|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 8079 occurrences of 2235 keywords
|
|
|
Results
Found 25398 publication records. Showing 25398 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
23 | William K. Josephson, Emin Gün Sirer, Fred B. Schneider |
Peer-to-Peer Authentication with a Distributed Single Sign-On Service. |
IPTPS |
2004 |
DBLP DOI BibTeX RDF |
|
23 | Ali M. Allam 0001, Ibraliim I. Ibrahim, Ihab A. Ali, Abdel-Rahman H. El-Sawy |
Provably secure entity authentication the three party case. |
ISCC |
2004 |
DBLP DOI BibTeX RDF |
|
23 | Young-Gab Kim, Chang-Joo Moon, Dae-Ha Park, Doo-Kwon Baik |
A MAC-Based Service Bundle Authentication Mechanism in the OSGi Service Platform. |
DASFAA |
2004 |
DBLP DOI BibTeX RDF |
|
23 | Hae Yong Kim, Ricardo L. de Queiroz |
Alteration-Locating Authentication Watermarking for Binary Images. |
IWDW |
2004 |
DBLP DOI BibTeX RDF |
|
23 | Yacine Challal, Hatem Bettahar, Abdelmadjid Bouabdallah |
Hybrid and Adaptive Hash-Chaining Scheme for Data-Streaming Source Authentication. |
HSNMC |
2004 |
DBLP DOI BibTeX RDF |
|
23 | Young Jae Choi, Soon-Ja Kim |
An Improvement on Privacy and Authentication in GSM. |
WISA |
2004 |
DBLP DOI BibTeX RDF |
|
23 | Mi-Ae Kim, Geun-Sil Song, Won-Hyung Lee |
A Robust Image Authentication Method Surviving Acceptable Modifications. |
ICCSA (1) |
2004 |
DBLP DOI BibTeX RDF |
|
23 | Young-Gab Kim, Chang-Joo Moon, Dae-Ha Park, Doo-Kwon Baik |
A Service Bundle Authentication Mechanism in the OSGi Service Platform. |
AINA (1) |
2004 |
DBLP DOI BibTeX RDF |
|
23 | Riccardo Focardi |
Static Analysis of Authentication. |
FOSAD |
2004 |
DBLP DOI BibTeX RDF |
|
23 | Vivi Oktavia, Won-Hyung Lee |
A Fragile Watermarking Technique for Image Authentication Using Singular Value Decomposition. |
PCM (2) |
2004 |
DBLP DOI BibTeX RDF |
|
23 | Jung-Min Park 0001, Edwin K. P. Chong, Howard Jay Siegel |
Efficient multicast stream authentication using erasure codes. |
ACM Trans. Inf. Syst. Secur. |
2003 |
DBLP DOI BibTeX RDF |
Information Dispersal Algorithm (IDA), multicast, Digital signatures, erasure codes |
23 | William Aiello, John Ioannidis, Patrick D. McDaniel |
Origin authentication in interdomain routing. |
CCS |
2003 |
DBLP DOI BibTeX RDF |
address management, security, routing, BGP, delegation |
23 | N. Asokan, Valtteri Niemi, Kaisa Nyberg |
Man-in-the-Middle in Tunnelled Authentication Protocols. |
Security Protocols Workshop |
2003 |
DBLP DOI BibTeX RDF |
|
23 | Heba Kamal Aslan |
AUTHMAC_DH: A New Protocol for Authentication and Key Distribution. |
Communications and Multimedia Security |
2003 |
DBLP DOI BibTeX RDF |
|
23 | Daesung Moon, Youn-Hee Gil, Dosung Ahn, Sung Bum Pan, Yongwha Chung, Chee-Hang Park |
Fingerprint-Based Authentication for USB Token Systems. |
WISA |
2003 |
DBLP DOI BibTeX RDF |
|
23 | Aldar C.-F. Chan |
A graph-theoretical analysis of multicast authentication. |
ICDCS |
2003 |
DBLP DOI BibTeX RDF |
|
23 | Su Jung Yu, Joo-Seok Song |
An Improved Password Authentication Key Exchange Protocol for 802.11 Environment. |
ICCSA (2) |
2003 |
DBLP DOI BibTeX RDF |
|
23 | Cheolhyun Kim, Yeijin Lee, Ilyong Chung |
The Design of an Efficient Kerberos Authentication Mechanism Associated with Directory Systems. |
GCC (1) |
2003 |
DBLP DOI BibTeX RDF |
|
23 | Sencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jajodia |
LHAP: A Lightweight Hop-by-Hop Authentication Protocol for Ad-Hoc Networks. |
ICDCS Workshops |
2003 |
DBLP DOI BibTeX RDF |
|
23 | Kenta Matsumiya, Soko Aoki, Masana Murase, Hideyuki Tokuda |
Active Authentication for Pervasive Computing Environments. |
ISSS |
2002 |
DBLP DOI BibTeX RDF |
|
23 | Joshua D. Guttman |
Security Protocol Design via Authentication Tests. |
CSFW |
2002 |
DBLP DOI BibTeX RDF |
|
23 | Philippa J. Broadfoot, Gavin Lowe |
Analysing a Stream Authentication Protocol Using Model Checking. |
ESORICS |
2002 |
DBLP DOI BibTeX RDF |
|
23 | Sara K. Miner, Jessica Staddon |
Graph-Based Authentication of Digital Streams. |
S&P |
2001 |
DBLP DOI BibTeX RDF |
|
23 | Nalini K. Ratha, Jonathan H. Connell, Ruud M. Bolle |
An Analysis of Minutiae Matching Strength. |
AVBPA |
2001 |
DBLP DOI BibTeX RDF |
|
23 | Hugo Krawczyk |
LFSR-based Hashing and Authentication. |
CRYPTO |
1994 |
DBLP DOI BibTeX RDF |
|
23 | John T. Kohl |
The use of Encryption in Kerberos for Network Authentication. |
CRYPTO |
1989 |
DBLP DOI BibTeX RDF |
|
23 | Ernest F. Brickell, Douglas R. Stinson |
Authentication Codes with Multiple Arbiters (Extended Abstract). |
EUROCRYPT |
1988 |
DBLP DOI BibTeX RDF |
|
23 | Andre Kalamandeen, Adin Scannell, Eyal de Lara, Anmol Sheth, Anthony LaMarca |
Ensemble: cooperative proximity-based authentication. |
MobiSys |
2010 |
DBLP DOI BibTeX RDF |
authentication, ensemble, proximity |
23 | Saurabh Panjwani, Edward Cutrell |
Usably secure, low-cost authentication for mobile banking. |
SOUPS |
2010 |
DBLP DOI BibTeX RDF |
security, usability, mobile, authentication, banking, paper, developing regions, PIN, ICTD |
23 | Ebrima N. Ceesay, Coimbatore Chandersekaran, William R. Simpson |
An authentication model for delegation, attribution and least privilege. |
PETRA |
2010 |
DBLP DOI BibTeX RDF |
WS-*, security assertion markup language (SAML), authentication, authorization, delegation, public key infrastructure, attribution, credentialing, least privilege |
23 | Yong Ki Lee, Lejla Batina, Dave Singelée, Ingrid Verbauwhede |
Low-cost untraceable authentication protocols for RFID. |
WISEC |
2010 |
DBLP DOI BibTeX RDF |
search protocol, tracking attack, privacy, elliptic curve cryptography, authentication protocol, rfid |
23 | Mike Burmester, Tri Van Le, Breno de Medeiros, Gene Tsudik |
Universally Composable RFID Identification and Authentication Protocols. |
ACM Trans. Inf. Syst. Secur. |
2009 |
DBLP DOI BibTeX RDF |
authentication and key-exchange protocols, universal composability, RFID security |
23 | Emad Eldin Mohamed, Hussein M. Abdel-Wahab |
Collusion-Resistant Message Authentication in Overlay Multicast Communication. |
Trans. Comput. Sci. |
2009 |
DBLP DOI BibTeX RDF |
Multicast communication, Message authentication, Overlay multicast, Multicast security |
23 | Richa Singh 0001, Mayank Vatsa, Sanjay Kumar Singh, Saurabh Upadhyay |
Integrating SVM classification with SVD watermarking for intelligent video authentication. |
Telecommun. Syst. |
2009 |
DBLP DOI BibTeX RDF |
Video authentication, Relative correlation, Support vector machine, Watermarking, Singular value decomposition |
23 | Dingyi Pei |
New Family of Non-Cartesian Perfect Authentication Codes. |
IWCC |
2009 |
DBLP DOI BibTeX RDF |
perfect authentication codes, subfield rational normal curves, partially balanced designs, spoofing attacks |
23 | Karen Renaud, Joseph Maguire 0001 |
Armchair authentication. |
BCS HCI |
2009 |
DBLP BibTeX RDF |
graphical authentication mechanism, secluded space, context, shared space |
23 | Matthias Krause 0001, Dirk Stegemann |
More on the Security of Linear RFID Authentication Protocols. |
Selected Areas in Cryptography |
2009 |
DBLP DOI BibTeX RDF |
RFID Authentication, HB ?+?, CKK, CKK 2, Algebraic Attacks, Lightweight Cryptography |
23 | M. L. Dennis Wong, Antionette W.-T. Goh, Hong Siang Chua |
Medical Image Authentication Using DPT Watermarking: A Preliminary Attempt. |
e-Forensics |
2009 |
DBLP DOI BibTeX RDF |
Discrete Pascal Transform, Fragile Watermarking, Biomedical Image, Content Authentication |
23 | Paul C. van Oorschot, Tao Wan 0004 |
TwoStep: An Authentication Method Combining Text and Graphical Passwords. |
MCETECH |
2009 |
DBLP DOI BibTeX RDF |
Security, Phishing, User Authentication, Graphical Passwords |
23 | Alexander De Luca, Emanuel von Zezschwitz, Heinrich Hußmann |
Vibrapass: secure authentication based on shared lies. |
CHI |
2009 |
DBLP DOI BibTeX RDF |
lie input, public terminals, security, authentication |
23 | Clara Cruz-Ramos, Rogelio Reyes-Reyes, Mariko Nakano-Miyatake, Héctor M. Pérez Meana |
Image Authentication Scheme Based on Self-embedding Watermarking. |
CIARP |
2009 |
DBLP DOI BibTeX RDF |
Self-embedding watermarking, Tamper localization, Image authentication, Tamper detection, Semi-fragile watermarking |
23 | Taiki Sakashita, Yoichi Shibata, Takumi Yamamoto, Kenta Takahashi, Wakaha Ogata, Hiroaki Kikuchi, Masakatsu Nishigaki |
A Proposal of Efficient Remote Biometric Authentication Protocol. |
IWSEC |
2009 |
DBLP DOI BibTeX RDF |
zero knowledge interactive proof, secret computing, authentication, biometrics |
23 | Youngsook Lee, Dongho Won |
Security Vulnerabilities of a Remote User Authentication Scheme Using Smart Cards Suited for a Multi-server Environment. |
ICCSA (2) |
2009 |
DBLP DOI BibTeX RDF |
multi-server environments, remote user authentication scheme, smart card, impersonation attack, password security, password guessing attack |
23 | Al-Sakib Khan Pathan, Choong Seon Hong |
Bilinear-pairing-based remote user authentication schemes using smart cards. |
ICUIMC |
2009 |
DBLP DOI BibTeX RDF |
bilateral, authentication, smart card, remote, bilinear |
23 | Dae-Hee Seo, Jang-Mi Baek, Dong-Sub Cho |
Secure RFID authentication scheme for EPC class Gen2. |
ICUIMC |
2009 |
DBLP DOI BibTeX RDF |
security, authentication, RFID |
23 | Manuel Barbosa, Pooya Farshim |
Security Analysis of Standard Authentication and Key Agreement Protocols Utilising Timestamps. |
AFRICACRYPT |
2009 |
DBLP DOI BibTeX RDF |
Key Agreement, Timestamp, Entity Authentication |
23 | Youngho Park 0004, Chul Sur, Chae Duk Jung, Kyung Hyune Rhee |
Efficient Anonymous Authentication Protocol Using Key-Insulated Signature Scheme for Secure VANET. |
MOBILIGHT |
2009 |
DBLP DOI BibTeX RDF |
key-insulated signature, security, authentication, anonymous, vehicular network |
23 | Chin-Hung Wang, Tzu-Chieh Wei, Po-Chin Lee, Chia-Chun Wu |
An improvement of secure authentication scheme with full anonymity for wireless communications. |
ICIS |
2009 |
DBLP DOI BibTeX RDF |
network security, anonymity, wireless communications, user authentication |
23 | Fuw-Yi Yang, Tzung-Da Wu, Ming-Huei Hsu |
Improvement of Hölbl et al. user authentication protocol and password change protocol. |
iiWAS |
2009 |
DBLP DOI BibTeX RDF |
Diffie-Hellmen, hash functions, password, remote authentication |
23 | Shaoying Cai, Yingjiu Li, Tieyan Li, Robert H. Deng |
Attacks and improvements to an RIFD mutual authentication protocol and its extensions. |
WISEC |
2009 |
DBLP DOI BibTeX RDF |
security, privacy, authentication, rfid |
23 | Katharine Chang, Kang G. Shin |
Distributed Authentication of Program Integrity Verification in Wireless Sensor Networks. |
ACM Trans. Inf. Syst. Secur. |
2008 |
DBLP DOI BibTeX RDF |
Distributed authentication, node revocation, program integrity verification, wireless sensor networks |
23 | Yong Xi, Kewei Sha, Weisong Shi, Loren Schwiebert, Tao Zhang 0005 |
Probabilistic Adaptive Anonymous Authentication in Vehicular Networks. |
J. Comput. Sci. Technol. |
2008 |
DBLP DOI BibTeX RDF |
adaptive anonymity, privacy, vehicular network, anonymous authentication |
23 | Rolf Oppliger, Ralf Hauser, David A. Basin |
SSL/TLS Session-Aware User Authentication. |
Computer |
2008 |
DBLP DOI BibTeX RDF |
man-in-the-middle (MITM) attacks, SSL/TLS protocols, security, user authentication |
23 | Tianjie Cao, Peng Shen, Elisa Bertino |
Cryptanalysis of the LCSS RFID Authentication Protocol. |
ISECS |
2008 |
DBLP DOI BibTeX RDF |
Authentication, RFID, Cryptanalysis |
23 | Eun-Jun Yoon, Kee-Young Yoo |
An Efficient Authentication and Key Agreement Protocol in RFID System. |
NPC |
2008 |
DBLP DOI BibTeX RDF |
Authentication, Security protocol, Key agreement, RFID system, Session key |
23 | T. Rakesh Kumar, S. V. Raghavan |
PassPattern System (PPS): A Pattern-Based User Authentication Scheme. |
Networking |
2008 |
DBLP DOI BibTeX RDF |
Security, User Authentication |
23 | Nitin 0001, Durg Singh Chauhan, Vivek Kumar Sehgal, Ankit Mahanot, Pallavi Singh, Sohit Ahuja, Utkarsh Shrivastava, Manisha Rana, Vineet Punjabi, Shivam Vinay, Nakul Sharma |
Security Analysis and Implementation of JUIT-Image Based Authentication System Using Kerberos Protocol. |
ACIS-ICIS |
2008 |
DBLP DOI BibTeX RDF |
Image Based Authentication System, Diffie-Hellman key Exchange, Kerberos Protocol, Keystroke Logging, Tempest Attack, Shoulder Attack, Brute-force Attack, AJAX, MySQL |
23 | Ali Nasrat Haidar, Ali E. Abdallah |
Weaving Authentication and Authorization Requirements into the Functional Model of a System Using Z Promotion. |
ISoLA |
2008 |
DBLP DOI BibTeX RDF |
Weaving Security into Functional Models, Z Promotion, Authentication, Authorization, Security Requirements, Z specification |
23 | Arjan Durresi, Mimoza Durresi, Leonard Barolli |
Secure Spatial Authentication for Mobile Stations In Hybrid 3G-WLAN Serving Networks. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
Location authentication, Communications, WLAN, Hybrid, cellular |
23 | Marko Hölbl, Tatjana Welzer |
Cryptanalysis and Improvement of an "Improved Remote Authentication Scheme with Smart Card". |
ARES |
2008 |
DBLP DOI BibTeX RDF |
off-line password guessing attack, authentication, smart card, password |
23 | Muhammad Daniel Hafiz Abdullah, Abdul Hanan Abdullah, Norafida Ithnin, Hazinah Kutty Mammi |
Towards Identifying Usability and Security Features of Graphical Password in Knowledge Based Authentication Technique. |
Asia International Conference on Modelling and Simulation |
2008 |
DBLP DOI BibTeX RDF |
Security, Usability, Authentication, Password, Graphical Password |
23 | Eun-Jun Yoon, Eun-Jung Lee, Kee-Young Yoo |
Cryptanalysis of Wang et al.'s Remote User Authentication Scheme Using Smart Cards. |
ITNG |
2008 |
DBLP DOI BibTeX RDF |
Authentication, Cryptography, Cryptanalysis, Smart card, Password, Session key |
23 | Zhiwei Yan, Huachun Zhou, Hongke Zhang, Hongbin Luo, Sidong Zhang |
A dual threshold-based fast vertical handover scheme with authentication support. |
Mobility Conference |
2008 |
DBLP DOI BibTeX RDF |
authentication, vertical handover, MIPv6, MIH |
23 | Erdinç Öztürk, Ghaith Hammouri, Berk Sunar |
Towards Robust Low Cost Authentication for Pervasive Devices. |
PerCom |
2008 |
DBLP DOI BibTeX RDF |
Low power authentication, tamperproof chips, sensor networks, RFIDs, smartcards, physical unclonable functions |
23 | Tobias Heer, Stefan Götz 0001, Oscar García Morchon, Klaus Wehrle |
ALPHA: an adaptive and lightweight protocol for hop-by-hop authentication. |
CoNEXT |
2008 |
DBLP DOI BibTeX RDF |
integrity protection, authentication, hash chains |
23 | Rajat Subhra Chakraborty, Swarup Bhunia |
Hardware protection and authentication through netlist level obfuscation. |
ICCAD |
2008 |
DBLP DOI BibTeX RDF |
IP piracy, design for security, hardware authentication, hardware obfuscation, hardware protection |
23 | Manuel Barbosa, Thierry Brouard, Stéphane Cauchie, Simão Melo de Sousa |
Secure Biometric Authentication with Improved Accuracy. |
ACISP |
2008 |
DBLP DOI BibTeX RDF |
Secure Biometric Authentication, Cryptography, Classifier |
23 | Liting Zhang, Wenling Wu, Peng Wang 0009 |
Extended Models for Message Authentication. |
ICISC |
2008 |
DBLP DOI BibTeX RDF |
Provable Security, Side Channel Attack, Security Model, Message Authentication |
23 | Dae-Hee Seo, Jang-Mi Baek, Dong-Sub Cho |
Secure authentication and management scheme for RFID. |
Q2SWinet |
2008 |
DBLP DOI BibTeX RDF |
authentication, management, RFID tag, ubiquitous environment |
23 | Khaled Ouafi, Raphael C.-W. Phan |
Privacy of Recent RFID Authentication Protocols. |
ISPEC |
2008 |
DBLP DOI BibTeX RDF |
privacy, RFID, provably secure, authentication protocols, untraceability |
23 | Julien Bringer, Hervé Chabanne |
An Authentication Protocol with Encrypted Biometric Data. |
AFRICACRYPT |
2008 |
DBLP DOI BibTeX RDF |
Private Information Retrieval protocol, Privacy, Authentication, Biometrics, Secure Sketches |
23 | Marcos Ortega, Manuel G. Penedo, Cástor Mariño, María J. Carreira |
Similarity Metrics Analysis for Feature Point Based Retinal Authentication. |
ICIAR |
2008 |
DBLP DOI BibTeX RDF |
Authentication System, Biometric Pattern, Feature point matching, Similarity Measure, Retinal Images |
23 | Niladri B. Puhan, Anthony T. S. Ho |
Secure authentication watermarking for localization against the Holliman-Memon attack. |
Multim. Syst. |
2007 |
DBLP DOI BibTeX RDF |
Fragile authentication, Holliman-Memon attack, Authenticity score, Security, Localization, Digital watermarking |
23 | Marcos Faúndez-Zanuy, David A. Elizondo, Miguel Angel Ferrer-Ballester, Carlos Manuel Travieso-González |
Authentication of Individuals using Hand Geometry Biometrics: A Neural Network Approach. |
Neural Process. Lett. |
2007 |
DBLP DOI BibTeX RDF |
Biometrical features, Authentication of individual, Neural network, Feature extraction, Biometrics, Feature identification, Hand geometry |
23 | Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng Ning |
Interleaved hop-by-hop authentication against false data injection attacks in sensor networks. |
ACM Trans. Sens. Networks |
2007 |
DBLP DOI BibTeX RDF |
filtering false data, interleaved hop-by-hop, sensor networks, Authentication |
23 | Hung-Yu Chien, Chen-Wei Huang |
Security of ultra-lightweight RFID authentication protocols and its improvements. |
ACM SIGOPS Oper. Syst. Rev. |
2007 |
DBLP DOI BibTeX RDF |
security, privacy, authentication, RFID, desynchronization |
23 | Cheng-Huang Jiang, Shiuhpyng Shieh, Jen-Chien Liu |
Keystroke statistical learning model for web authentication. |
AsiaCCS |
2007 |
DBLP DOI BibTeX RDF |
keystroke, hidden Markov model, statistical learning theory, Gaussian model, web authentication |
23 | Dongvu Tonien, Reihaneh Safavi-Naini, Peter R. Wild |
Combinatorial characterizations of authentication codes in verification oracle model. |
AsiaCCS |
2007 |
DBLP DOI BibTeX RDF |
active adversary model, combinatorial bounds, unconditional security, authentication codes |
23 | Tri Van Le, Mike Burmester, Breno de Medeiros |
Universally composable and forward-secure RFID authentication and authenticated key exchange. |
AsiaCCS |
2007 |
DBLP DOI BibTeX RDF |
RFID authentication and key-exchange protocols, anonymity, forward-security, universal composability |
23 | Irfan Ahmed 0001, Usman Tariq, Shoaib Mukhtar, Kyung-suk Lhee, S. W. Yoo, Piao Yanji, Manpyo Hong |
Binding Update Authentication Scheme for Mobile IPv6. |
IAS |
2007 |
DBLP DOI BibTeX RDF |
Care-of-Address Validation, Binding Update Authentication, Key Management, Mobile IPv6, Route Optimization |
23 | Shaoquan Jiang |
Deniable Authentication on the Internet. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
Authentication, Protocol, Key Exchange, Deniability |
23 | Joon Wan Kim, Yong Ho Kim, Hwaseong Lee, Dong Hoon Lee 0001 |
A Practical Inter-sensor Broadcast Authentication Scheme. |
HCI (5) |
2007 |
DBLP DOI BibTeX RDF |
security, wireless sensor network, authentication |
23 | Hyeonjoon Moon, Kisung Lee |
Biometric Driver Authentication Based on 3D Face Recognition for Telematics Applications. |
HCI (5) |
2007 |
DBLP DOI BibTeX RDF |
driver authentication, driver identification, telematics application, biometrics, 3D Model, 3D face recognition |
23 | Timothy W. van der Horst, Kent E. Seamons |
Simple authentication for the web. |
WWW |
2007 |
DBLP DOI BibTeX RDF |
password alternative, web single sign-on, authentication |
23 | Laurie A. Jones, Annie I. Antón, Julia Brande Earp |
Towards understanding user perceptions of authentication technologies. |
WPES |
2007 |
DBLP DOI BibTeX RDF |
authentication, biometrics, tokens, digital identities, user perceptions |
23 | Katerina Stamou, Fredrik Hedman, Anthony Iliopoulos |
Extending UNICORE 5 Authentication Model by Supporting Proxy Certificate Profile Extensions. |
Euro-Par Workshops |
2007 |
DBLP DOI BibTeX RDF |
RFC 3280, authentication, grid, interoperability, authorization, X.509, UNICORE, proxy certificates |
23 | Hyeonjoon Moon, Taehwa Hong |
Biometric User Authentication Based on 3D Face Recognition Under Ubiquitous Computing Environment. |
ICIC (2) |
2007 |
DBLP DOI BibTeX RDF |
ubiquitous computing, verification, mobile device, biometrics, identification, 3D Model, user authentication, 3D face recognition |
23 | Hyungkyu Lee, Jongwook Han, Kyoil Chung |
Security Architecture for Authentication and Authorization in the Intelligent and Ubiquitous Home Network. |
ICIC (3) |
2007 |
DBLP DOI BibTeX RDF |
Public Key mechanism, Symmetric Key Mechanism, Multi-home roaming, Authentication, Authorization, Certificate, Home network |
23 | Lin Yang, Xinghua Ruan, Jingdong Xu, Gongyi Wu |
Secure Enterprise Information Systems: A Mutual Authentication Scheme for Roaming Users Using Memorable Information. |
CONFENIS (1) |
2007 |
DBLP DOI BibTeX RDF |
Security, Privacy, Trust, Password, Enterprise information systems, Identity-based cryptography, Mutual authentication |
23 | Eun-Jun Yoon, Wan-Soo Lee, Kee-Young Yoo |
Secure Remote User Authentication Scheme Using Bilinear Pairings. |
WISTP |
2007 |
DBLP DOI BibTeX RDF |
Authentication, Cryptanalysis, Smart card, Password, Bilinear pairings, Key agreement |
23 | Takahiro Matsuda 0002, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai |
A Practical Provider Authentication System for Bidirectional Broadcast Service. |
KES (3) |
2007 |
DBLP DOI BibTeX RDF |
provider authentication, bidirectional broadcasting, key-insulated signature, digital signature |
23 | Christophe Tartary, Huaxiong Wang |
Combining Prediction Hashing and MDS Codes for Efficient Multicast Stream Authentication. |
ACISP |
2007 |
DBLP DOI BibTeX RDF |
Adversarial Network, Prediction Hashing, Erasure Codes, Hash Chains, Stream Authentication, Polynomial Reconstruction |
23 | R. J. Hulsebosch, Mortaza S. Bargh, Gabriele Lenzini, P. W. G. Ebben, Sorin M. Iacob |
Context Sensitive Adaptive Authentication. |
EuroSSC |
2007 |
DBLP DOI BibTeX RDF |
adaptive, Authentication, context awareness, probability |
23 | Basel Alomair, Loukas Lazos, Radha Poovendran |
Passive Attacks on a Class of Authentication Protocols for RFID. |
ICISC |
2007 |
DBLP DOI BibTeX RDF |
passive attack, privacy, authentication, RFID |
23 | Chun-I Fan, Vincent Shi-Ming Huang |
Anonymous Authentication Protocols with Credit-Based Chargeability and Fair Privacy for Mobile Communications. |
IWSEC |
2007 |
DBLP DOI BibTeX RDF |
Fair Privacy, Ubiquitous Computing, Cryptography, Anonymity, Mobile Networks, Mutual Authentication |
23 | Insun Lee, Jihoon Lee, William A. Arbaugh, Daeyoung Kim 0001 |
Dynamic Distributed Authentication Scheme for Wireless LAN-Based Mesh Networks. |
ICOIN |
2007 |
DBLP DOI BibTeX RDF |
Distributed authentication, WLAN, Wireless Mesh network |
23 | Nai-Wei Lo, Kuo-Hui Yeh |
An Efficient Mutual Authentication Scheme for EPCglobal Class-1 Generation-2 RFID System. |
EUC Workshops |
2007 |
DBLP DOI BibTeX RDF |
Authentication, RFID, Data Security, Location Privacy, EPCglobal, CRC |
23 | Pedro Peris-Lopez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda |
An Efficient Authentication Protocol for RFID Systems Resistant to Active Attacks. |
EUC Workshops |
2007 |
DBLP DOI BibTeX RDF |
IUC, Light-weight Hash functions, Security, Authentication, RFID, Active-attacks |
23 | Di Ma, Gene Tsudik |
Extended Abstract: Forward-Secure Sequential Aggregate Authentication. |
S&P |
2007 |
DBLP DOI BibTeX RDF |
key compromise, sensors, forward security, signature schemes, authentication schemes, aggregate signatures |
23 | Zhen-Ai Jin, Hyun-Ju Cho, Kee-Young Yoo |
An Efficient Authentication Protocol for Low-Cost RFID Systems. |
KES-AMSTA |
2007 |
DBLP DOI BibTeX RDF |
security, Authentication, RFID, location privacy, symmetric encryption |
Displaying result #601 - #700 of 25398 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ 15][ 16][ >>] |
|