-level security and protection, Security and Privacy Protection, User Identification |
16 | Chun-Nam Chun, Ronald Chung |
Iris Recognition for Palm-Top Application. |
ICBA |
2004 |
DBLP DOI BibTeX RDF |
|
16 | Emmanuel Bresson, Olivier Chevassut, David Pointcheval |
New Security Results on Encrypted Key Exchange. |
Public Key Cryptography |
2004 |
DBLP DOI BibTeX RDF |
|
16 | Scott J. Harper, Peter M. Athanas |
A Security Policy Based upon Hardware Encryption. |
HICSS |
2004 |
DBLP DOI BibTeX RDF |
|
16 | Yong-Guk Kim, Taekyoung Kwon 0002 |
An Authentication Scheme Based Upon Face Recognition for the Mobile Environment. |
CIS |
2004 |
DBLP DOI BibTeX RDF |
|
16 | Philip D. MacKenzie, Michael K. Reiter |
Networked cryptographic devices resilient to capture. |
Int. J. Inf. Sec. |
2003 |
DBLP DOI BibTeX RDF |
Private key protection, Key disabling, Cryptographic protocols, Passwords, Networked devices |
16 | Enzhe Yu, Sungzoon Cho |
Novelty Detection Approach for Keystroke Dynamics Identity Verification. |
IDEAL |
2003 |
DBLP DOI BibTeX RDF |
|
16 | Sanghoon Song, Taekyoung Kwon 0002, Ki Song Yoon |
Practical Security Improvement of PKCS#5. |
ISCIS |
2003 |
DBLP DOI BibTeX RDF |
|
16 | Jonathan Katz |
Efficient and Non-malleable Proofs of Plaintext Knowledge and Applications. |
EUROCRYPT |
2003 |
DBLP DOI BibTeX RDF |
|
16 | Seung Bae Park, Moon Seol Kang, Sang Jun Lee |
Authenticated Key Exchange Protocol Secure against Offline Dictionary Attack and Server Compromise. |
GCC (1) |
2003 |
DBLP DOI BibTeX RDF |
|
16 | Ren-Junn Hwang, Rong-Chi Chang |
Key Agreement in Ad Hoc Networks. |
ISPA |
2003 |
DBLP DOI BibTeX RDF |
|
16 | Benny Pinkas, Tomas Sander |
Securing passwords against dictionary attacks. |
CCS |
2002 |
DBLP DOI BibTeX RDF |
|
16 | Taekyoung Kwon 0002 |
Virtual Software Tokens - A Practical Way to Secure PKI Roaming. |
InfraSec |
2002 |
DBLP DOI BibTeX RDF |
|
16 | Sean Stockburger, Teresa Fernandez |
Virtual onsite support: using internet chat and remote control to improve customer service. |
SIGUCCS |
2002 |
DBLP DOI BibTeX RDF |
lotus, sametime, technology, support, help desk, remote control |
16 | Emmanuel Bresson, Olivier Chevassut, David Pointcheval |
Group Diffie-Hellman Key Exchange Secure against Dictionary Attacks. |
ASIACRYPT |
2002 |
DBLP DOI BibTeX RDF |
|
16 | Joseph Goldberg, Jennifer Hagman, Vibha Sazawal |
Doodling our way to better authentication. |
CHI Extended Abstracts |
2002 |
DBLP DOI BibTeX RDF |
passdoodles, authentication, user study, passwords |
16 | Fabian Monrose, Michael K. Reiter, Qi Li, Susanne Wetzel |
Cryptographic Key Generation from Voice. |
S&P |
2001 |
DBLP DOI BibTeX RDF |
|
16 | Philip D. MacKenzie, Michael K. Reiter |
Networked Cryptographic Devices Resilient to Capture. |
S&P |
2001 |
DBLP DOI BibTeX RDF |
|
16 | Oded Goldreich 0001, Yehuda Lindell |
Session-Key Generation Using Human Passwords Only. |
CRYPTO |
2001 |
DBLP DOI BibTeX RDF |
|