The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for authentication with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1973-1981 (18) 1982-1984 (22) 1985-1986 (22) 1987 (21) 1988 (25) 1989 (33) 1990 (36) 1991 (31) 1992 (40) 1993 (50) 1994 (65) 1995 (55) 1996 (112) 1997 (145) 1998 (98) 1999 (167) 2000 (208) 2001 (294) 2002 (330) 2003 (618) 2004 (905) 2005 (1106) 2006 (1033) 2007 (1140) 2008 (1183) 2009 (1031) 2010 (805) 2011 (788) 2012 (820) 2013 (879) 2014 (955) 2015 (1035) 2016 (1133) 2017 (1173) 2018 (1332) 2019 (1500) 2020 (1379) 2021 (1410) 2022 (1499) 2023 (1523) 2024 (379)
Publication types (Num. hits)
article(10875) book(17) data(3) incollection(161) inproceedings(14078) phdthesis(247) proceedings(17)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 8079 occurrences of 2235 keywords

Results
Found 25398 publication records. Showing 25398 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
23Michael J. Chapple, Nitesh V. Chawla, Aaron Striegel Authentication anomaly detection: a case study on a virtual private network. Search on Bibsonomy MineNet The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security, data mining, authentication, anomaly detection, virtual private network
23Ji-Yeon Kim, Jongjin Jung, Hoon Ko, Boyeon Kim, Susan Joe, Yongjun Lee, Yunseok Chang, Kyoon Ha Lee A Design of Authentication Protocol for Multi-key RFID Tag. Search on Bibsonomy APWeb/WAIM Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF multi-key, tag structure, RFID, authentication protocol
23Eun-Jun Yoon, Kee-Young Yoo A Secure Chaotic Hash-Based Biometric Remote User Authentication Scheme Using Mobile Devices. Search on Bibsonomy APWeb/WAIM Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Chaotic hash, Mobile devices, Cryptanalysis, Biometric authentication
23Tage Stabell-Kulø From the Editor: Security Community-Blurring the Line between Authentication and Identification. Search on Bibsonomy IEEE Distributed Syst. Online The full citation details ... 2006 DBLP  DOI  BibTeX  RDF security, authentication, identification
23Michel Abdalla, Emmanuel Bresson, Olivier Chevassut, Bodo Möller, David Pointcheval Provably secure password-based authentication in TLS. Search on Bibsonomy AsiaCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF encrypted key exchange, password authentication, TLS
23Mario Di Raimondo, Rosario Gennaro, Hugo Krawczyk Deniable authentication and key exchange. Search on Bibsonomy CCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF authentication, key exchange, deniability
23Yanjiang Yang, Robert H. Deng, Feng Bao 0001 Fortifying password authentication in integrated healthcare delivery systems. Search on Bibsonomy AsiaCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF integrated delivery systems (IDSs), password system, user authentication and key exchange, dictionary attack
23Willy Susilo, Yi Mu 0001 Separable Identity-Based Deniable Authentication: Cryptographic Primitive for Fighting Phishing. Search on Bibsonomy EuroPKI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF repudiable, authentication, email, phishing, separable, ID-based, deniable
23Eun-Jun Yoon, Kee-Young Yoo Enhanced Forward-Secure User Authentication Scheme with Smart Cards. Search on Bibsonomy EuroPKI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Authentication, Network security, Smart card, Secure protocol, Password
23Carsten Maple, Peter Norrington The Usability and Practicality of Biometric Authentication in the Workplace. Search on Bibsonomy ARES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF logical security, usability, authentication, biometrics, physical security
23Eun-Jun Yoon, Kee-Young Yoo Improving the Dynamic ID-Based Remote Mutual Authentication Scheme. Search on Bibsonomy OTM Workshops (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Dynamic ID, Authentication, Smart card, Password, Reflection attack
23Pedro Peris-Lopez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda EMAP: An Efficient Mutual-Authentication Protocol for Low-Cost RFID Tags. Search on Bibsonomy OTM Workshops (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Privacy, Ubiquitous Computing, RFID, Tracking, Tag, Pseudonym, Mutual-authentication, Reader
23Julien Bringer, Hervé Chabanne, Emmanuelle Dottax HB++: a Lightweight Authentication Protocol Secure against Some Attacks. Search on Bibsonomy SecPerU The full citation details ... 2006 DBLP  DOI  BibTeX  RDF We here show how a modification of the HB+ protocol thwarts Gilbert et al’s attack, The resulting protocol, HB++, remains a good choice for RFID authentication
23Christina Braz, Jean-Marc Robert 0002 Security and usability: the case of the user authentication methods. Search on Bibsonomy IHM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF access control, human factors, user interface design, user authentication, security usability
23Chul Sur, Jong-Phil Yang, Kyung Hyune Rhee A New Efficient Protocol for Authentication and Certificate Status Management in Personal Area Networks. Search on Bibsonomy ISCIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Efficient Authentication, Simplified Certificate Status Management, Personal Area Network, One-Time Signature
23Haiqing Hu, Peijun Xue, Haiyan Fu S-Rough Recognition of Knowledge and General Threshold Encryption Authentication Scheme of Recognition Conclusion. Search on Bibsonomy ISDA (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF S-rough sets, S-rough recognition, composition structure, threshold encryption authentication, algorithm
23Xiaowen Chu 0001, Yixin Jiang, Chuang Lin 0002, Fujun Feng Self-certified Mutual Authentication and Key Exchange Protocol for Roaming Services. Search on Bibsonomy ATC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Self-certified, roaming services, authentication
23Eun-Jun Yoon, Kee-Young Yoo Efficient Mutual Authentication Scheme with Smart Card. Search on Bibsonomy PRIMA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Authentication, Network security, Smart card, Secure protocol, Password
23Ronghui Wu, Renfa Li, Fei Yu 0001, Guangxue Yue, Cheng Xu 0001 Research on User Authentication for Grid Computing Security. Search on Bibsonomy SKG The full citation details ... 2006 DBLP  DOI  BibTeX  RDF grid computing security, Access control, anonymity, Authentication protocol
23Pedro Peris-Lopez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda M2AP: A Minimalist Mutual-Authentication Protocol for Low-Cost RFID Tags. Search on Bibsonomy UIC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Privacy, Ubiquitous Computing, RFID, Tag, Pseudonym, Mutual-Authentication, Reader
23Marc P. C. Fossorier, Miodrag J. Mihaljevic, Hideki Imai, Yang Cui 0001, Kanta Matsuura An Algorithm for Solving the LPN Problem and Its Application to Security Evaluation of the HB Protocols for RFID Authentication. Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF LPN problem, HB protocols, RFID authentication, cryptanalysis, fast correlation attacks
23Jianping Shi, Zhengjun Zhai Curvelet Transform for Image Authentication. Search on Bibsonomy RSKT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Authentication, curvelet transform, ridgelet transform
23Mark Luk, Adrian Perrig, Bram Whillock Seven cardinal properties of sensor network broadcast authentication. Search on Bibsonomy SASN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF sensor network, taxonomy, broadcast authentication
23Wen-Shenq Juang Efficient User Authentication and Key Agreement in Ubiquitous Computing. Search on Bibsonomy ICCSA (4) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Ubiquitous Computing, Network Security, Smart Card, User Authentication, Session Key
23Seonho Choi, Yanggon Kim Resource Requirement Analysis for a Predictive-Hashing Based Multicast Authentication Protocol. Search on Bibsonomy EUC Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF cryptographic hashing, authentication, protocol, multicast, denial-of-service, resource requirement
23Jai-Boo Oh, Jun-Cheol Jeon, Kee-Young Yoo Further Improvement of Manik et al.'s Remote User Authentication Scheme Using Smart Cards. Search on Bibsonomy ISPA Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Off-line guessing Attack, Authentication, Bilinear Pairing, Replay Attack, Forgery Attack
23Supriya Singh, Anuja Cabraal, Gabriele Hermansson What is your husband's name?: sociological dimensions of internet banking authentication. Search on Bibsonomy OZCHI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF sociological dimensions, authentication, qualitative research, Australia, Internet banking, security design
23Ya-Fen Chang, Chin-Chen Chang 0001, Yu-Wei Su A secure improvement on the user-friendly remote authentication scheme with no time concurrency mech. Search on Bibsonomy AINA (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF authentication, password, password guessing attack
23Daniel González-Jiménez, Federico Sukno, José Luis Alba-Castro, Alejandro F. Frangi Automatic Pose Correction for Local Feature-Based Face Authentication. Search on Bibsonomy AMDO The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Pose Correction, Face Authentication, Automatic Segmentation
23Iuon-Chang Lin, Hsia-Hung Ou, Min-Shiang Hwang A user authentication system using back-propagation network. Search on Bibsonomy Neural Comput. Appl. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Neural network, Information security, User authentication, One-way hash function, Back-propagation network
23Chun-Shien Lu, Chao-Yong Hsu Geometric distortion-resilient image hashing scheme and its applications on copy detection and authentication. Search on Bibsonomy Multim. Syst. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Authentication, Searching, Robustness, Hash, Copy detection, Geometric distortion
23Bruce Schneier Authentication and Expiration. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF username and password, authentication, e-commerce
23Ya-Fen Chang, Chin-Chen Chang 0001 An efficient authentication protocol for mobile satellite communication systems. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF authentication, satellite communication, perfect forward secrecy
23Mikhail J. Atallah, Keith B. Frikken, Michael T. Goodrich, Roberto Tamassia Secure Biometric Authentication for Weak Computational Devices. Search on Bibsonomy Financial Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF authentication, biometrics, smart cards, cryptographic hash functions
23Yixin Jiang, Chuang Lin 0002, Xuemin Shen, Minghui Shi Mutual Authentication and Key Exchange Protocols with Anonymity Property for Roaming Services. Search on Bibsonomy NETWORKING The full citation details ... 2005 DBLP  DOI  BibTeX  RDF roaming service, secret-splitting, self-certified, authentication, anonymity, key exchange
23Saeed Rajput, Jihong Chen, Sam Hsu State based authentication. Search on Bibsonomy ACM Southeast Regional Conference (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF rule-based attack, syllable attack, security, authentication, access control, attack, password, help-desk, vulnerabilities, dictionary attack, unauthorized access, password management
23Eun-Jun Yoon, Kee-Young Yoo Secure Fingerprint-Based Remote User Authentication Scheme Using Smartcards. Search on Bibsonomy WINE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Smartcard, User authentication, Fingerprint verification
23Jinghua Wen, Mei Zhang, Xiang Li The study on the application of BAN logic in formal analysis of authentication protocols. Search on Bibsonomy ICEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF formalization analysis, authentication protocols, BAN logic
23Keunwoo Rhee, Jin Kwak, Seungjoo Kim, Dongho Won Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment. Search on Bibsonomy SPC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF authentication, RFID system, Challenge-Response
23Hung-Min Sun, Cheng-Ta Yang RSA with Balanced Short Exponents and Its Application to Entity Authentication. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Short Exponent Attack, RSA, Lattice Reduction, Entity Authentication
23Zhishou Zhang, Qibin Sun, Wai-Choong Wong A proposal of butterfly-graph based stream authentication over lossy networks. Search on Bibsonomy ICME The full citation details ... 2005 DBLP  DOI  BibTeX  RDF sender-receiver delay, butterfly-graph scheme, lossy network, packet streaming, authentication scheme
23Eun-Jun Yoon, Woo-Hun Kim, Kee-Young Yoo Robust and Simple Authentication Protocol for Secure Communication on the Web. Search on Bibsonomy ICWE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Denning-Sacco attack, Security, Authentication, Cryptography, Smart card, Key establishment, Forward Secrecy
23Raphael Chung-Wei Phan, Bok-Min Goi On the Rila-Mitchell Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards. Search on Bibsonomy ICCSA (4) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF cardholder authentication, biometrics, attacks, Smartcards
23Raphael Chung-Wei Phan, Bok-Min Goi On the Rila-Mitchell Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards. Search on Bibsonomy ICCSA (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF cardholder authentication, biometrics, attacks, Smartcards
23Dimitris Nikitopoulos, Nikolaos Papaoulakis, Angelos Trakos, Alexandros Giamas, Efstathios D. Sykas, Michael E. Theologou Authentication platform for seamless handover in heterogeneous environments. Search on Bibsonomy ICAS/ICNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Authentication, WLAN, GPRS, Mobile IPv6, Heterogeneous environment, Seamless handover
23Manik Lal Das, Ashutosh Saxena SPAM: Secure Protocol for Authentication in Mobile-Communications. Search on Bibsonomy ICMB The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Mutual key control, Authentication, digital signature, Mobile communications, Bilinear Pairings
23Eun-Jun Yoon, Woo-Hun Kim, Kee-Young Yoo Security Enhancement for Password Authentication Schemes with Smart Cards. Search on Bibsonomy TrustBus The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Cryptography, Smart card, Password authentication
23Cunsheng Ding, Xiaojian Tian Three Constructions of Authentication Codes with Perfect Secrecy. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF perfect nonlinear mappings, cryptography, secrecy, authentication codes
23Horng-Twu Liaw, Shiou-Wei Fan, Wei-Chen Wu A simple password authentication using a polynomial. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF security, authentication, password
23Maja Pusara, Carla E. Brodley User re-authentication via mouse movements. Search on Bibsonomy VizSEC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF mouse dynamics, user re-authentication, anomaly detection
23Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo Security of Shen et al.'s Timestamp-Based Password Authentication Scheme. Search on Bibsonomy ICCSA (4) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF security, authentication, Cryptography, smart card, password
23Xiang Zhou, Xiaohui Duan, Daoxian Wang A Semi-Fragile Watermark Scheme For Image Authentication. Search on Bibsonomy MMM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Image Authentication DWT BCH Private Key Semi-fragile Watermark
23Chin-Chen Chang 0001, Ya-Fen Chang Yet Another Attack on a QR-based Password Authentication System. Search on Bibsonomy AINA (2) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF password authentication, QR, quadratic residues
23Chien-Hsung Chen, Long-Wen Chang A Digital Watermarking Scheme for Personal Image Authentication Using Eigenface. Search on Bibsonomy PCM (3) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Digital watermarking, eigenface, personal authentication
23Xin Li 0010, Mizuhito Ogawa A Lightweight Mutual Authentication Based on Proxy Certificate Trust List. Search on Bibsonomy PDCAT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Grid Computing, Mutual Authentication, Proxy Certificate
23Hyun-Sung Kim 0001, Sung-Woon Lee, Kee-Young Yoo ID-based password authentication scheme using smart cards and fingerprints. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF ID-based scheme, smart card, fingerprint, password authentication
23Yuqing Zhang, Dehua Zhang Authentication and Access Control in P2P Network. Search on Bibsonomy GCC (1) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF authentication, access control, network security, P2P Network
23Douglas L. Whiting, Michael J. Sabin Montgomery Prime Hashing for Message Authentication. Search on Bibsonomy CT-RSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF MAC, message authentication, Universal hash
23Mohamed Al-Ibrahim, Anton Cerný Authentication of Anycast Communication. Search on Bibsonomy MMM-ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF authentication, proxy signature, Anycast
23Alan Harbitter, Daniel A. Menascé A methodology for analyzing the performance of authentication protocols. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF mobile computing, Authentication, performance modeling, public key cryptography, proxy servers, Kerberos
23Mark D. Corner, Brian Noble Zero-interaction authentication. Search on Bibsonomy MobiCom The full citation details ... 2002 DBLP  DOI  BibTeX  RDF transient authentication, mobile computing, stackable file systems, cryptographic file systems
23Dylan Carline, Paul Coulton Internet Authentication of LUT-Based FPGA Configuration Files. Search on Bibsonomy IPDPS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Configuration Files, FPGA, Authentication, Bitstream
23Jalal Al-Muhtadi, Anand Ranganathan, Roy H. Campbell, M. Dennis Mickunas A Flexible, Privacy-Preserving Authentication Framework for Ubiquitous Computing Environments. Search on Bibsonomy ICDCS Workshops The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Mist, security, privacy, Ubiquitous computing, authentication, context-awareness
23Jung-Min Park 0001, Edwin K. P. Chong, Howard Jay Siegel Efficient Multicast Packet Authentication Using Signature Amortization. Search on Bibsonomy S&P The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Information Dispersal Algorithm (IDA), authentication, multicast, digital signatures, erasure codes
23Anastasios Tefas, Constantine Kotropoulos, Ioannis Pitas Using Support Vector Machines to Enhance the Performance of Elastic Graph Matching for Frontal Face Authentication. Search on Bibsonomy IEEE Trans. Pattern Anal. Mach. Intell. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Fisher's discriminant ratio, constrained least-squares optimization, Support Vector Machines, Face authentication, elastic graph matching
23Horatiu Cirstea Specifying Authentication Protocols Using Rewriting and Strategies. Search on Bibsonomy PADL The full citation details ... 2001 DBLP  DOI  BibTeX  RDF model-checking, strategy, rewriting, authentication protocols
23Alan Harbitter, Daniel A. Menascé The performance of public key-enabled kerberos authentication in mobile computing applications. Search on Bibsonomy CCS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF mobile computing, authentication, performance modeling, public key cryptography, proxy servers, kerberos
23Markus Jakobsson, David Pointcheval Mutual Authentication for Low-Power Mobile Devices. Search on Bibsonomy Financial Cryptography The full citation details ... 2001 DBLP  BibTeX  RDF gap problem, Low power, medical informatics, mutual authentication
23Chih-Hsuan Tzeng, Wen-Hsiang Tsai A new technique for authentication of image/video for multimedia applications. Search on Bibsonomy MM&Sec The full citation details ... 2001 DBLP  DOI  BibTeX  RDF JPEG/MPEG compression, compression tolerance, image/video authentication, digital signature
23André Weimerskirch, Gilles Thonet A Distributed Light-Weight Authentication Model for Ad-hoc Networks. Search on Bibsonomy ICISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF low-value transactions, security, Ad-hoc network, authentication, trust, public-key
23Hyejoung Yoo, Kwangsoo Lee, Sangjin Lee 0002, Jongin Lim 0001 Off-Line Authentication Using Watermarks. Search on Bibsonomy ICISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF off-line authentication, PS distortion, PSP distortion, e-commerce
23Jaap-Henk Hoepman Secret Key Authentication with Software-Only Verification. Search on Bibsonomy Financial Cryptography The full citation details ... 2000 DBLP  DOI  BibTeX  RDF symmetric key cryptography, authentication, smart cards
23Chun-Shien Lu, Hong-Yuan Mark Liao Structural digital signature for image authentication: an incidental distortion resistant scheme. Search on Bibsonomy ACM Multimedia Workshops The full citation details ... 2000 DBLP  DOI  BibTeX  RDF fragility, authentication, robustness, wavelet transform, digital signature
23Stuart E. Schechter, Todd Parnell, Alexander J. Hartemink Anonymous Authentication of Membership in Dynamic Groups. Search on Bibsonomy Financial Cryptography The full citation details ... 1999 DBLP  DOI  BibTeX  RDF key replacement, verifiably common secret encoding, authentication, anonymity, identification
23Chiara Bodei, Pierpaolo Degano, Riccardo Focardi, Corrado Priami Authentication via Localized Names. Search on Bibsonomy CSFW The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Local Environments, Mobility, Authentication, Concurrency, Process Algebras
23Mahmoud T. El-Hadidi, Nadia Hamed Hegazi, Heba Kamal Aslan Performance Evaluation of a New Hybrid Encryption Protocol for Authentication and Key Distribution. Search on Bibsonomy ISCC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Authentication, Performance Analysis, Key Distribution, Hybrid Encryption
23Steve A. Schneider Verifying Authentication Protocols in CSP. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Needham-Schroeder protocol, verification, Authentication, formal methods, security protocols, CSP
23Gerrit Bleumer Biometric yet Privacy Protecting Person Authentication. Search on Bibsonomy Information Hiding The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Non-transferable certificates, Wallets-with-observer, Biometric person authentication, Blind Signatures, Interactive proofs
23Steve A. Schneider Verifying authentication protocols with CSP. Search on Bibsonomy CSFW The full citation details ... 1997 DBLP  DOI  BibTeX  RDF Needham-Schroeder protocol, verification, Authentication, formal methods, security protocols, CSP
23Malte Borderding Levels of Authentication in Distributed Agreement. Search on Bibsonomy WDAG The full citation details ... 1996 DBLP  DOI  BibTeX  RDF crusader agreement, fault tolerance, distributed systems, authentication, Byzantine agreement
23Gabriele Wedel, Volker Kessler Formal Semantics for Authentication Logics. Search on Bibsonomy ESORICS The full citation details ... 1996 DBLP  DOI  BibTeX  RDF logic of authentication, Formal verification, key management, cryptographic protocols
23Kwok-Yan Lam, Thomas Beth Timely Authentication in Distributed Systems. Search on Bibsonomy ESORICS The full citation details ... 1992 DBLP  DOI  BibTeX  RDF Authentication Protocols, Interprocess Communications, Distributed Operating Systems
22Dimitri do B. DeFigueiredo The Case for Mobile Two-Factor Authentication. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF mobile authentication, online PINs, offline PINs, mobile computing, mobile phones, computer security, passwords, PINs, two-factor authentication
22Haowen Chan, Adrian Perrig Round-Efficient Broadcast Authentication Protocols for Fixed Topology Classes. Search on Bibsonomy IEEE Symposium on Security and Privacy The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Multicast Authentication, Linear Topology, Path Topology, Fully Connected Topology, Broadcast Authentication
22Huy Hoang Ngo, Xianping Wu, Phu Dung Le, Bala Srinivasan 0002 An Authentication Model for Wireless Network Services. Search on Bibsonomy AINA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF wireless network services, dynamic keys, group authentication, authentication
22Huachun Zhou, Hongke Zhang An Authentication Protocol for Proxy Mobile IPv6. Search on Bibsonomy MSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF authentication latency, authentication cost, analytic model, proxy mobile IPv6
22Jørgen Brandt, Ivan Damgård, Peter Landrock, Torben P. Pedersen Zero-Knowledge Authentication Scheme with Secret Key Exchange. Search on Bibsonomy J. Cryptol. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Authentication, Authentication, Key exchange, Key exchange, Zero-knowledge, Zero-knowledge, Key words
21Matthew Canton The presence table: a reactive surface for ambient connection. Search on Bibsonomy TEI The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
21Gregory Neven Privacy-enhanced access control in primelife. Search on Bibsonomy Digital Identity Management The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
21Jan Camenisch, Markulf Kohlweiss, Claudio Soriente An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF revocation, anonymous credentials, dynamic accumulators
21Ben-Jye Chang, Szu-Liang Kuo, Ying-Hsin Liang, De-Yu Wang Markov Chain-Based Trust Model for Analyzing Trust Value in Distributed Multicasting Mobile Ad Hoc Networks. Search on Bibsonomy APSCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21Hiroshi Dozono, Masanori Nakakuni An integration method of multi-modal biometrics using supervised pareto learning self organizing maps. Search on Bibsonomy IJCNN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21Baoshi Zhu, Jiankang Wu, Mohan S. Kankanhalli Render Sequence Encoding for Document Protection. Search on Bibsonomy IEEE Trans. Multim. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
21Manuel Sánchez, Gabriel López Millán, Óscar Cánovas Reverte, Antonio Fernandez Gómez-Skarmeta Bootstrapping a Global SSO from Network Access Control Mechanisms. Search on Bibsonomy EuroPKI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF authorization, federation, SSO, SAML
21Saber Zrelli, Tunç D. Medeni, Yoichi Shinoda, Ihsan Tolga Medeni Improving Kerberos Security System for Cross-Realm Collaborative Interactions: An Innovative Example of Knowledge Technology for Evolving & Verifiable E-Society. Search on Bibsonomy RIVF The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
21Jinyoung Moon, Jongyoul Park, Eui Hyun Paik JavaCard-based Two-Level User Key Management for IP Conditional Access Systems. Search on Bibsonomy ICON The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
21Charalampos Papamanthou, Roberto Tamassia Time and Space Efficient Algorithms for Two-Party Authenticated Data Structures. Search on Bibsonomy ICICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
21Salekul Islam, J. William Atwood Sender Access Control in IP Multicast. Search on Bibsonomy LCN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
21Hae Young Lee, Tae Ho Cho Key Inheritance-Based False Data Filtering Scheme in Wireless Sensor Networks. Search on Bibsonomy ICDCIT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
21Hitoshi Morioka, Hiroshi Mano, Motoyuki Ohrnori, Masataka Ohta MIS Protocol for Secure Connection and Fast Handover on Wireless LAN. Search on Bibsonomy AINA (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
Displaying result #701 - #800 of 25398 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license