|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 8079 occurrences of 2235 keywords
|
|
|
Results
Found 25398 publication records. Showing 25398 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
23 | William K. Josephson, Emin Gün Sirer, Fred B. Schneider |
Peer-to-Peer Authentication with a Distributed Single Sign-On Service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPTPS ![In: Peer-to-Peer Systems III, Third International Workshop, IPTPS 2004, La Jolla, CA, USA, February 26-27, 2004, Revised Selected Papers, pp. 250-258, 2004, Springer, 3-540-24252-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
23 | Ali M. Allam 0001, Ibraliim I. Ibrahim, Ihab A. Ali, Abdel-Rahman H. El-Sawy |
Provably secure entity authentication the three party case. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the 9th IEEE Symposium on Computers and Communications (ISCC 2006), June 28 - July 1, 2004, Alexandria, Egypt, pp. 381-385, 2004, IEEE Computer Society, 0-7803-8623-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
23 | Young-Gab Kim, Chang-Joo Moon, Dae-Ha Park, Doo-Kwon Baik |
A MAC-Based Service Bundle Authentication Mechanism in the OSGi Service Platform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DASFAA ![In: Database Systems for Advances Applications, 9th International Conference, DASFAA 2004, Jeju Island, Korea, March 17-19, 2004, Proceedings, pp. 137-145, 2004, Springer, 3-540-21047-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
23 | Hae Yong Kim, Ricardo L. de Queiroz |
Alteration-Locating Authentication Watermarking for Binary Images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWDW ![In: Digital Watermarking, Third InternationalWorkshop, IWDW 2004, Seoul, SouthKorea, October 30 - November 1, 2004, Revised Selected Papers, pp. 125-136, 2004, Springer, 3-540-24839-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
23 | Yacine Challal, Hatem Bettahar, Abdelmadjid Bouabdallah |
Hybrid and Adaptive Hash-Chaining Scheme for Data-Streaming Source Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HSNMC ![In: High Speed Networks and Multimedia Communications, 7th IEEE International Conference, HSNMC 2004, Toulouse, France, June 30 - July 2, 2004, Proceedings, pp. 1056-1067, 2004, Springer, 3-540-22262-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
23 | Young Jae Choi, Soon-Ja Kim |
An Improvement on Privacy and Authentication in GSM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers, pp. 14-26, 2004, Springer, 3-540-24015-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
23 | Mi-Ae Kim, Geun-Sil Song, Won-Hyung Lee |
A Robust Image Authentication Method Surviving Acceptable Modifications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (1) ![In: Computational Science and Its Applications - ICCSA 2004, International Conference, Assisi, Italy, May 14-17, 2004, Proceedings, Part I, pp. 722-727, 2004, Springer, 3-540-22054-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
23 | Young-Gab Kim, Chang-Joo Moon, Dae-Ha Park, Doo-Kwon Baik |
A Service Bundle Authentication Mechanism in the OSGi Service Platform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA (1) ![In: 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 29-31 March 2004, Fukuoka, Japan, pp. 420-425, 2004, IEEE Computer Society, 0-7695-2051-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
23 | Riccardo Focardi |
Static Analysis of Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOSAD ![In: Foundations of Security Analysis and Design III, FOSAD 2004/2005 Tutorial Lectures, pp. 109-132, 2004, Springer, 3-540-28955-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
23 | Vivi Oktavia, Won-Hyung Lee |
A Fragile Watermarking Technique for Image Authentication Using Singular Value Decomposition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PCM (2) ![In: Advances in Multimedia Information Processing - PCM 2004, 5th Pacific Rim Conference on Multimedia, Tokyo, Japan, November 30 - December 3, 2004, Proceedings, Part II, pp. 42-49, 2004, Springer, 3-540-23977-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
23 | Jung-Min Park 0001, Edwin K. P. Chong, Howard Jay Siegel |
Efficient multicast stream authentication using erasure codes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 6(2), pp. 258-285, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Information Dispersal Algorithm (IDA), multicast, Digital signatures, erasure codes |
23 | William Aiello, John Ioannidis, Patrick D. McDaniel |
Origin authentication in interdomain routing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003, Washington, DC, USA, October 27-30, 2003, pp. 165-178, 2003, ACM, 1-58113-738-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
address management, security, routing, BGP, delegation |
23 | N. Asokan, Valtteri Niemi, Kaisa Nyberg |
Man-in-the-Middle in Tunnelled Authentication Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers, pp. 28-41, 2003, Springer, 3-540-28389-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
23 | Heba Kamal Aslan |
AUTHMAC_DH: A New Protocol for Authentication and Key Distribution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Communications and Multimedia Security ![In: Communications and Multimedia Security - Advanced Techniques for Network and Data Protection, 7th IFIP TC-6 TC-11 International Conference, CMS 2003, Torino, Italy, October 2-3, 2003, Proceedings, pp. 14-26, 2003, Springer, 3-540-20185-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
23 | Daesung Moon, Youn-Hee Gil, Dosung Ahn, Sung Bum Pan, Yongwha Chung, Chee-Hang Park |
Fingerprint-Based Authentication for USB Token Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 4th International Workshop, WISA 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers, pp. 355-364, 2003, Springer, 3-540-20827-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
23 | Aldar C.-F. Chan |
A graph-theoretical analysis of multicast authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS ![In: 23rd International Conference on Distributed Computing Systems (ICDCS 2003), 19-22 May 2003, Providence, RI, USA, pp. 155-162, 2003, IEEE Computer Society, 0-7695-1920-2. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
23 | Su Jung Yu, Joo-Seok Song |
An Improved Password Authentication Key Exchange Protocol for 802.11 Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (2) ![In: Computational Science and Its Applications - ICCSA 2003, International Conference, Montreal, Canada, May 18-21, 2003, Proceedings, Part II, pp. 201-209, 2003, Springer, 3-540-40161-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
23 | Cheolhyun Kim, Yeijin Lee, Ilyong Chung |
The Design of an Efficient Kerberos Authentication Mechanism Associated with Directory Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GCC (1) ![In: Grid and Cooperative Computing, Second International Workshop, GCC 2003, Shanghai, China, December 7-10, 2003, Revised Papers, Part I, pp. 972-979, 2003, Springer, 3-540-21988-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
23 | Sencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jajodia |
LHAP: A Lightweight Hop-by-Hop Authentication Protocol for Ad-Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS Workshops ![In: 23rd International Conference on Distributed Computing Systems Workshops (ICDCS 2003 Workshops), 19-22 May 2003, Providence, RI, USA, pp. 749-, 2003, IEEE Computer Society, 0-7695-1921-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
23 | Kenta Matsumiya, Soko Aoki, Masana Murase, Hideyuki Tokuda |
Active Authentication for Pervasive Computing Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSS ![In: Software Security -- Theories and Systems, Mext-NSF-JSPS International Symposium, ISSS 2002, Tokyo, Japan, November 8-10, 2002, Revised Papers, pp. 28-41, 2002, Springer, 3-540-00708-3. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
23 | Joshua D. Guttman |
Security Protocol Design via Authentication Tests. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 15th IEEE Computer Security Foundations Workshop (CSFW-15 2002), 24-26 June 2002, Cape Breton, Nova Scotia, Canada, pp. 92-103, 2002, IEEE Computer Society, 0-7695-1689-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
23 | Philippa J. Broadfoot, Gavin Lowe |
Analysing a Stream Authentication Protocol Using Model Checking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2002, 7th European Symposium on Research in Computer Security, Zurich, Switzerland, October 14-16, 2002, Proceedings, pp. 146-161, 2002, Springer, 3-540-44345-2. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
23 | Sara K. Miner, Jessica Staddon |
Graph-Based Authentication of Digital Streams. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 2001 IEEE Symposium on Security and Privacy, Oakland, California, USA May 14-16, 2001, pp. 232-246, 2001, IEEE Computer Society, 0-7695-1046-9. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
23 | Nalini K. Ratha, Jonathan H. Connell, Ruud M. Bolle |
An Analysis of Minutiae Matching Strength. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AVBPA ![In: Audio- and Video-Based Biometric Person Authentication, Third International Conference, AVBPA 2001 Halmstad, Sweden, June 6-8, 2001, Proceedings, pp. 223-228, 2001, Springer, 3-540-42216-1. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
23 | Hugo Krawczyk |
LFSR-based Hashing and Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '94, 14th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1994, Proceedings, pp. 129-139, 1994, Springer, 3-540-58333-5. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
23 | John T. Kohl |
The use of Encryption in Kerberos for Network Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings, pp. 35-43, 1989, Springer, 3-540-97317-6. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
23 | Ernest F. Brickell, Douglas R. Stinson |
Authentication Codes with Multiple Arbiters (Extended Abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '88, Workshop on the Theory and Application of of Cryptographic Techniques, Davos, Switzerland, May 25-27, 1988, Proceedings, pp. 51-55, 1988, Springer, 3-540-50251-3. The full citation details ...](Pics/full.jpeg) |
1988 |
DBLP DOI BibTeX RDF |
|
23 | Andre Kalamandeen, Adin Scannell, Eyal de Lara, Anmol Sheth, Anthony LaMarca |
Ensemble: cooperative proximity-based authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiSys ![In: Proceedings of the 8th International Conference on Mobile Systems, Applications, and Services (MobiSys 2010), San Francisco, California, USA, June 15-18, 2010, pp. 331-344, 2010, ACM, 978-1-60558-985-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
authentication, ensemble, proximity |
23 | Saurabh Panjwani, Edward Cutrell |
Usably secure, low-cost authentication for mobile banking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOUPS ![In: Proceedings of the Sixth Symposium on Usable Privacy and Security, SOUPS 2010, Redmond, Washington, USA, July 14-16, 2010, 2010, ACM, 978-1-4503-0264-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
security, usability, mobile, authentication, banking, paper, developing regions, PIN, ICTD |
23 | Ebrima N. Ceesay, Coimbatore Chandersekaran, William R. Simpson |
An authentication model for delegation, attribution and least privilege. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PETRA ![In: Proceedings of the 3rd International Conference on Pervasive Technologies Related to Assistive Environments, PETRA 2010, Samos, Greece, June 23-25, 2010, 2010, ACM, 978-1-4503-0071-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
WS-*, security assertion markup language (SAML), authentication, authorization, delegation, public key infrastructure, attribution, credentialing, least privilege |
23 | Yong Ki Lee, Lejla Batina, Dave Singelée, Ingrid Verbauwhede |
Low-cost untraceable authentication protocols for RFID. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Third ACM Conference on Wireless Network Security, WISEC 2010, Hoboken, New Jersey, USA, March 22-24, 2010, pp. 55-64, 2010, ACM, 978-1-60558-923-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
search protocol, tracking attack, privacy, elliptic curve cryptography, authentication protocol, rfid |
23 | Mike Burmester, Tri Van Le, Breno de Medeiros, Gene Tsudik |
Universally Composable RFID Identification and Authentication Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 12(4), pp. 21:1-21:33, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
authentication and key-exchange protocols, universal composability, RFID security |
23 | Emad Eldin Mohamed, Hussein M. Abdel-Wahab |
Collusion-Resistant Message Authentication in Overlay Multicast Communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Trans. Comput. Sci. ![In: Transactions on Computational Science IV, Special Issue on Security in Computing, pp. 53-67, 2009, Springer, 978-3-642-01003-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Multicast communication, Message authentication, Overlay multicast, Multicast security |
23 | Richa Singh 0001, Mayank Vatsa, Sanjay Kumar Singh, Saurabh Upadhyay |
Integrating SVM classification with SVD watermarking for intelligent video authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Telecommun. Syst. ![In: Telecommun. Syst. 40(1-2), pp. 5-15, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Video authentication, Relative correlation, Support vector machine, Watermarking, Singular value decomposition |
23 | Dingyi Pei |
New Family of Non-Cartesian Perfect Authentication Codes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWCC ![In: Coding and Cryptology, Second International Workshop, IWCC 2009, Zhangjiajie, China, June 1-5, 2009. Proceedings, pp. 188-201, 2009, Springer, 978-3-642-01813-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
perfect authentication codes, subfield rational normal curves, partially balanced designs, spoofing attacks |
23 | Karen Renaud, Joseph Maguire 0001 |
Armchair authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BCS HCI ![In: Proceedings of the 2009 British Computer Society Conference on Human-Computer Interaction, BCS-HCI 2009, Cambridge, United Kingdom, 1-5 September 2009, pp. 388-397, 2009, ACM. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
graphical authentication mechanism, secluded space, context, shared space |
23 | Matthias Krause 0001, Dirk Stegemann |
More on the Security of Linear RFID Authentication Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 16th Annual International Workshop, SAC 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers, pp. 182-196, 2009, Springer, 978-3-642-05443-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
RFID Authentication, HB ?+?, CKK, CKK 2, Algebraic Attacks, Lightweight Cryptography |
23 | M. L. Dennis Wong, Antionette W.-T. Goh, Hong Siang Chua |
Medical Image Authentication Using DPT Watermarking: A Preliminary Attempt. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: Forensics in Telecommunications, Information and Multimedia, Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers, pp. 42-53, 2009, Springer, 978-3-642-02311-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Discrete Pascal Transform, Fragile Watermarking, Biomedical Image, Content Authentication |
23 | Paul C. van Oorschot, Tao Wan 0004 |
TwoStep: An Authentication Method Combining Text and Graphical Passwords. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MCETECH ![In: E-Technologies: Innovation in an Open World, 4th International Conference, MCETECH 2009, Ottawa, Canada, May 4-6, 2009. Proceedings, pp. 233-239, 2009, Springer, 978-3-642-01186-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Security, Phishing, User Authentication, Graphical Passwords |
23 | Alexander De Luca, Emanuel von Zezschwitz, Heinrich Hußmann |
Vibrapass: secure authentication based on shared lies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI ![In: Proceedings of the 27th International Conference on Human Factors in Computing Systems, CHI 2009, Boston, MA, USA, April 4-9, 2009, pp. 913-916, 2009, ACM, 978-1-60558-246-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
lie input, public terminals, security, authentication |
23 | Clara Cruz-Ramos, Rogelio Reyes-Reyes, Mariko Nakano-Miyatake, Héctor M. Pérez Meana |
Image Authentication Scheme Based on Self-embedding Watermarking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIARP ![In: Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications, 14th Iberoamerican Conference on Pattern Recognition, CIARP 2009, Guadalajara, Jalisco, Mexico, November 15-18, 2009. Proceedings, pp. 1005-1012, 2009, Springer, 978-3-642-10267-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Self-embedding watermarking, Tamper localization, Image authentication, Tamper detection, Semi-fragile watermarking |
23 | Taiki Sakashita, Yoichi Shibata, Takumi Yamamoto, Kenta Takahashi, Wakaha Ogata, Hiroaki Kikuchi, Masakatsu Nishigaki |
A Proposal of Efficient Remote Biometric Authentication Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security, 4th International Workshop on Security, IWSEC 2009, Toyama, Japan, October 28-30, 2009, Proceedings, pp. 212-227, 2009, Springer, 978-3-642-04845-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
zero knowledge interactive proof, secret computing, authentication, biometrics |
23 | Youngsook Lee, Dongho Won |
Security Vulnerabilities of a Remote User Authentication Scheme Using Smart Cards Suited for a Multi-server Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (2) ![In: Computational Science and Its Applications - ICCSA 2009, International Conference, Seoul, Korea, June 29-July 2, 2009, Proceedings, Part II, pp. 164-172, 2009, Springer, 978-3-642-02456-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
multi-server environments, remote user authentication scheme, smart card, impersonation attack, password security, password guessing attack |
23 | Al-Sakib Khan Pathan, Choong Seon Hong |
Bilinear-pairing-based remote user authentication schemes using smart cards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICUIMC ![In: Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, ICUIMC 2009, Suwon, Korea, January 15-16, 2009, pp. 356-361, 2009, ACM, 978-1-60558-405-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
bilateral, authentication, smart card, remote, bilinear |
23 | Dae-Hee Seo, Jang-Mi Baek, Dong-Sub Cho |
Secure RFID authentication scheme for EPC class Gen2. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICUIMC ![In: Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, ICUIMC 2009, Suwon, Korea, January 15-16, 2009, pp. 221-227, 2009, ACM, 978-1-60558-405-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
security, authentication, RFID |
23 | Manuel Barbosa, Pooya Farshim |
Security Analysis of Standard Authentication and Key Agreement Protocols Utilising Timestamps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AFRICACRYPT ![In: Progress in Cryptology - AFRICACRYPT 2009, Second International Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25, 2009. Proceedings, pp. 235-253, 2009, Springer, 978-3-642-02383-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Key Agreement, Timestamp, Entity Authentication |
23 | Youngho Park 0004, Chul Sur, Chae Duk Jung, Kyung Hyune Rhee |
Efficient Anonymous Authentication Protocol Using Key-Insulated Signature Scheme for Secure VANET. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MOBILIGHT ![In: Mobile Lightweight Wireless Systems, First International ICST Conference, MOBILIGHT 2009, Athens, Greece, May 18-20, 2009, Revised Selected Papers, pp. 35-44, 2009, Springer, 978-3-642-03818-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
key-insulated signature, security, authentication, anonymous, vehicular network |
23 | Chin-Hung Wang, Tzu-Chieh Wei, Po-Chin Lee, Chia-Chun Wu |
An improvement of secure authentication scheme with full anonymity for wireless communications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIS ![In: Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human (ICIS 2009), Seoul, Korea, 24-26 November 2009, pp. 115-118, 2009, ACM, 978-1-60558-710-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
network security, anonymity, wireless communications, user authentication |
23 | Fuw-Yi Yang, Tzung-Da Wu, Ming-Huei Hsu |
Improvement of Hölbl et al. user authentication protocol and password change protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
iiWAS ![In: iiWAS'2009 - The Eleventh International Conference on Information Integration and Web-based Applications and Services, 14-16 December 2009, Kuala Lumpur, Malaysia, pp. 155-159, 2009, ACM, 978-1-60558-660-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Diffie-Hellmen, hash functions, password, remote authentication |
23 | Shaoying Cai, Yingjiu Li, Tieyan Li, Robert H. Deng |
Attacks and improvements to an RIFD mutual authentication protocol and its extensions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Second ACM Conference on Wireless Network Security, WISEC 2009, Zurich, Switzerland, March 16-19, 2009, pp. 51-58, 2009, ACM, 978-1-60558-460-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
security, privacy, authentication, rfid |
23 | Katharine Chang, Kang G. Shin |
Distributed Authentication of Program Integrity Verification in Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 11(3), pp. 14:1-14:35, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Distributed authentication, node revocation, program integrity verification, wireless sensor networks |
23 | Yong Xi, Kewei Sha, Weisong Shi, Loren Schwiebert, Tao Zhang 0005 |
Probabilistic Adaptive Anonymous Authentication in Vehicular Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Sci. Technol. ![In: J. Comput. Sci. Technol. 23(6), pp. 916-928, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
adaptive anonymity, privacy, vehicular network, anonymous authentication |
23 | Rolf Oppliger, Ralf Hauser, David A. Basin |
SSL/TLS Session-Aware User Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 41(3), pp. 59-65, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
man-in-the-middle (MITM) attacks, SSL/TLS protocols, security, user authentication |
23 | Tianjie Cao, Peng Shen, Elisa Bertino |
Cryptanalysis of the LCSS RFID Authentication Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISECS ![In: Proceedings of The International Symposium on Electronic Commerce and Security, ISECS 2008, August 3-5, 2008, Guangzhou, China, pp. 305-309, 2008, IEEE Computer Society, 978-0-7695-3258-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Authentication, RFID, Cryptanalysis |
23 | Eun-Jun Yoon, Kee-Young Yoo |
An Efficient Authentication and Key Agreement Protocol in RFID System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NPC ![In: Network and Parallel Computing, IFIP International Conference, NPC 2008, Shanghai, China, October 18-20, 2008. Proceedings, pp. 320-326, 2008, Springer, 978-3-540-88139-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Authentication, Security protocol, Key agreement, RFID system, Session key |
23 | T. Rakesh Kumar, S. V. Raghavan |
PassPattern System (PPS): A Pattern-Based User Authentication Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Networking ![In: NETWORKING 2008, Ad Hoc and Sensor Networks, Wireless Networks, Next Generation Internet , 7th International IFIP-TC6 Networking Conference, Singapore, May 5-9, 2008, Proceedings, pp. 162-169, 2008, Springer, 978-3-540-79548-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Security, User Authentication |
23 | Nitin 0001, Durg Singh Chauhan, Vivek Kumar Sehgal, Ankit Mahanot, Pallavi Singh, Sohit Ahuja, Utkarsh Shrivastava, Manisha Rana, Vineet Punjabi, Shivam Vinay, Nakul Sharma |
Security Analysis and Implementation of JUIT-Image Based Authentication System Using Kerberos Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACIS-ICIS ![In: 7th IEEE/ACIS International Conference on Computer and Information Science, IEEE/ACIS ICIS 2008, 14-16 May 2008, Portland, Oregon, USA, pp. 575-580, 2008, IEEE Computer Society, 978-0-7695-3131-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Image Based Authentication System, Diffie-Hellman key Exchange, Kerberos Protocol, Keystroke Logging, Tempest Attack, Shoulder Attack, Brute-force Attack, AJAX, MySQL |
23 | Ali Nasrat Haidar, Ali E. Abdallah |
Weaving Authentication and Authorization Requirements into the Functional Model of a System Using Z Promotion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISoLA ![In: Leveraging Applications of Formal Methods, Verification and Validation, Third International Symposium, ISoLA 2008, Porto Sani, Greece, October 13-15, 2008. Proceedings, pp. 831-846, 2008, Springer, 978-3-540-88478-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Weaving Security into Functional Models, Z Promotion, Authentication, Authorization, Security Requirements, Z specification |
23 | Arjan Durresi, Mimoza Durresi, Leonard Barolli |
Secure Spatial Authentication for Mobile Stations In Hybrid 3G-WLAN Serving Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain, pp. 1325-1331, 2008, IEEE Computer Society, 978-0-7695-3102-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Location authentication, Communications, WLAN, Hybrid, cellular |
23 | Marko Hölbl, Tatjana Welzer |
Cryptanalysis and Improvement of an "Improved Remote Authentication Scheme with Smart Card". ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain, pp. 1301-1305, 2008, IEEE Computer Society, 978-0-7695-3102-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
off-line password guessing attack, authentication, smart card, password |
23 | Muhammad Daniel Hafiz Abdullah, Abdul Hanan Abdullah, Norafida Ithnin, Hazinah Kutty Mammi |
Towards Identifying Usability and Security Features of Graphical Password in Knowledge Based Authentication Technique. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Asia International Conference on Modelling and Simulation ![In: Second Asia International Conference on Modelling and Simulation, AMS 2008, Kuala Lumpur, Malaysia, May 13-15, 2008, pp. 396-403, 2008, IEEE Computer Society, 978-0-7695-3136-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Security, Usability, Authentication, Password, Graphical Password |
23 | Eun-Jun Yoon, Eun-Jung Lee, Kee-Young Yoo |
Cryptanalysis of Wang et al.'s Remote User Authentication Scheme Using Smart Cards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Fifth International Conference on Information Technology: New Generations (ITNG 2008), 7-8 April 2008, Las Vegas, Nevada, USA, pp. 575-580, 2008, IEEE Computer Society, 978-0-7695-3099-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Authentication, Cryptography, Cryptanalysis, Smart card, Password, Session key |
23 | Zhiwei Yan, Huachun Zhou, Hongke Zhang, Hongbin Luo, Sidong Zhang |
A dual threshold-based fast vertical handover scheme with authentication support. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mobility Conference ![In: Proceedings of the 5th International Conference on Mobile Technology, Applications, and Systems, Mobility Conference 2008, Yilan, Taiwan, September 10-12, 2008, pp. 89, 2008, ACM, 978-1-60558-089-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
authentication, vertical handover, MIPv6, MIH |
23 | Erdinç Öztürk, Ghaith Hammouri, Berk Sunar |
Towards Robust Low Cost Authentication for Pervasive Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PerCom ![In: Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2008), 17-21 March 2008, Hong Kong, pp. 170-178, 2008, IEEE Computer Society, 978-0-7695-3113-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Low power authentication, tamperproof chips, sensor networks, RFIDs, smartcards, physical unclonable functions |
23 | Tobias Heer, Stefan Götz 0001, Oscar García Morchon, Klaus Wehrle |
ALPHA: an adaptive and lightweight protocol for hop-by-hop authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoNEXT ![In: Proceedings of the 2008 ACM Conference on Emerging Network Experiment and Technology, CoNEXT 2008, Madrid, Spain, December 9-12, 2008, pp. 23, 2008, ACM, 978-1-60558-210-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
integrity protection, authentication, hash chains |
23 | Rajat Subhra Chakraborty, Swarup Bhunia |
Hardware protection and authentication through netlist level obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCAD ![In: 2008 International Conference on Computer-Aided Design, ICCAD 2008, San Jose, CA, USA, November 10-13, 2008, pp. 674-677, 2008, IEEE Computer Society, 978-1-4244-2820-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
IP piracy, design for security, hardware authentication, hardware obfuscation, hardware protection |
23 | Manuel Barbosa, Thierry Brouard, Stéphane Cauchie, Simão Melo de Sousa |
Secure Biometric Authentication with Improved Accuracy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings, pp. 21-36, 2008, Springer, 978-3-540-69971-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Secure Biometric Authentication, Cryptography, Classifier |
23 | Liting Zhang, Wenling Wu, Peng Wang 0009 |
Extended Models for Message Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2008, 11th International Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers, pp. 286-301, 2008, Springer, 978-3-642-00729-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Provable Security, Side Channel Attack, Security Model, Message Authentication |
23 | Dae-Hee Seo, Jang-Mi Baek, Dong-Sub Cho |
Secure authentication and management scheme for RFID. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Q2SWinet ![In: Q2SWinet'08 - Proceedings of the 4th ACM Workshop on Q2S and Security for Wireless and Mobile Networks, Vancouver, British Columbia, Canada, October 27-28, 2008, pp. 106-110, 2008, ACM, 978-1-60558-237-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
authentication, management, RFID tag, ubiquitous environment |
23 | Khaled Ouafi, Raphael C.-W. Phan |
Privacy of Recent RFID Authentication Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, 4th International Conference, ISPEC 2008, Sydney, Australia, April 21-23, 2008, Proceedings, pp. 263-277, 2008, Springer, 978-3-540-79103-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
privacy, RFID, provably secure, authentication protocols, untraceability |
23 | Julien Bringer, Hervé Chabanne |
An Authentication Protocol with Encrypted Biometric Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AFRICACRYPT ![In: Progress in Cryptology - AFRICACRYPT 2008, First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008. Proceedings, pp. 109-124, 2008, Springer, 978-3-540-68159-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Private Information Retrieval protocol, Privacy, Authentication, Biometrics, Secure Sketches |
23 | Marcos Ortega, Manuel G. Penedo, Cástor Mariño, María J. Carreira |
Similarity Metrics Analysis for Feature Point Based Retinal Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIAR ![In: Image Analysis and Recognition, 5th International Conference, ICIAR 2008, Póvoa de Varzim, Portugal, June 25-27, 2008. Proceedings, pp. 1023-1032, 2008, Springer, 978-3-540-69811-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Authentication System, Biometric Pattern, Feature point matching, Similarity Measure, Retinal Images |
23 | Niladri B. Puhan, Anthony T. S. Ho |
Secure authentication watermarking for localization against the Holliman-Memon attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Syst. ![In: Multim. Syst. 12(6), pp. 521-532, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Fragile authentication, Holliman-Memon attack, Authenticity score, Security, Localization, Digital watermarking |
23 | Marcos Faúndez-Zanuy, David A. Elizondo, Miguel Angel Ferrer-Ballester, Carlos Manuel Travieso-González |
Authentication of Individuals using Hand Geometry Biometrics: A Neural Network Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Neural Process. Lett. ![In: Neural Process. Lett. 26(3), pp. 201-216, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Biometrical features, Authentication of individual, Neural network, Feature extraction, Biometrics, Feature identification, Hand geometry |
23 | Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng Ning |
Interleaved hop-by-hop authentication against false data injection attacks in sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Sens. Networks ![In: ACM Trans. Sens. Networks 3(3), pp. 14, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
filtering false data, interleaved hop-by-hop, sensor networks, Authentication |
23 | Hung-Yu Chien, Chen-Wei Huang |
Security of ultra-lightweight RFID authentication protocols and its improvements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGOPS Oper. Syst. Rev. ![In: ACM SIGOPS Oper. Syst. Rev. 41(4), pp. 83-86, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
security, privacy, authentication, RFID, desynchronization |
23 | Cheng-Huang Jiang, Shiuhpyng Shieh, Jen-Chien Liu |
Keystroke statistical learning model for web authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2007, Singapore, March 20-22, 2007, pp. 359-361, 2007, ACM, 1-59593-574-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
keystroke, hidden Markov model, statistical learning theory, Gaussian model, web authentication |
23 | Dongvu Tonien, Reihaneh Safavi-Naini, Peter R. Wild |
Combinatorial characterizations of authentication codes in verification oracle model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2007, Singapore, March 20-22, 2007, pp. 183-193, 2007, ACM, 1-59593-574-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
active adversary model, combinatorial bounds, unconditional security, authentication codes |
23 | Tri Van Le, Mike Burmester, Breno de Medeiros |
Universally composable and forward-secure RFID authentication and authenticated key exchange. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2007, Singapore, March 20-22, 2007, pp. 242-252, 2007, ACM, 1-59593-574-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
RFID authentication and key-exchange protocols, anonymity, forward-security, universal composability |
23 | Irfan Ahmed 0001, Usman Tariq, Shoaib Mukhtar, Kyung-suk Lhee, S. W. Yoo, Piao Yanji, Manpyo Hong |
Binding Update Authentication Scheme for Mobile IPv6. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Third International Symposium on Information Assurance and Security, IAS 2007, August 29-31, 2007, Manchester, United Kingdom, pp. 109-114, 2007, IEEE Computer Society, 978-0-7695-2876-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Care-of-Address Validation, Binding Update Authentication, Key Management, Mobile IPv6, Route Optimization |
23 | Shaoquan Jiang |
Deniable Authentication on the Internet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology, Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers, pp. 298-312, 2007, Springer, 978-3-540-79498-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Authentication, Protocol, Key Exchange, Deniability |
23 | Joon Wan Kim, Yong Ho Kim, Hwaseong Lee, Dong Hoon Lee 0001 |
A Practical Inter-sensor Broadcast Authentication Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HCI (5) ![In: Universal Access in Human Computer Interaction. Coping with Diversity, 4th International Conference on Universal Access in Human-Computer Interaction, UAHCI 2007, Held as Part of HCI International 2007, Beijing, China, July 22-27, 2007, Proceedings, Part I, pp. 399-405, 2007, Springer, 978-3-540-73278-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
security, wireless sensor network, authentication |
23 | Hyeonjoon Moon, Kisung Lee |
Biometric Driver Authentication Based on 3D Face Recognition for Telematics Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HCI (5) ![In: Universal Access in Human Computer Interaction. Coping with Diversity, 4th International Conference on Universal Access in Human-Computer Interaction, UAHCI 2007, Held as Part of HCI International 2007, Beijing, China, July 22-27, 2007, Proceedings, Part I, pp. 473-480, 2007, Springer, 978-3-540-73278-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
driver authentication, driver identification, telematics application, biometrics, 3D Model, 3D face recognition |
23 | Timothy W. van der Horst, Kent E. Seamons |
Simple authentication for the web. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the 16th International Conference on World Wide Web, WWW 2007, Banff, Alberta, Canada, May 8-12, 2007, pp. 1217-1218, 2007, ACM, 978-1-59593-654-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
password alternative, web single sign-on, authentication |
23 | Laurie A. Jones, Annie I. Antón, Julia Brande Earp |
Towards understanding user perceptions of authentication technologies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2007 ACM Workshop on Privacy in the Electronic Society, WPES 2007, Alexandria, VA, USA, October 29, 2007, pp. 91-98, 2007, ACM, 978-1-59593-883-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
authentication, biometrics, tokens, digital identities, user perceptions |
23 | Katerina Stamou, Fredrik Hedman, Anthony Iliopoulos |
Extending UNICORE 5 Authentication Model by Supporting Proxy Certificate Profile Extensions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Euro-Par Workshops ![In: Euro-Par 2007 Workshops: Parallel Processing, HPPC 2007, UNICORE Summit 2007, and VHPC 2007, Rennes, France, August 28-31, 2007, Revised Selected Papers, pp. 104-111, 2007, Springer, 978-3-540-78472-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
RFC 3280, authentication, grid, interoperability, authorization, X.509, UNICORE, proxy certificates |
23 | Hyeonjoon Moon, Taehwa Hong |
Biometric User Authentication Based on 3D Face Recognition Under Ubiquitous Computing Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIC (2) ![In: Advanced Intelligent Computing Theories and Applications. With Aspects of Artificial Intelligence, Third International Conference on Intelligent Computing, ICIC 2007, Qingdao, China, August 21-24, 2007, Proceedings, pp. 1076-1081, 2007, Springer, 978-3-540-74201-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
ubiquitous computing, verification, mobile device, biometrics, identification, 3D Model, user authentication, 3D face recognition |
23 | Hyungkyu Lee, Jongwook Han, Kyoil Chung |
Security Architecture for Authentication and Authorization in the Intelligent and Ubiquitous Home Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIC (3) ![In: Advanced Intelligent Computing Theories and Applications. With Aspects of Contemporary Intelligent Computing Techniques, Third International Conference on Intelligent Computing, ICIC 2007, Qingdao, China, August 21-24, 2007. Proceedings, pp. 1110-1118, 2007, Springer, 978-3-540-74281-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Public Key mechanism, Symmetric Key Mechanism, Multi-home roaming, Authentication, Authorization, Certificate, Home network |
23 | Lin Yang, Xinghua Ruan, Jingdong Xu, Gongyi Wu |
Secure Enterprise Information Systems: A Mutual Authentication Scheme for Roaming Users Using Memorable Information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CONFENIS (1) ![In: Research and Practical Issues of Enterprise Information Systems II, Volume 1, IFIP TC 8 WG 8.9 International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS 2007), October 14-16, 2007, Beijing, China, pp. 195-200, 2007, Springer, 978-0-387-75901-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Security, Privacy, Trust, Password, Enterprise information systems, Identity-based cryptography, Mutual authentication |
23 | Eun-Jun Yoon, Wan-Soo Lee, Kee-Young Yoo |
Secure Remote User Authentication Scheme Using Bilinear Pairings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems, First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007, Proceedings, pp. 102-114, 2007, Springer, 978-3-540-72353-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Authentication, Cryptanalysis, Smart card, Password, Bilinear pairings, Key agreement |
23 | Takahiro Matsuda 0002, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai |
A Practical Provider Authentication System for Bidirectional Broadcast Service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES (3) ![In: Knowledge-Based Intelligent Information and Engineering Systems, 11th International Conference, KES 2007, XVII Italian Workshop on Neural Networks, Vietri sul Mare, Italy, September 12-14, 2007, Proceedings, Part III, pp. 967-974, 2007, Springer, 978-3-540-74828-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
provider authentication, bidirectional broadcasting, key-insulated signature, digital signature |
23 | Christophe Tartary, Huaxiong Wang |
Combining Prediction Hashing and MDS Codes for Efficient Multicast Stream Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings, pp. 293-307, 2007, Springer, 978-3-540-73457-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Adversarial Network, Prediction Hashing, Erasure Codes, Hash Chains, Stream Authentication, Polynomial Reconstruction |
23 | R. J. Hulsebosch, Mortaza S. Bargh, Gabriele Lenzini, P. W. G. Ebben, Sorin M. Iacob |
Context Sensitive Adaptive Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroSSC ![In: Smart Sensing and Context, Second European Conference, EuroSSC 2007, Kendal, England, UK, October 23-25, 2007, Proceedings, pp. 93-109, 2007, Springer, 978-3-540-75695-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
adaptive, Authentication, context awareness, probability |
23 | Basel Alomair, Loukas Lazos, Radha Poovendran |
Passive Attacks on a Class of Authentication Protocols for RFID. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2007, 10th International Conference, Seoul, Korea, November 29-30, 2007, Proceedings, pp. 102-115, 2007, Springer, 978-3-540-76787-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
passive attack, privacy, authentication, RFID |
23 | Chun-I Fan, Vincent Shi-Ming Huang |
Anonymous Authentication Protocols with Credit-Based Chargeability and Fair Privacy for Mobile Communications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security, Second International Workshop on Security, IWSEC 2007, Nara, Japan, October 29-31, 2007, Proceedings, pp. 412-427, 2007, Springer, 978-3-540-75650-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Fair Privacy, Ubiquitous Computing, Cryptography, Anonymity, Mobile Networks, Mutual Authentication |
23 | Insun Lee, Jihoon Lee, William A. Arbaugh, Daeyoung Kim 0001 |
Dynamic Distributed Authentication Scheme for Wireless LAN-Based Mesh Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICOIN ![In: Information Networking. Towards Ubiquitous Networking and Services, International Conference, ICOIN 2007, Estoril, Portugal, January 23-25, 2007. Revised Selected Papers, pp. 649-658, 2007, Springer, 978-3-540-89523-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Distributed authentication, WLAN, Wireless Mesh network |
23 | Nai-Wei Lo, Kuo-Hui Yeh |
An Efficient Mutual Authentication Scheme for EPCglobal Class-1 Generation-2 RFID System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC Workshops ![In: Emerging Directions in Embedded and Ubiquitous Computing, EUC 2007 Workshops: TRUST, WSOC, NCUS, UUWSN, USN, ESO, and SECUBIQ, Taipei, Taiwan, December 17-20, 2007, Proceedings, pp. 43-56, 2007, Springer, 978-3-540-77089-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Authentication, RFID, Data Security, Location Privacy, EPCglobal, CRC |
23 | Pedro Peris-Lopez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda |
An Efficient Authentication Protocol for RFID Systems Resistant to Active Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC Workshops ![In: Emerging Directions in Embedded and Ubiquitous Computing, EUC 2007 Workshops: TRUST, WSOC, NCUS, UUWSN, USN, ESO, and SECUBIQ, Taipei, Taiwan, December 17-20, 2007, Proceedings, pp. 781-794, 2007, Springer, 978-3-540-77089-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
IUC, Light-weight Hash functions, Security, Authentication, RFID, Active-attacks |
23 | Di Ma, Gene Tsudik |
Extended Abstract: Forward-Secure Sequential Aggregate Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 2007 IEEE Symposium on Security and Privacy (S&P 2007), 20-23 May 2007, Oakland, California, USA, pp. 86-91, 2007, IEEE Computer Society, 0-7695-2848-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
key compromise, sensors, forward security, signature schemes, authentication schemes, aggregate signatures |
23 | Zhen-Ai Jin, Hyun-Ju Cho, Kee-Young Yoo |
An Efficient Authentication Protocol for Low-Cost RFID Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES-AMSTA ![In: Agent and Multi-Agent Systems: Technologies and Applications, First KES International Symposium, KES-AMSTA 2007, Wroclaw, Poland, May 31- June 1, 2007, Proceedings, pp. 999-1006, 2007, Springer, 978-3-540-72829-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
security, Authentication, RFID, location privacy, symmetric encryption |
Displaying result #601 - #700 of 25398 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ 15][ 16][ >>] |
|