The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for authentication with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1973-1981 (18) 1982-1984 (22) 1985-1986 (22) 1987 (21) 1988 (25) 1989 (33) 1990 (36) 1991 (31) 1992 (40) 1993 (50) 1994 (65) 1995 (55) 1996 (112) 1997 (145) 1998 (98) 1999 (167) 2000 (208) 2001 (294) 2002 (330) 2003 (618) 2004 (905) 2005 (1106) 2006 (1033) 2007 (1140) 2008 (1183) 2009 (1031) 2010 (805) 2011 (788) 2012 (820) 2013 (879) 2014 (955) 2015 (1035) 2016 (1133) 2017 (1173) 2018 (1332) 2019 (1500) 2020 (1379) 2021 (1410) 2022 (1499) 2023 (1523) 2024 (379)
Publication types (Num. hits)
article(10875) book(17) data(3) incollection(161) inproceedings(14078) phdthesis(247) proceedings(17)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 8079 occurrences of 2235 keywords

Results
Found 25398 publication records. Showing 25398 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
23William K. Josephson, Emin Gün Sirer, Fred B. Schneider Peer-to-Peer Authentication with a Distributed Single Sign-On Service. Search on Bibsonomy IPTPS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
23Ali M. Allam 0001, Ibraliim I. Ibrahim, Ihab A. Ali, Abdel-Rahman H. El-Sawy Provably secure entity authentication the three party case. Search on Bibsonomy ISCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
23Young-Gab Kim, Chang-Joo Moon, Dae-Ha Park, Doo-Kwon Baik A MAC-Based Service Bundle Authentication Mechanism in the OSGi Service Platform. Search on Bibsonomy DASFAA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
23Hae Yong Kim, Ricardo L. de Queiroz Alteration-Locating Authentication Watermarking for Binary Images. Search on Bibsonomy IWDW The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
23Yacine Challal, Hatem Bettahar, Abdelmadjid Bouabdallah Hybrid and Adaptive Hash-Chaining Scheme for Data-Streaming Source Authentication. Search on Bibsonomy HSNMC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
23Young Jae Choi, Soon-Ja Kim An Improvement on Privacy and Authentication in GSM. Search on Bibsonomy WISA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
23Mi-Ae Kim, Geun-Sil Song, Won-Hyung Lee A Robust Image Authentication Method Surviving Acceptable Modifications. Search on Bibsonomy ICCSA (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
23Young-Gab Kim, Chang-Joo Moon, Dae-Ha Park, Doo-Kwon Baik A Service Bundle Authentication Mechanism in the OSGi Service Platform. Search on Bibsonomy AINA (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
23Riccardo Focardi Static Analysis of Authentication. Search on Bibsonomy FOSAD The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
23Vivi Oktavia, Won-Hyung Lee A Fragile Watermarking Technique for Image Authentication Using Singular Value Decomposition. Search on Bibsonomy PCM (2) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
23Jung-Min Park 0001, Edwin K. P. Chong, Howard Jay Siegel Efficient multicast stream authentication using erasure codes. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Information Dispersal Algorithm (IDA), multicast, Digital signatures, erasure codes
23William Aiello, John Ioannidis, Patrick D. McDaniel Origin authentication in interdomain routing. Search on Bibsonomy CCS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF address management, security, routing, BGP, delegation
23N. Asokan, Valtteri Niemi, Kaisa Nyberg Man-in-the-Middle in Tunnelled Authentication Protocols. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
23Heba Kamal Aslan AUTHMAC_DH: A New Protocol for Authentication and Key Distribution. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
23Daesung Moon, Youn-Hee Gil, Dosung Ahn, Sung Bum Pan, Yongwha Chung, Chee-Hang Park Fingerprint-Based Authentication for USB Token Systems. Search on Bibsonomy WISA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
23Aldar C.-F. Chan A graph-theoretical analysis of multicast authentication. Search on Bibsonomy ICDCS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
23Su Jung Yu, Joo-Seok Song An Improved Password Authentication Key Exchange Protocol for 802.11 Environment. Search on Bibsonomy ICCSA (2) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
23Cheolhyun Kim, Yeijin Lee, Ilyong Chung The Design of an Efficient Kerberos Authentication Mechanism Associated with Directory Systems. Search on Bibsonomy GCC (1) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
23Sencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jajodia LHAP: A Lightweight Hop-by-Hop Authentication Protocol for Ad-Hoc Networks. Search on Bibsonomy ICDCS Workshops The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
23Kenta Matsumiya, Soko Aoki, Masana Murase, Hideyuki Tokuda Active Authentication for Pervasive Computing Environments. Search on Bibsonomy ISSS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
23Joshua D. Guttman Security Protocol Design via Authentication Tests. Search on Bibsonomy CSFW The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
23Philippa J. Broadfoot, Gavin Lowe Analysing a Stream Authentication Protocol Using Model Checking. Search on Bibsonomy ESORICS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
23Sara K. Miner, Jessica Staddon Graph-Based Authentication of Digital Streams. Search on Bibsonomy S&P The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
23Nalini K. Ratha, Jonathan H. Connell, Ruud M. Bolle An Analysis of Minutiae Matching Strength. Search on Bibsonomy AVBPA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
23Hugo Krawczyk LFSR-based Hashing and Authentication. Search on Bibsonomy CRYPTO The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
23John T. Kohl The use of Encryption in Kerberos for Network Authentication. Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
23Ernest F. Brickell, Douglas R. Stinson Authentication Codes with Multiple Arbiters (Extended Abstract). Search on Bibsonomy EUROCRYPT The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
23Andre Kalamandeen, Adin Scannell, Eyal de Lara, Anmol Sheth, Anthony LaMarca Ensemble: cooperative proximity-based authentication. Search on Bibsonomy MobiSys The full citation details ... 2010 DBLP  DOI  BibTeX  RDF authentication, ensemble, proximity
23Saurabh Panjwani, Edward Cutrell Usably secure, low-cost authentication for mobile banking. Search on Bibsonomy SOUPS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF security, usability, mobile, authentication, banking, paper, developing regions, PIN, ICTD
23Ebrima N. Ceesay, Coimbatore Chandersekaran, William R. Simpson An authentication model for delegation, attribution and least privilege. Search on Bibsonomy PETRA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF WS-*, security assertion markup language (SAML), authentication, authorization, delegation, public key infrastructure, attribution, credentialing, least privilege
23Yong Ki Lee, Lejla Batina, Dave Singelée, Ingrid Verbauwhede Low-cost untraceable authentication protocols for RFID. Search on Bibsonomy WISEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF search protocol, tracking attack, privacy, elliptic curve cryptography, authentication protocol, rfid
23Mike Burmester, Tri Van Le, Breno de Medeiros, Gene Tsudik Universally Composable RFID Identification and Authentication Protocols. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF authentication and key-exchange protocols, universal composability, RFID security
23Emad Eldin Mohamed, Hussein M. Abdel-Wahab Collusion-Resistant Message Authentication in Overlay Multicast Communication. Search on Bibsonomy Trans. Comput. Sci. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Multicast communication, Message authentication, Overlay multicast, Multicast security
23Richa Singh 0001, Mayank Vatsa, Sanjay Kumar Singh, Saurabh Upadhyay Integrating SVM classification with SVD watermarking for intelligent video authentication. Search on Bibsonomy Telecommun. Syst. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Video authentication, Relative correlation, Support vector machine, Watermarking, Singular value decomposition
23Dingyi Pei New Family of Non-Cartesian Perfect Authentication Codes. Search on Bibsonomy IWCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF perfect authentication codes, subfield rational normal curves, partially balanced designs, spoofing attacks
23Karen Renaud, Joseph Maguire 0001 Armchair authentication. Search on Bibsonomy BCS HCI The full citation details ... 2009 DBLP  BibTeX  RDF graphical authentication mechanism, secluded space, context, shared space
23Matthias Krause 0001, Dirk Stegemann More on the Security of Linear RFID Authentication Protocols. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF RFID Authentication, HB ?+?, CKK, CKK 2, Algebraic Attacks, Lightweight Cryptography
23M. L. Dennis Wong, Antionette W.-T. Goh, Hong Siang Chua Medical Image Authentication Using DPT Watermarking: A Preliminary Attempt. Search on Bibsonomy e-Forensics The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Discrete Pascal Transform, Fragile Watermarking, Biomedical Image, Content Authentication
23Paul C. van Oorschot, Tao Wan 0004 TwoStep: An Authentication Method Combining Text and Graphical Passwords. Search on Bibsonomy MCETECH The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Security, Phishing, User Authentication, Graphical Passwords
23Alexander De Luca, Emanuel von Zezschwitz, Heinrich Hußmann Vibrapass: secure authentication based on shared lies. Search on Bibsonomy CHI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF lie input, public terminals, security, authentication
23Clara Cruz-Ramos, Rogelio Reyes-Reyes, Mariko Nakano-Miyatake, Héctor M. Pérez Meana Image Authentication Scheme Based on Self-embedding Watermarking. Search on Bibsonomy CIARP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Self-embedding watermarking, Tamper localization, Image authentication, Tamper detection, Semi-fragile watermarking
23Taiki Sakashita, Yoichi Shibata, Takumi Yamamoto, Kenta Takahashi, Wakaha Ogata, Hiroaki Kikuchi, Masakatsu Nishigaki A Proposal of Efficient Remote Biometric Authentication Protocol. Search on Bibsonomy IWSEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF zero knowledge interactive proof, secret computing, authentication, biometrics
23Youngsook Lee, Dongho Won Security Vulnerabilities of a Remote User Authentication Scheme Using Smart Cards Suited for a Multi-server Environment. Search on Bibsonomy ICCSA (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF multi-server environments, remote user authentication scheme, smart card, impersonation attack, password security, password guessing attack
23Al-Sakib Khan Pathan, Choong Seon Hong Bilinear-pairing-based remote user authentication schemes using smart cards. Search on Bibsonomy ICUIMC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF bilateral, authentication, smart card, remote, bilinear
23Dae-Hee Seo, Jang-Mi Baek, Dong-Sub Cho Secure RFID authentication scheme for EPC class Gen2. Search on Bibsonomy ICUIMC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF security, authentication, RFID
23Manuel Barbosa, Pooya Farshim Security Analysis of Standard Authentication and Key Agreement Protocols Utilising Timestamps. Search on Bibsonomy AFRICACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Key Agreement, Timestamp, Entity Authentication
23Youngho Park 0004, Chul Sur, Chae Duk Jung, Kyung Hyune Rhee Efficient Anonymous Authentication Protocol Using Key-Insulated Signature Scheme for Secure VANET. Search on Bibsonomy MOBILIGHT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF key-insulated signature, security, authentication, anonymous, vehicular network
23Chin-Hung Wang, Tzu-Chieh Wei, Po-Chin Lee, Chia-Chun Wu An improvement of secure authentication scheme with full anonymity for wireless communications. Search on Bibsonomy ICIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF network security, anonymity, wireless communications, user authentication
23Fuw-Yi Yang, Tzung-Da Wu, Ming-Huei Hsu Improvement of Hölbl et al. user authentication protocol and password change protocol. Search on Bibsonomy iiWAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Diffie-Hellmen, hash functions, password, remote authentication
23Shaoying Cai, Yingjiu Li, Tieyan Li, Robert H. Deng Attacks and improvements to an RIFD mutual authentication protocol and its extensions. Search on Bibsonomy WISEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF security, privacy, authentication, rfid
23Katharine Chang, Kang G. Shin Distributed Authentication of Program Integrity Verification in Wireless Sensor Networks. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Distributed authentication, node revocation, program integrity verification, wireless sensor networks
23Yong Xi, Kewei Sha, Weisong Shi, Loren Schwiebert, Tao Zhang 0005 Probabilistic Adaptive Anonymous Authentication in Vehicular Networks. Search on Bibsonomy J. Comput. Sci. Technol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF adaptive anonymity, privacy, vehicular network, anonymous authentication
23Rolf Oppliger, Ralf Hauser, David A. Basin SSL/TLS Session-Aware User Authentication. Search on Bibsonomy Computer The full citation details ... 2008 DBLP  DOI  BibTeX  RDF man-in-the-middle (MITM) attacks, SSL/TLS protocols, security, user authentication
23Tianjie Cao, Peng Shen, Elisa Bertino Cryptanalysis of the LCSS RFID Authentication Protocol. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Authentication, RFID, Cryptanalysis
23Eun-Jun Yoon, Kee-Young Yoo An Efficient Authentication and Key Agreement Protocol in RFID System. Search on Bibsonomy NPC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Authentication, Security protocol, Key agreement, RFID system, Session key
23T. Rakesh Kumar, S. V. Raghavan PassPattern System (PPS): A Pattern-Based User Authentication Scheme. Search on Bibsonomy Networking The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Security, User Authentication
23Nitin 0001, Durg Singh Chauhan, Vivek Kumar Sehgal, Ankit Mahanot, Pallavi Singh, Sohit Ahuja, Utkarsh Shrivastava, Manisha Rana, Vineet Punjabi, Shivam Vinay, Nakul Sharma Security Analysis and Implementation of JUIT-Image Based Authentication System Using Kerberos Protocol. Search on Bibsonomy ACIS-ICIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Image Based Authentication System, Diffie-Hellman key Exchange, Kerberos Protocol, Keystroke Logging, Tempest Attack, Shoulder Attack, Brute-force Attack, AJAX, MySQL
23Ali Nasrat Haidar, Ali E. Abdallah Weaving Authentication and Authorization Requirements into the Functional Model of a System Using Z Promotion. Search on Bibsonomy ISoLA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Weaving Security into Functional Models, Z Promotion, Authentication, Authorization, Security Requirements, Z specification
23Arjan Durresi, Mimoza Durresi, Leonard Barolli Secure Spatial Authentication for Mobile Stations In Hybrid 3G-WLAN Serving Networks. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Location authentication, Communications, WLAN, Hybrid, cellular
23Marko Hölbl, Tatjana Welzer Cryptanalysis and Improvement of an "Improved Remote Authentication Scheme with Smart Card". Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF off-line password guessing attack, authentication, smart card, password
23Muhammad Daniel Hafiz Abdullah, Abdul Hanan Abdullah, Norafida Ithnin, Hazinah Kutty Mammi Towards Identifying Usability and Security Features of Graphical Password in Knowledge Based Authentication Technique. Search on Bibsonomy Asia International Conference on Modelling and Simulation The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Security, Usability, Authentication, Password, Graphical Password
23Eun-Jun Yoon, Eun-Jung Lee, Kee-Young Yoo Cryptanalysis of Wang et al.'s Remote User Authentication Scheme Using Smart Cards. Search on Bibsonomy ITNG The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Authentication, Cryptography, Cryptanalysis, Smart card, Password, Session key
23Zhiwei Yan, Huachun Zhou, Hongke Zhang, Hongbin Luo, Sidong Zhang A dual threshold-based fast vertical handover scheme with authentication support. Search on Bibsonomy Mobility Conference The full citation details ... 2008 DBLP  DOI  BibTeX  RDF authentication, vertical handover, MIPv6, MIH
23Erdinç Öztürk, Ghaith Hammouri, Berk Sunar Towards Robust Low Cost Authentication for Pervasive Devices. Search on Bibsonomy PerCom The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Low power authentication, tamperproof chips, sensor networks, RFIDs, smartcards, physical unclonable functions
23Tobias Heer, Stefan Götz 0001, Oscar García Morchon, Klaus Wehrle ALPHA: an adaptive and lightweight protocol for hop-by-hop authentication. Search on Bibsonomy CoNEXT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF integrity protection, authentication, hash chains
23Rajat Subhra Chakraborty, Swarup Bhunia Hardware protection and authentication through netlist level obfuscation. Search on Bibsonomy ICCAD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF IP piracy, design for security, hardware authentication, hardware obfuscation, hardware protection
23Manuel Barbosa, Thierry Brouard, Stéphane Cauchie, Simão Melo de Sousa Secure Biometric Authentication with Improved Accuracy. Search on Bibsonomy ACISP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Secure Biometric Authentication, Cryptography, Classifier
23Liting Zhang, Wenling Wu, Peng Wang 0009 Extended Models for Message Authentication. Search on Bibsonomy ICISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Provable Security, Side Channel Attack, Security Model, Message Authentication
23Dae-Hee Seo, Jang-Mi Baek, Dong-Sub Cho Secure authentication and management scheme for RFID. Search on Bibsonomy Q2SWinet The full citation details ... 2008 DBLP  DOI  BibTeX  RDF authentication, management, RFID tag, ubiquitous environment
23Khaled Ouafi, Raphael C.-W. Phan Privacy of Recent RFID Authentication Protocols. Search on Bibsonomy ISPEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF privacy, RFID, provably secure, authentication protocols, untraceability
23Julien Bringer, Hervé Chabanne An Authentication Protocol with Encrypted Biometric Data. Search on Bibsonomy AFRICACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Private Information Retrieval protocol, Privacy, Authentication, Biometrics, Secure Sketches
23Marcos Ortega, Manuel G. Penedo, Cástor Mariño, María J. Carreira Similarity Metrics Analysis for Feature Point Based Retinal Authentication. Search on Bibsonomy ICIAR The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Authentication System, Biometric Pattern, Feature point matching, Similarity Measure, Retinal Images
23Niladri B. Puhan, Anthony T. S. Ho Secure authentication watermarking for localization against the Holliman-Memon attack. Search on Bibsonomy Multim. Syst. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Fragile authentication, Holliman-Memon attack, Authenticity score, Security, Localization, Digital watermarking
23Marcos Faúndez-Zanuy, David A. Elizondo, Miguel Angel Ferrer-Ballester, Carlos Manuel Travieso-González Authentication of Individuals using Hand Geometry Biometrics: A Neural Network Approach. Search on Bibsonomy Neural Process. Lett. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Biometrical features, Authentication of individual, Neural network, Feature extraction, Biometrics, Feature identification, Hand geometry
23Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng Ning Interleaved hop-by-hop authentication against false data injection attacks in sensor networks. Search on Bibsonomy ACM Trans. Sens. Networks The full citation details ... 2007 DBLP  DOI  BibTeX  RDF filtering false data, interleaved hop-by-hop, sensor networks, Authentication
23Hung-Yu Chien, Chen-Wei Huang Security of ultra-lightweight RFID authentication protocols and its improvements. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security, privacy, authentication, RFID, desynchronization
23Cheng-Huang Jiang, Shiuhpyng Shieh, Jen-Chien Liu Keystroke statistical learning model for web authentication. Search on Bibsonomy AsiaCCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF keystroke, hidden Markov model, statistical learning theory, Gaussian model, web authentication
23Dongvu Tonien, Reihaneh Safavi-Naini, Peter R. Wild Combinatorial characterizations of authentication codes in verification oracle model. Search on Bibsonomy AsiaCCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF active adversary model, combinatorial bounds, unconditional security, authentication codes
23Tri Van Le, Mike Burmester, Breno de Medeiros Universally composable and forward-secure RFID authentication and authenticated key exchange. Search on Bibsonomy AsiaCCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF RFID authentication and key-exchange protocols, anonymity, forward-security, universal composability
23Irfan Ahmed 0001, Usman Tariq, Shoaib Mukhtar, Kyung-suk Lhee, S. W. Yoo, Piao Yanji, Manpyo Hong Binding Update Authentication Scheme for Mobile IPv6. Search on Bibsonomy IAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Care-of-Address Validation, Binding Update Authentication, Key Management, Mobile IPv6, Route Optimization
23Shaoquan Jiang Deniable Authentication on the Internet. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Authentication, Protocol, Key Exchange, Deniability
23Joon Wan Kim, Yong Ho Kim, Hwaseong Lee, Dong Hoon Lee 0001 A Practical Inter-sensor Broadcast Authentication Scheme. Search on Bibsonomy HCI (5) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security, wireless sensor network, authentication
23Hyeonjoon Moon, Kisung Lee Biometric Driver Authentication Based on 3D Face Recognition for Telematics Applications. Search on Bibsonomy HCI (5) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF driver authentication, driver identification, telematics application, biometrics, 3D Model, 3D face recognition
23Timothy W. van der Horst, Kent E. Seamons Simple authentication for the web. Search on Bibsonomy WWW The full citation details ... 2007 DBLP  DOI  BibTeX  RDF password alternative, web single sign-on, authentication
23Laurie A. Jones, Annie I. Antón, Julia Brande Earp Towards understanding user perceptions of authentication technologies. Search on Bibsonomy WPES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF authentication, biometrics, tokens, digital identities, user perceptions
23Katerina Stamou, Fredrik Hedman, Anthony Iliopoulos Extending UNICORE 5 Authentication Model by Supporting Proxy Certificate Profile Extensions. Search on Bibsonomy Euro-Par Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF RFC 3280, authentication, grid, interoperability, authorization, X.509, UNICORE, proxy certificates
23Hyeonjoon Moon, Taehwa Hong Biometric User Authentication Based on 3D Face Recognition Under Ubiquitous Computing Environment. Search on Bibsonomy ICIC (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF ubiquitous computing, verification, mobile device, biometrics, identification, 3D Model, user authentication, 3D face recognition
23Hyungkyu Lee, Jongwook Han, Kyoil Chung Security Architecture for Authentication and Authorization in the Intelligent and Ubiquitous Home Network. Search on Bibsonomy ICIC (3) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Public Key mechanism, Symmetric Key Mechanism, Multi-home roaming, Authentication, Authorization, Certificate, Home network
23Lin Yang, Xinghua Ruan, Jingdong Xu, Gongyi Wu Secure Enterprise Information Systems: A Mutual Authentication Scheme for Roaming Users Using Memorable Information. Search on Bibsonomy CONFENIS (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Security, Privacy, Trust, Password, Enterprise information systems, Identity-based cryptography, Mutual authentication
23Eun-Jun Yoon, Wan-Soo Lee, Kee-Young Yoo Secure Remote User Authentication Scheme Using Bilinear Pairings. Search on Bibsonomy WISTP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Authentication, Cryptanalysis, Smart card, Password, Bilinear pairings, Key agreement
23Takahiro Matsuda 0002, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai A Practical Provider Authentication System for Bidirectional Broadcast Service. Search on Bibsonomy KES (3) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF provider authentication, bidirectional broadcasting, key-insulated signature, digital signature
23Christophe Tartary, Huaxiong Wang Combining Prediction Hashing and MDS Codes for Efficient Multicast Stream Authentication. Search on Bibsonomy ACISP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Adversarial Network, Prediction Hashing, Erasure Codes, Hash Chains, Stream Authentication, Polynomial Reconstruction
23R. J. Hulsebosch, Mortaza S. Bargh, Gabriele Lenzini, P. W. G. Ebben, Sorin M. Iacob Context Sensitive Adaptive Authentication. Search on Bibsonomy EuroSSC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF adaptive, Authentication, context awareness, probability
23Basel Alomair, Loukas Lazos, Radha Poovendran Passive Attacks on a Class of Authentication Protocols for RFID. Search on Bibsonomy ICISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF passive attack, privacy, authentication, RFID
23Chun-I Fan, Vincent Shi-Ming Huang Anonymous Authentication Protocols with Credit-Based Chargeability and Fair Privacy for Mobile Communications. Search on Bibsonomy IWSEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Fair Privacy, Ubiquitous Computing, Cryptography, Anonymity, Mobile Networks, Mutual Authentication
23Insun Lee, Jihoon Lee, William A. Arbaugh, Daeyoung Kim 0001 Dynamic Distributed Authentication Scheme for Wireless LAN-Based Mesh Networks. Search on Bibsonomy ICOIN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Distributed authentication, WLAN, Wireless Mesh network
23Nai-Wei Lo, Kuo-Hui Yeh An Efficient Mutual Authentication Scheme for EPCglobal Class-1 Generation-2 RFID System. Search on Bibsonomy EUC Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Authentication, RFID, Data Security, Location Privacy, EPCglobal, CRC
23Pedro Peris-Lopez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda An Efficient Authentication Protocol for RFID Systems Resistant to Active Attacks. Search on Bibsonomy EUC Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF IUC, Light-weight Hash functions, Security, Authentication, RFID, Active-attacks
23Di Ma, Gene Tsudik Extended Abstract: Forward-Secure Sequential Aggregate Authentication. Search on Bibsonomy S&P The full citation details ... 2007 DBLP  DOI  BibTeX  RDF key compromise, sensors, forward security, signature schemes, authentication schemes, aggregate signatures
23Zhen-Ai Jin, Hyun-Ju Cho, Kee-Young Yoo An Efficient Authentication Protocol for Low-Cost RFID Systems. Search on Bibsonomy KES-AMSTA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security, Authentication, RFID, location privacy, symmetric encryption
Displaying result #601 - #700 of 25398 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license