|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 8079 occurrences of 2235 keywords
|
|
|
Results
Found 25398 publication records. Showing 25398 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
23 | Michael J. Chapple, Nitesh V. Chawla, Aaron Striegel |
Authentication anomaly detection: a case study on a virtual private network. |
MineNet |
2007 |
DBLP DOI BibTeX RDF |
security, data mining, authentication, anomaly detection, virtual private network |
23 | Ji-Yeon Kim, Jongjin Jung, Hoon Ko, Boyeon Kim, Susan Joe, Yongjun Lee, Yunseok Chang, Kyoon Ha Lee |
A Design of Authentication Protocol for Multi-key RFID Tag. |
APWeb/WAIM Workshops |
2007 |
DBLP DOI BibTeX RDF |
multi-key, tag structure, RFID, authentication protocol |
23 | Eun-Jun Yoon, Kee-Young Yoo |
A Secure Chaotic Hash-Based Biometric Remote User Authentication Scheme Using Mobile Devices. |
APWeb/WAIM Workshops |
2007 |
DBLP DOI BibTeX RDF |
Chaotic hash, Mobile devices, Cryptanalysis, Biometric authentication |
23 | Tage Stabell-Kulø |
From the Editor: Security Community-Blurring the Line between Authentication and Identification. |
IEEE Distributed Syst. Online |
2006 |
DBLP DOI BibTeX RDF |
security, authentication, identification |
23 | Michel Abdalla, Emmanuel Bresson, Olivier Chevassut, Bodo Möller, David Pointcheval |
Provably secure password-based authentication in TLS. |
AsiaCCS |
2006 |
DBLP DOI BibTeX RDF |
encrypted key exchange, password authentication, TLS |
23 | Mario Di Raimondo, Rosario Gennaro, Hugo Krawczyk |
Deniable authentication and key exchange. |
CCS |
2006 |
DBLP DOI BibTeX RDF |
authentication, key exchange, deniability |
23 | Yanjiang Yang, Robert H. Deng, Feng Bao 0001 |
Fortifying password authentication in integrated healthcare delivery systems. |
AsiaCCS |
2006 |
DBLP DOI BibTeX RDF |
integrated delivery systems (IDSs), password system, user authentication and key exchange, dictionary attack |
23 | Willy Susilo, Yi Mu 0001 |
Separable Identity-Based Deniable Authentication: Cryptographic Primitive for Fighting Phishing. |
EuroPKI |
2006 |
DBLP DOI BibTeX RDF |
repudiable, authentication, email, phishing, separable, ID-based, deniable |
23 | Eun-Jun Yoon, Kee-Young Yoo |
Enhanced Forward-Secure User Authentication Scheme with Smart Cards. |
EuroPKI |
2006 |
DBLP DOI BibTeX RDF |
Authentication, Network security, Smart card, Secure protocol, Password |
23 | Carsten Maple, Peter Norrington |
The Usability and Practicality of Biometric Authentication in the Workplace. |
ARES |
2006 |
DBLP DOI BibTeX RDF |
logical security, usability, authentication, biometrics, physical security |
23 | Eun-Jun Yoon, Kee-Young Yoo |
Improving the Dynamic ID-Based Remote Mutual Authentication Scheme. |
OTM Workshops (1) |
2006 |
DBLP DOI BibTeX RDF |
Dynamic ID, Authentication, Smart card, Password, Reflection attack |
23 | Pedro Peris-Lopez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda |
EMAP: An Efficient Mutual-Authentication Protocol for Low-Cost RFID Tags. |
OTM Workshops (1) |
2006 |
DBLP DOI BibTeX RDF |
Privacy, Ubiquitous Computing, RFID, Tracking, Tag, Pseudonym, Mutual-authentication, Reader |
23 | Julien Bringer, Hervé Chabanne, Emmanuelle Dottax |
HB++: a Lightweight Authentication Protocol Secure against Some Attacks. |
SecPerU |
2006 |
DBLP DOI BibTeX RDF |
We here show how a modification of the HB+ protocol thwarts Gilbert et al’s attack, The resulting protocol, HB++, remains a good choice for RFID authentication |
23 | Christina Braz, Jean-Marc Robert 0002 |
Security and usability: the case of the user authentication methods. |
IHM |
2006 |
DBLP DOI BibTeX RDF |
access control, human factors, user interface design, user authentication, security usability |
23 | Chul Sur, Jong-Phil Yang, Kyung Hyune Rhee |
A New Efficient Protocol for Authentication and Certificate Status Management in Personal Area Networks. |
ISCIS |
2006 |
DBLP DOI BibTeX RDF |
Efficient Authentication, Simplified Certificate Status Management, Personal Area Network, One-Time Signature |
23 | Haiqing Hu, Peijun Xue, Haiyan Fu |
S-Rough Recognition of Knowledge and General Threshold Encryption Authentication Scheme of Recognition Conclusion. |
ISDA (1) |
2006 |
DBLP DOI BibTeX RDF |
S-rough sets, S-rough recognition, composition structure, threshold encryption authentication, algorithm |
23 | Xiaowen Chu 0001, Yixin Jiang, Chuang Lin 0002, Fujun Feng |
Self-certified Mutual Authentication and Key Exchange Protocol for Roaming Services. |
ATC |
2006 |
DBLP DOI BibTeX RDF |
Self-certified, roaming services, authentication |
23 | Eun-Jun Yoon, Kee-Young Yoo |
Efficient Mutual Authentication Scheme with Smart Card. |
PRIMA |
2006 |
DBLP DOI BibTeX RDF |
Authentication, Network security, Smart card, Secure protocol, Password |
23 | Ronghui Wu, Renfa Li, Fei Yu 0001, Guangxue Yue, Cheng Xu 0001 |
Research on User Authentication for Grid Computing Security. |
SKG |
2006 |
DBLP DOI BibTeX RDF |
grid computing security, Access control, anonymity, Authentication protocol |
23 | Pedro Peris-Lopez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda |
M2AP: A Minimalist Mutual-Authentication Protocol for Low-Cost RFID Tags. |
UIC |
2006 |
DBLP DOI BibTeX RDF |
Privacy, Ubiquitous Computing, RFID, Tag, Pseudonym, Mutual-Authentication, Reader |
23 | Marc P. C. Fossorier, Miodrag J. Mihaljevic, Hideki Imai, Yang Cui 0001, Kanta Matsuura |
An Algorithm for Solving the LPN Problem and Its Application to Security Evaluation of the HB Protocols for RFID Authentication. |
INDOCRYPT |
2006 |
DBLP DOI BibTeX RDF |
LPN problem, HB protocols, RFID authentication, cryptanalysis, fast correlation attacks |
23 | Jianping Shi, Zhengjun Zhai |
Curvelet Transform for Image Authentication. |
RSKT |
2006 |
DBLP DOI BibTeX RDF |
Authentication, curvelet transform, ridgelet transform |
23 | Mark Luk, Adrian Perrig, Bram Whillock |
Seven cardinal properties of sensor network broadcast authentication. |
SASN |
2006 |
DBLP DOI BibTeX RDF |
sensor network, taxonomy, broadcast authentication |
23 | Wen-Shenq Juang |
Efficient User Authentication and Key Agreement in Ubiquitous Computing. |
ICCSA (4) |
2006 |
DBLP DOI BibTeX RDF |
Ubiquitous Computing, Network Security, Smart Card, User Authentication, Session Key |
23 | Seonho Choi, Yanggon Kim |
Resource Requirement Analysis for a Predictive-Hashing Based Multicast Authentication Protocol. |
EUC Workshops |
2006 |
DBLP DOI BibTeX RDF |
cryptographic hashing, authentication, protocol, multicast, denial-of-service, resource requirement |
23 | Jai-Boo Oh, Jun-Cheol Jeon, Kee-Young Yoo |
Further Improvement of Manik et al.'s Remote User Authentication Scheme Using Smart Cards. |
ISPA Workshops |
2006 |
DBLP DOI BibTeX RDF |
Off-line guessing Attack, Authentication, Bilinear Pairing, Replay Attack, Forgery Attack |
23 | Supriya Singh, Anuja Cabraal, Gabriele Hermansson |
What is your husband's name?: sociological dimensions of internet banking authentication. |
OZCHI |
2006 |
DBLP DOI BibTeX RDF |
sociological dimensions, authentication, qualitative research, Australia, Internet banking, security design |
23 | Ya-Fen Chang, Chin-Chen Chang 0001, Yu-Wei Su |
A secure improvement on the user-friendly remote authentication scheme with no time concurrency mech. |
AINA (2) |
2006 |
DBLP DOI BibTeX RDF |
authentication, password, password guessing attack |
23 | Daniel González-Jiménez, Federico Sukno, José Luis Alba-Castro, Alejandro F. Frangi |
Automatic Pose Correction for Local Feature-Based Face Authentication. |
AMDO |
2006 |
DBLP DOI BibTeX RDF |
Pose Correction, Face Authentication, Automatic Segmentation |
23 | Iuon-Chang Lin, Hsia-Hung Ou, Min-Shiang Hwang |
A user authentication system using back-propagation network. |
Neural Comput. Appl. |
2005 |
DBLP DOI BibTeX RDF |
Neural network, Information security, User authentication, One-way hash function, Back-propagation network |
23 | Chun-Shien Lu, Chao-Yong Hsu |
Geometric distortion-resilient image hashing scheme and its applications on copy detection and authentication. |
Multim. Syst. |
2005 |
DBLP DOI BibTeX RDF |
Authentication, Searching, Robustness, Hash, Copy detection, Geometric distortion |
23 | Bruce Schneier |
Authentication and Expiration. |
IEEE Secur. Priv. |
2005 |
DBLP DOI BibTeX RDF |
username and password, authentication, e-commerce |
23 | Ya-Fen Chang, Chin-Chen Chang 0001 |
An efficient authentication protocol for mobile satellite communication systems. |
ACM SIGOPS Oper. Syst. Rev. |
2005 |
DBLP DOI BibTeX RDF |
authentication, satellite communication, perfect forward secrecy |
23 | Mikhail J. Atallah, Keith B. Frikken, Michael T. Goodrich, Roberto Tamassia |
Secure Biometric Authentication for Weak Computational Devices. |
Financial Cryptography |
2005 |
DBLP DOI BibTeX RDF |
authentication, biometrics, smart cards, cryptographic hash functions |
23 | Yixin Jiang, Chuang Lin 0002, Xuemin Shen, Minghui Shi |
Mutual Authentication and Key Exchange Protocols with Anonymity Property for Roaming Services. |
NETWORKING |
2005 |
DBLP DOI BibTeX RDF |
roaming service, secret-splitting, self-certified, authentication, anonymity, key exchange |
23 | Saeed Rajput, Jihong Chen, Sam Hsu |
State based authentication. |
ACM Southeast Regional Conference (2) |
2005 |
DBLP DOI BibTeX RDF |
rule-based attack, syllable attack, security, authentication, access control, attack, password, help-desk, vulnerabilities, dictionary attack, unauthorized access, password management |
23 | Eun-Jun Yoon, Kee-Young Yoo |
Secure Fingerprint-Based Remote User Authentication Scheme Using Smartcards. |
WINE |
2005 |
DBLP DOI BibTeX RDF |
Smartcard, User authentication, Fingerprint verification |
23 | Jinghua Wen, Mei Zhang, Xiang Li |
The study on the application of BAN logic in formal analysis of authentication protocols. |
ICEC |
2005 |
DBLP DOI BibTeX RDF |
formalization analysis, authentication protocols, BAN logic |
23 | Keunwoo Rhee, Jin Kwak, Seungjoo Kim, Dongho Won |
Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment. |
SPC |
2005 |
DBLP DOI BibTeX RDF |
authentication, RFID system, Challenge-Response |
23 | Hung-Min Sun, Cheng-Ta Yang |
RSA with Balanced Short Exponents and Its Application to Entity Authentication. |
Public Key Cryptography |
2005 |
DBLP DOI BibTeX RDF |
Short Exponent Attack, RSA, Lattice Reduction, Entity Authentication |
23 | Zhishou Zhang, Qibin Sun, Wai-Choong Wong |
A proposal of butterfly-graph based stream authentication over lossy networks. |
ICME |
2005 |
DBLP DOI BibTeX RDF |
sender-receiver delay, butterfly-graph scheme, lossy network, packet streaming, authentication scheme |
23 | Eun-Jun Yoon, Woo-Hun Kim, Kee-Young Yoo |
Robust and Simple Authentication Protocol for Secure Communication on the Web. |
ICWE |
2005 |
DBLP DOI BibTeX RDF |
Denning-Sacco attack, Security, Authentication, Cryptography, Smart card, Key establishment, Forward Secrecy |
23 | Raphael Chung-Wei Phan, Bok-Min Goi |
On the Rila-Mitchell Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards. |
ICCSA (4) |
2005 |
DBLP DOI BibTeX RDF |
cardholder authentication, biometrics, attacks, Smartcards |
23 | Raphael Chung-Wei Phan, Bok-Min Goi |
On the Rila-Mitchell Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards. |
ICCSA (1) |
2005 |
DBLP DOI BibTeX RDF |
cardholder authentication, biometrics, attacks, Smartcards |
23 | Dimitris Nikitopoulos, Nikolaos Papaoulakis, Angelos Trakos, Alexandros Giamas, Efstathios D. Sykas, Michael E. Theologou |
Authentication platform for seamless handover in heterogeneous environments. |
ICAS/ICNS |
2005 |
DBLP DOI BibTeX RDF |
Authentication, WLAN, GPRS, Mobile IPv6, Heterogeneous environment, Seamless handover |
23 | Manik Lal Das, Ashutosh Saxena |
SPAM: Secure Protocol for Authentication in Mobile-Communications. |
ICMB |
2005 |
DBLP DOI BibTeX RDF |
Mutual key control, Authentication, digital signature, Mobile communications, Bilinear Pairings |
23 | Eun-Jun Yoon, Woo-Hun Kim, Kee-Young Yoo |
Security Enhancement for Password Authentication Schemes with Smart Cards. |
TrustBus |
2005 |
DBLP DOI BibTeX RDF |
Cryptography, Smart card, Password authentication |
23 | Cunsheng Ding, Xiaojian Tian |
Three Constructions of Authentication Codes with Perfect Secrecy. |
Des. Codes Cryptogr. |
2004 |
DBLP DOI BibTeX RDF |
perfect nonlinear mappings, cryptography, secrecy, authentication codes |
23 | Horng-Twu Liaw, Shiou-Wei Fan, Wei-Chen Wu |
A simple password authentication using a polynomial. |
ACM SIGOPS Oper. Syst. Rev. |
2004 |
DBLP DOI BibTeX RDF |
security, authentication, password |
23 | Maja Pusara, Carla E. Brodley |
User re-authentication via mouse movements. |
VizSEC |
2004 |
DBLP DOI BibTeX RDF |
mouse dynamics, user re-authentication, anomaly detection |
23 | Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo |
Security of Shen et al.'s Timestamp-Based Password Authentication Scheme. |
ICCSA (4) |
2004 |
DBLP DOI BibTeX RDF |
security, authentication, Cryptography, smart card, password |
23 | Xiang Zhou, Xiaohui Duan, Daoxian Wang |
A Semi-Fragile Watermark Scheme For Image Authentication. |
MMM |
2004 |
DBLP DOI BibTeX RDF |
Image Authentication DWT BCH Private Key Semi-fragile Watermark |
23 | Chin-Chen Chang 0001, Ya-Fen Chang |
Yet Another Attack on a QR-based Password Authentication System. |
AINA (2) |
2004 |
DBLP DOI BibTeX RDF |
password authentication, QR, quadratic residues |
23 | Chien-Hsung Chen, Long-Wen Chang |
A Digital Watermarking Scheme for Personal Image Authentication Using Eigenface. |
PCM (3) |
2004 |
DBLP DOI BibTeX RDF |
Digital watermarking, eigenface, personal authentication |
23 | Xin Li 0010, Mizuhito Ogawa |
A Lightweight Mutual Authentication Based on Proxy Certificate Trust List. |
PDCAT |
2004 |
DBLP DOI BibTeX RDF |
Grid Computing, Mutual Authentication, Proxy Certificate |
23 | Hyun-Sung Kim 0001, Sung-Woon Lee, Kee-Young Yoo |
ID-based password authentication scheme using smart cards and fingerprints. |
ACM SIGOPS Oper. Syst. Rev. |
2003 |
DBLP DOI BibTeX RDF |
ID-based scheme, smart card, fingerprint, password authentication |
23 | Yuqing Zhang, Dehua Zhang |
Authentication and Access Control in P2P Network. |
GCC (1) |
2003 |
DBLP DOI BibTeX RDF |
authentication, access control, network security, P2P Network |
23 | Douglas L. Whiting, Michael J. Sabin |
Montgomery Prime Hashing for Message Authentication. |
CT-RSA |
2003 |
DBLP DOI BibTeX RDF |
MAC, message authentication, Universal hash |
23 | Mohamed Al-Ibrahim, Anton Cerný |
Authentication of Anycast Communication. |
MMM-ACNS |
2003 |
DBLP DOI BibTeX RDF |
authentication, proxy signature, Anycast |
23 | Alan Harbitter, Daniel A. Menascé |
A methodology for analyzing the performance of authentication protocols. |
ACM Trans. Inf. Syst. Secur. |
2002 |
DBLP DOI BibTeX RDF |
mobile computing, Authentication, performance modeling, public key cryptography, proxy servers, Kerberos |
23 | Mark D. Corner, Brian Noble |
Zero-interaction authentication. |
MobiCom |
2002 |
DBLP DOI BibTeX RDF |
transient authentication, mobile computing, stackable file systems, cryptographic file systems |
23 | Dylan Carline, Paul Coulton |
Internet Authentication of LUT-Based FPGA Configuration Files. |
IPDPS |
2002 |
DBLP DOI BibTeX RDF |
Configuration Files, FPGA, Authentication, Bitstream |
23 | Jalal Al-Muhtadi, Anand Ranganathan, Roy H. Campbell, M. Dennis Mickunas |
A Flexible, Privacy-Preserving Authentication Framework for Ubiquitous Computing Environments. |
ICDCS Workshops |
2002 |
DBLP DOI BibTeX RDF |
Mist, security, privacy, Ubiquitous computing, authentication, context-awareness |
23 | Jung-Min Park 0001, Edwin K. P. Chong, Howard Jay Siegel |
Efficient Multicast Packet Authentication Using Signature Amortization. |
S&P |
2002 |
DBLP DOI BibTeX RDF |
Information Dispersal Algorithm (IDA), authentication, multicast, digital signatures, erasure codes |
23 | Anastasios Tefas, Constantine Kotropoulos, Ioannis Pitas |
Using Support Vector Machines to Enhance the Performance of Elastic Graph Matching for Frontal Face Authentication. |
IEEE Trans. Pattern Anal. Mach. Intell. |
2001 |
DBLP DOI BibTeX RDF |
Fisher's discriminant ratio, constrained least-squares optimization, Support Vector Machines, Face authentication, elastic graph matching |
23 | Horatiu Cirstea |
Specifying Authentication Protocols Using Rewriting and Strategies. |
PADL |
2001 |
DBLP DOI BibTeX RDF |
model-checking, strategy, rewriting, authentication protocols |
23 | Alan Harbitter, Daniel A. Menascé |
The performance of public key-enabled kerberos authentication in mobile computing applications. |
CCS |
2001 |
DBLP DOI BibTeX RDF |
mobile computing, authentication, performance modeling, public key cryptography, proxy servers, kerberos |
23 | Markus Jakobsson, David Pointcheval |
Mutual Authentication for Low-Power Mobile Devices. |
Financial Cryptography |
2001 |
DBLP BibTeX RDF |
gap problem, Low power, medical informatics, mutual authentication |
23 | Chih-Hsuan Tzeng, Wen-Hsiang Tsai |
A new technique for authentication of image/video for multimedia applications. |
MM&Sec |
2001 |
DBLP DOI BibTeX RDF |
JPEG/MPEG compression, compression tolerance, image/video authentication, digital signature |
23 | André Weimerskirch, Gilles Thonet |
A Distributed Light-Weight Authentication Model for Ad-hoc Networks. |
ICISC |
2001 |
DBLP DOI BibTeX RDF |
low-value transactions, security, Ad-hoc network, authentication, trust, public-key |
23 | Hyejoung Yoo, Kwangsoo Lee, Sangjin Lee 0002, Jongin Lim 0001 |
Off-Line Authentication Using Watermarks. |
ICISC |
2001 |
DBLP DOI BibTeX RDF |
off-line authentication, PS distortion, PSP distortion, e-commerce |
23 | Jaap-Henk Hoepman |
Secret Key Authentication with Software-Only Verification. |
Financial Cryptography |
2000 |
DBLP DOI BibTeX RDF |
symmetric key cryptography, authentication, smart cards |
23 | Chun-Shien Lu, Hong-Yuan Mark Liao |
Structural digital signature for image authentication: an incidental distortion resistant scheme. |
ACM Multimedia Workshops |
2000 |
DBLP DOI BibTeX RDF |
fragility, authentication, robustness, wavelet transform, digital signature |
23 | Stuart E. Schechter, Todd Parnell, Alexander J. Hartemink |
Anonymous Authentication of Membership in Dynamic Groups. |
Financial Cryptography |
1999 |
DBLP DOI BibTeX RDF |
key replacement, verifiably common secret encoding, authentication, anonymity, identification |
23 | Chiara Bodei, Pierpaolo Degano, Riccardo Focardi, Corrado Priami |
Authentication via Localized Names. |
CSFW |
1999 |
DBLP DOI BibTeX RDF |
Local Environments, Mobility, Authentication, Concurrency, Process Algebras |
23 | Mahmoud T. El-Hadidi, Nadia Hamed Hegazi, Heba Kamal Aslan |
Performance Evaluation of a New Hybrid Encryption Protocol for Authentication and Key Distribution. |
ISCC |
1999 |
DBLP DOI BibTeX RDF |
Authentication, Performance Analysis, Key Distribution, Hybrid Encryption |
23 | Steve A. Schneider |
Verifying Authentication Protocols in CSP. |
IEEE Trans. Software Eng. |
1998 |
DBLP DOI BibTeX RDF |
Needham-Schroeder protocol, verification, Authentication, formal methods, security protocols, CSP |
23 | Gerrit Bleumer |
Biometric yet Privacy Protecting Person Authentication. |
Information Hiding |
1998 |
DBLP DOI BibTeX RDF |
Non-transferable certificates, Wallets-with-observer, Biometric person authentication, Blind Signatures, Interactive proofs |
23 | Steve A. Schneider |
Verifying authentication protocols with CSP. |
CSFW |
1997 |
DBLP DOI BibTeX RDF |
Needham-Schroeder protocol, verification, Authentication, formal methods, security protocols, CSP |
23 | Malte Borderding |
Levels of Authentication in Distributed Agreement. |
WDAG |
1996 |
DBLP DOI BibTeX RDF |
crusader agreement, fault tolerance, distributed systems, authentication, Byzantine agreement |
23 | Gabriele Wedel, Volker Kessler |
Formal Semantics for Authentication Logics. |
ESORICS |
1996 |
DBLP DOI BibTeX RDF |
logic of authentication, Formal verification, key management, cryptographic protocols |
23 | Kwok-Yan Lam, Thomas Beth |
Timely Authentication in Distributed Systems. |
ESORICS |
1992 |
DBLP DOI BibTeX RDF |
Authentication Protocols, Interprocess Communications, Distributed Operating Systems |
22 | Dimitri do B. DeFigueiredo |
The Case for Mobile Two-Factor Authentication. |
IEEE Secur. Priv. |
2011 |
DBLP DOI BibTeX RDF |
mobile authentication, online PINs, offline PINs, mobile computing, mobile phones, computer security, passwords, PINs, two-factor authentication |
22 | Haowen Chan, Adrian Perrig |
Round-Efficient Broadcast Authentication Protocols for Fixed Topology Classes. |
IEEE Symposium on Security and Privacy |
2010 |
DBLP DOI BibTeX RDF |
Multicast Authentication, Linear Topology, Path Topology, Fully Connected Topology, Broadcast Authentication |
22 | Huy Hoang Ngo, Xianping Wu, Phu Dung Le, Bala Srinivasan 0002 |
An Authentication Model for Wireless Network Services. |
AINA |
2010 |
DBLP DOI BibTeX RDF |
wireless network services, dynamic keys, group authentication, authentication |
22 | Huachun Zhou, Hongke Zhang |
An Authentication Protocol for Proxy Mobile IPv6. |
MSN |
2008 |
DBLP DOI BibTeX RDF |
authentication latency, authentication cost, analytic model, proxy mobile IPv6 |
22 | Jørgen Brandt, Ivan Damgård, Peter Landrock, Torben P. Pedersen |
Zero-Knowledge Authentication Scheme with Secret Key Exchange. |
J. Cryptol. |
1998 |
DBLP DOI BibTeX RDF |
Authentication, Authentication, Key exchange, Key exchange, Zero-knowledge, Zero-knowledge, Key words |
21 | Matthew Canton |
The presence table: a reactive surface for ambient connection. |
TEI |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Gregory Neven |
Privacy-enhanced access control in primelife. |
Digital Identity Management |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Jan Camenisch, Markulf Kohlweiss, Claudio Soriente |
An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials. |
Public Key Cryptography |
2009 |
DBLP DOI BibTeX RDF |
revocation, anonymous credentials, dynamic accumulators |
21 | Ben-Jye Chang, Szu-Liang Kuo, Ying-Hsin Liang, De-Yu Wang |
Markov Chain-Based Trust Model for Analyzing Trust Value in Distributed Multicasting Mobile Ad Hoc Networks. |
APSCC |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Hiroshi Dozono, Masanori Nakakuni |
An integration method of multi-modal biometrics using supervised pareto learning self organizing maps. |
IJCNN |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Baoshi Zhu, Jiankang Wu, Mohan S. Kankanhalli |
Render Sequence Encoding for Document Protection. |
IEEE Trans. Multim. |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Manuel Sánchez, Gabriel López Millán, Óscar Cánovas Reverte, Antonio Fernandez Gómez-Skarmeta |
Bootstrapping a Global SSO from Network Access Control Mechanisms. |
EuroPKI |
2007 |
DBLP DOI BibTeX RDF |
authorization, federation, SSO, SAML |
21 | Saber Zrelli, Tunç D. Medeni, Yoichi Shinoda, Ihsan Tolga Medeni |
Improving Kerberos Security System for Cross-Realm Collaborative Interactions: An Innovative Example of Knowledge Technology for Evolving & Verifiable E-Society. |
RIVF |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Jinyoung Moon, Jongyoul Park, Eui Hyun Paik |
JavaCard-based Two-Level User Key Management for IP Conditional Access Systems. |
ICON |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Charalampos Papamanthou, Roberto Tamassia |
Time and Space Efficient Algorithms for Two-Party Authenticated Data Structures. |
ICICS |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Salekul Islam, J. William Atwood |
Sender Access Control in IP Multicast. |
LCN |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Hae Young Lee, Tae Ho Cho |
Key Inheritance-Based False Data Filtering Scheme in Wireless Sensor Networks. |
ICDCIT |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Hitoshi Morioka, Hiroshi Mano, Motoyuki Ohrnori, Masataka Ohta |
MIS Protocol for Secure Connection and Fast Handover on Wireless LAN. |
AINA (1) |
2006 |
DBLP DOI BibTeX RDF |
|
|
|