|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 8079 occurrences of 2235 keywords
|
|
|
Results
Found 25398 publication records. Showing 25398 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
23 | Michael J. Chapple, Nitesh V. Chawla, Aaron Striegel |
Authentication anomaly detection: a case study on a virtual private network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MineNet ![In: Proceedings of the 3rd Annual ACM Workshop on Mining Network Data, MineNet 2007, San Diego, California, USA, June 12, 2007, pp. 17-22, 2007, ACM, 978-1-59593-792-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
security, data mining, authentication, anomaly detection, virtual private network |
23 | Ji-Yeon Kim, Jongjin Jung, Hoon Ko, Boyeon Kim, Susan Joe, Yongjun Lee, Yunseok Chang, Kyoon Ha Lee |
A Design of Authentication Protocol for Multi-key RFID Tag. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APWeb/WAIM Workshops ![In: Advances in Web and Network Technologies, and Information Management, APWeb/WAIM 2007 International Workshops: DBMAN 2007, WebETrends 2007, PAIS 2007 and ASWAN 2007, Huang Shan, China, June 16-18, 2007, Proceedings, pp. 644-653, 2007, Springer, 978-3-540-72908-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
multi-key, tag structure, RFID, authentication protocol |
23 | Eun-Jun Yoon, Kee-Young Yoo |
A Secure Chaotic Hash-Based Biometric Remote User Authentication Scheme Using Mobile Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APWeb/WAIM Workshops ![In: Advances in Web and Network Technologies, and Information Management, APWeb/WAIM 2007 International Workshops: DBMAN 2007, WebETrends 2007, PAIS 2007 and ASWAN 2007, Huang Shan, China, June 16-18, 2007, Proceedings, pp. 612-623, 2007, Springer, 978-3-540-72908-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Chaotic hash, Mobile devices, Cryptanalysis, Biometric authentication |
23 | Tage Stabell-Kulø |
From the Editor: Security Community-Blurring the Line between Authentication and Identification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Distributed Syst. Online ![In: IEEE Distributed Syst. Online 7(2), 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
security, authentication, identification |
23 | Michel Abdalla, Emmanuel Bresson, Olivier Chevassut, Bodo Möller, David Pointcheval |
Provably secure password-based authentication in TLS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2006, Taipei, Taiwan, March 21-24, 2006, pp. 35-45, 2006, ACM, 1-59593-272-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
encrypted key exchange, password authentication, TLS |
23 | Mario Di Raimondo, Rosario Gennaro, Hugo Krawczyk |
Deniable authentication and key exchange. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, October 30 - November 3, 2006, pp. 400-409, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
authentication, key exchange, deniability |
23 | Yanjiang Yang, Robert H. Deng, Feng Bao 0001 |
Fortifying password authentication in integrated healthcare delivery systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2006, Taipei, Taiwan, March 21-24, 2006, pp. 255-265, 2006, ACM, 1-59593-272-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
integrated delivery systems (IDSs), password system, user authentication and key exchange, dictionary attack |
23 | Willy Susilo, Yi Mu 0001 |
Separable Identity-Based Deniable Authentication: Cryptographic Primitive for Fighting Phishing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, Third European PKI Workshop: Theory and Practice, EuroPKI 2006, Turin, Italy, June 19-20, 2006, Proceedings, pp. 68-80, 2006, Springer, 3-540-35151-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
repudiable, authentication, email, phishing, separable, ID-based, deniable |
23 | Eun-Jun Yoon, Kee-Young Yoo |
Enhanced Forward-Secure User Authentication Scheme with Smart Cards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, Third European PKI Workshop: Theory and Practice, EuroPKI 2006, Turin, Italy, June 19-20, 2006, Proceedings, pp. 197-206, 2006, Springer, 3-540-35151-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Authentication, Network security, Smart card, Secure protocol, Password |
23 | Carsten Maple, Peter Norrington |
The Usability and Practicality of Biometric Authentication in the Workplace. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The First International Conference on Availability, Reliability and Security, ARES 2006, The International Dependability Conference - Bridging Theory and Practice, April 20-22 2006, Vienna University of Technology, Austria, pp. 958-964, 2006, IEEE Computer Society, 0-7695-2567-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
logical security, usability, authentication, biometrics, physical security |
23 | Eun-Jun Yoon, Kee-Young Yoo |
Improving the Dynamic ID-Based Remote Mutual Authentication Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OTM Workshops (1) ![In: On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, OTM Confederated International Workshops and Posters, AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET, OnToContent, ORM, PerSys, OTM Academy Doctoral Consortium, RDDS, SWWS, and SeBGIS 2006, Montpellier, France, October 29 - November 3, 2006. Proceedings, Part I, pp. 499-507, 2006, Springer, 3-540-48269-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Dynamic ID, Authentication, Smart card, Password, Reflection attack |
23 | Pedro Peris-Lopez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda |
EMAP: An Efficient Mutual-Authentication Protocol for Low-Cost RFID Tags. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OTM Workshops (1) ![In: On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, OTM Confederated International Workshops and Posters, AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET, OnToContent, ORM, PerSys, OTM Academy Doctoral Consortium, RDDS, SWWS, and SeBGIS 2006, Montpellier, France, October 29 - November 3, 2006. Proceedings, Part I, pp. 352-361, 2006, Springer, 3-540-48269-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Privacy, Ubiquitous Computing, RFID, Tracking, Tag, Pseudonym, Mutual-authentication, Reader |
23 | Julien Bringer, Hervé Chabanne, Emmanuelle Dottax |
HB++: a Lightweight Authentication Protocol Secure against Some Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecPerU ![In: Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU 2006), 29 June 2006, Lyon, France, pp. 28-33, 2006, IEEE Computer Society, 0-7695-2549-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
We here show how a modification of the HB+ protocol thwarts Gilbert et al’s attack, The resulting protocol, HB++, remains a good choice for RFID authentication |
23 | Christina Braz, Jean-Marc Robert 0002 |
Security and usability: the case of the user authentication methods. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IHM ![In: Proceedings of the 18th International Conference of the Association Francophone d'Interaction Homme-Machine, Montreal, Quebec, Canada, 18-21 April 2006, pp. 199-203, 2006, ACM, 1-59593-350-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
access control, human factors, user interface design, user authentication, security usability |
23 | Chul Sur, Jong-Phil Yang, Kyung Hyune Rhee |
A New Efficient Protocol for Authentication and Certificate Status Management in Personal Area Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCIS ![In: Computer and Information Sciences - ISCIS 2006, 21th International Symposium, Istanbul, Turkey, November 1-3, 2006, Proceedings, pp. 952-962, 2006, Springer, 3-540-47242-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Efficient Authentication, Simplified Certificate Status Management, Personal Area Network, One-Time Signature |
23 | Haiqing Hu, Peijun Xue, Haiyan Fu |
S-Rough Recognition of Knowledge and General Threshold Encryption Authentication Scheme of Recognition Conclusion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISDA (1) ![In: Proceedings of the Sixth International Conference on Intelligent Systems Design and Applications (ISDA 2006), October 16-18, 2006, Jinan, China, pp. 816-824, 2006, IEEE Computer Society, 0-7695-2528-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
S-rough sets, S-rough recognition, composition structure, threshold encryption authentication, algorithm |
23 | Xiaowen Chu 0001, Yixin Jiang, Chuang Lin 0002, Fujun Feng |
Self-certified Mutual Authentication and Key Exchange Protocol for Roaming Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ATC ![In: Autonomic and Trusted Computing, Third International Conference, ATC 2006, Wuhan, China, September 3-6, 2006, Proceedings, pp. 408-417, 2006, Springer, 3-540-38619-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Self-certified, roaming services, authentication |
23 | Eun-Jun Yoon, Kee-Young Yoo |
Efficient Mutual Authentication Scheme with Smart Card. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PRIMA ![In: Agent Computing and Multi-Agent Systems, 9th Pacific Rim International Workshop on Multi-Agents, PRIMA 2006, Guilin, China, August 7-8, 2006, Proceedings, pp. 813-818, 2006, Springer, 3-540-36707-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Authentication, Network security, Smart card, Secure protocol, Password |
23 | Ronghui Wu, Renfa Li, Fei Yu 0001, Guangxue Yue, Cheng Xu 0001 |
Research on User Authentication for Grid Computing Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SKG ![In: 2006 International Conference on Semantics, Knowledge and Grid (SKG 2006), 1-3 November 2006, Guilin, China, pp. 72, 2006, IEEE Computer Society, 0-7695-2673-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
grid computing security, Access control, anonymity, Authentication protocol |
23 | Pedro Peris-Lopez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda |
M2AP: A Minimalist Mutual-Authentication Protocol for Low-Cost RFID Tags. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UIC ![In: Ubiquitous Intelligence and Computing, Third International Conference, UIC 2006, Wuhan, China, September 3-6, 2006, Proceedings, pp. 912-923, 2006, Springer, 3-540-38091-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Privacy, Ubiquitous Computing, RFID, Tag, Pseudonym, Mutual-Authentication, Reader |
23 | Marc P. C. Fossorier, Miodrag J. Mihaljevic, Hideki Imai, Yang Cui 0001, Kanta Matsuura |
An Algorithm for Solving the LPN Problem and Its Application to Security Evaluation of the HB Protocols for RFID Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2006, 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings, pp. 48-62, 2006, Springer, 3-540-49767-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
LPN problem, HB protocols, RFID authentication, cryptanalysis, fast correlation attacks |
23 | Jianping Shi, Zhengjun Zhai |
Curvelet Transform for Image Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RSKT ![In: Rough Sets and Knowledge Technology, First International Conference, RSKT 2006, Chongqing, China, July 24-26, 2006, Proceedings, pp. 659-664, 2006, Springer, 3-540-36297-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Authentication, curvelet transform, ridgelet transform |
23 | Mark Luk, Adrian Perrig, Bram Whillock |
Seven cardinal properties of sensor network broadcast authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SASN ![In: Proceedings of the 4th ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2006, Alexandria, VA, USA, October 30, 2006, pp. 147-156, 2006, ACM, 1-59593-554-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
sensor network, taxonomy, broadcast authentication |
23 | Wen-Shenq Juang |
Efficient User Authentication and Key Agreement in Ubiquitous Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (4) ![In: Computational Science and Its Applications - ICCSA 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part IV, pp. 396-405, 2006, Springer, 3-540-34077-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Ubiquitous Computing, Network Security, Smart Card, User Authentication, Session Key |
23 | Seonho Choi, Yanggon Kim |
Resource Requirement Analysis for a Predictive-Hashing Based Multicast Authentication Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC Workshops ![In: Emerging Directions in Embedded and Ubiquitous Computing, EUC 2006 Workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Seoul, Korea, August 1-4, 2006, Proceedings, pp. 302-311, 2006, Springer, 3-540-36850-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
cryptographic hashing, authentication, protocol, multicast, denial-of-service, resource requirement |
23 | Jai-Boo Oh, Jun-Cheol Jeon, Kee-Young Yoo |
Further Improvement of Manik et al.'s Remote User Authentication Scheme Using Smart Cards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPA Workshops ![In: Frontiers of High Performance Computing and Networking - ISPA 2006 Workshops, ISPA 2006 International Workshops, FHPCN, XHPC, S-GRACE, GridGIS, HPC-GTP, PDCE, ParDMCom, WOMP, ISDF, and UPWN, Sorrento, Italy, December 4-7, 2006, Proceedings, pp. 57-64, 2006, Springer, 3-540-49860-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Off-line guessing Attack, Authentication, Bilinear Pairing, Replay Attack, Forgery Attack |
23 | Supriya Singh, Anuja Cabraal, Gabriele Hermansson |
What is your husband's name?: sociological dimensions of internet banking authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OZCHI ![In: Proceedings of the 2006 Australasian Computer-Human Interaction Conference, OZCHI 2006, Sydney, Australia, November 20-24, 2006, pp. 237-244, 2006, ACM, 1-59593-545-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
sociological dimensions, authentication, qualitative research, Australia, Internet banking, security design |
23 | Ya-Fen Chang, Chin-Chen Chang 0001, Yu-Wei Su |
A secure improvement on the user-friendly remote authentication scheme with no time concurrency mech. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA (2) ![In: 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 18-20 April 2006, Vienna, Austria, pp. 741-745, 2006, IEEE Computer Society, 0-7695-2466-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
authentication, password, password guessing attack |
23 | Daniel González-Jiménez, Federico Sukno, José Luis Alba-Castro, Alejandro F. Frangi |
Automatic Pose Correction for Local Feature-Based Face Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AMDO ![In: Articulated Motion and Deformable Objects, 4th International Conference, AMDO 2006, Port d'Andratx, Mallorca, Spain, July 11-14, 2006, Proceedings, pp. 356-365, 2006, Springer, 3-540-36031-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Pose Correction, Face Authentication, Automatic Segmentation |
23 | Iuon-Chang Lin, Hsia-Hung Ou, Min-Shiang Hwang |
A user authentication system using back-propagation network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Neural Comput. Appl. ![In: Neural Comput. Appl. 14(3), pp. 243-249, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Neural network, Information security, User authentication, One-way hash function, Back-propagation network |
23 | Chun-Shien Lu, Chao-Yong Hsu |
Geometric distortion-resilient image hashing scheme and its applications on copy detection and authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Syst. ![In: Multim. Syst. 11(2), pp. 159-173, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Authentication, Searching, Robustness, Hash, Copy detection, Geometric distortion |
23 | Bruce Schneier |
Authentication and Expiration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 3(1), pp. 88, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
username and password, authentication, e-commerce |
23 | Ya-Fen Chang, Chin-Chen Chang 0001 |
An efficient authentication protocol for mobile satellite communication systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGOPS Oper. Syst. Rev. ![In: ACM SIGOPS Oper. Syst. Rev. 39(1), pp. 70-84, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
authentication, satellite communication, perfect forward secrecy |
23 | Mikhail J. Atallah, Keith B. Frikken, Michael T. Goodrich, Roberto Tamassia |
Secure Biometric Authentication for Weak Computational Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 9th International Conference, FC 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers, pp. 357-371, 2005, Springer, 3-540-26656-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
authentication, biometrics, smart cards, cryptographic hash functions |
23 | Yixin Jiang, Chuang Lin 0002, Xuemin Shen, Minghui Shi |
Mutual Authentication and Key Exchange Protocols with Anonymity Property for Roaming Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NETWORKING ![In: NETWORKING 2005: Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems, 4th International IFIP-TC6 Networking Conference, Waterloo, Canada, May 2-6, 2005, Proceedings, pp. 114-125, 2005, Springer, 3-540-25809-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
roaming service, secret-splitting, self-certified, authentication, anonymity, key exchange |
23 | Saeed Rajput, Jihong Chen, Sam Hsu |
State based authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Southeast Regional Conference (2) ![In: Proceedings of the 43nd Annual Southeast Regional Conference, 2005, Kennesaw, Georgia, Alabama, USA, March 18-20, 2005, Volume 2, pp. 160-165, 2005, ACM. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
rule-based attack, syllable attack, security, authentication, access control, attack, password, help-desk, vulnerabilities, dictionary attack, unauthorized access, password management |
23 | Eun-Jun Yoon, Kee-Young Yoo |
Secure Fingerprint-Based Remote User Authentication Scheme Using Smartcards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WINE ![In: Internet and Network Economics, First International Workshop, WINE 2005, Hong Kong, China, December 15-17, 2005, Proceedings, pp. 405-413, 2005, Springer, 3-540-30900-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Smartcard, User authentication, Fingerprint verification |
23 | Jinghua Wen, Mei Zhang, Xiang Li |
The study on the application of BAN logic in formal analysis of authentication protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEC ![In: Proceedings of the 7th International Conference on Electronic Commerce, ICEC 2005, Xi'an, China, August 15-17, 2005, pp. 744-747, 2005, ACM, 1-59593-112-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
formalization analysis, authentication protocols, BAN logic |
23 | Keunwoo Rhee, Jin Kwak, Seungjoo Kim, Dongho Won |
Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPC ![In: Security in Pervasive Computing, Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings, pp. 70-84, 2005, Springer, 3-540-25521-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
authentication, RFID system, Challenge-Response |
23 | Hung-Min Sun, Cheng-Ta Yang |
RSA with Balanced Short Exponents and Its Application to Entity Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2005, 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005, Proceedings, pp. 199-215, 2005, Springer, 3-540-24454-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Short Exponent Attack, RSA, Lattice Reduction, Entity Authentication |
23 | Zhishou Zhang, Qibin Sun, Wai-Choong Wong |
A proposal of butterfly-graph based stream authentication over lossy networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICME ![In: Proceedings of the 2005 IEEE International Conference on Multimedia and Expo, ICME 2005, July 6-9, 2005, Amsterdam, The Netherlands, pp. 784-787, 2005, IEEE Computer Society, 0-7803-9331-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
sender-receiver delay, butterfly-graph scheme, lossy network, packet streaming, authentication scheme |
23 | Eun-Jun Yoon, Woo-Hun Kim, Kee-Young Yoo |
Robust and Simple Authentication Protocol for Secure Communication on the Web. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICWE ![In: Web Engineering, 5th International Conference, ICWE 2005, Sydney, Australia, July 27-29, 2005, Proceedings, pp. 352-362, 2005, Springer, 3-540-27996-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Denning-Sacco attack, Security, Authentication, Cryptography, Smart card, Key establishment, Forward Secrecy |
23 | Raphael Chung-Wei Phan, Bok-Min Goi |
On the Rila-Mitchell Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (4) ![In: Computational Science and Its Applications - ICCSA 2005, International Conference, Singapore, May 9-12, 2005, Proceedings, Part IV, pp. 1065-1074, 2005, Springer, 3-540-25863-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
cardholder authentication, biometrics, attacks, Smartcards |
23 | Raphael Chung-Wei Phan, Bok-Min Goi |
On the Rila-Mitchell Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (1) ![In: Computational Science and Its Applications - ICCSA 2005, International Conference, Singapore, May 9-12, 2005, Proceedings, Part I, pp. 488-497, 2005, Springer, 3-540-25860-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
cardholder authentication, biometrics, attacks, Smartcards |
23 | Dimitris Nikitopoulos, Nikolaos Papaoulakis, Angelos Trakos, Alexandros Giamas, Efstathios D. Sykas, Michael E. Theologou |
Authentication platform for seamless handover in heterogeneous environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICAS/ICNS ![In: Joint International Conference on Autonomic and Autonomous Systems 2005 / International Conference on Networking and Services 2005, ICAS/ICNS 2005, Papeete, Tahiti, France, October 23-28, 2005, pp. 36, 2005, IEEE Computer Society, 0-7695-2450-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Authentication, WLAN, GPRS, Mobile IPv6, Heterogeneous environment, Seamless handover |
23 | Manik Lal Das, Ashutosh Saxena |
SPAM: Secure Protocol for Authentication in Mobile-Communications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICMB ![In: 2005 International Conference on Mobile Business (ICMB 2005), 11-13 July 2005, Sydney, Australia, pp. 23-27, 2005, IEEE Computer Society, 0-7695-2367-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Mutual key control, Authentication, digital signature, Mobile communications, Bilinear Pairings |
23 | Eun-Jun Yoon, Woo-Hun Kim, Kee-Young Yoo |
Security Enhancement for Password Authentication Schemes with Smart Cards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustBus ![In: Trust, Privacy and Security in Digital Business: Second International Conference, TrustBus 2005, Copenhagen, Denmark, August 22-26, 2005, Proceedings, pp. 311-320, 2005, Springer, 3-540-28224-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Cryptography, Smart card, Password authentication |
23 | Cunsheng Ding, Xiaojian Tian |
Three Constructions of Authentication Codes with Perfect Secrecy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 33(3), pp. 227-239, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
perfect nonlinear mappings, cryptography, secrecy, authentication codes |
23 | Horng-Twu Liaw, Shiou-Wei Fan, Wei-Chen Wu |
A simple password authentication using a polynomial. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGOPS Oper. Syst. Rev. ![In: ACM SIGOPS Oper. Syst. Rev. 38(4), pp. 74-79, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
security, authentication, password |
23 | Maja Pusara, Carla E. Brodley |
User re-authentication via mouse movements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VizSEC ![In: 1st ACM Workshop on Visualization and Data Mining for Computer Security, VizSEC/DMSEC 2004, Washington, DC, USA, October 29, 2004, pp. 1-8, 2004, ACM, 1-58113-974-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
mouse dynamics, user re-authentication, anomaly detection |
23 | Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo |
Security of Shen et al.'s Timestamp-Based Password Authentication Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (4) ![In: Computational Science and Its Applications - ICCSA 2004, International Conference, Assisi, Italy, May 14-17, 2004, Proceedings, Part IV, pp. 665-671, 2004, Springer, 3-540-22060-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
security, authentication, Cryptography, smart card, password |
23 | Xiang Zhou, Xiaohui Duan, Daoxian Wang |
A Semi-Fragile Watermark Scheme For Image Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM ![In: 10th International Multimedia Modeling Conference (MMM 2004), 5-7 January 2004, Brisbane, Australia, pp. 374, 2004, IEEE Computer Society, 0-7695-2084-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Image Authentication DWT BCH Private Key Semi-fragile Watermark |
23 | Chin-Chen Chang 0001, Ya-Fen Chang |
Yet Another Attack on a QR-based Password Authentication System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA (2) ![In: 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 29-31 March 2004, Fukuoka, Japan, pp. 170-173, 2004, IEEE Computer Society, 0-7695-2051-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
password authentication, QR, quadratic residues |
23 | Chien-Hsung Chen, Long-Wen Chang |
A Digital Watermarking Scheme for Personal Image Authentication Using Eigenface. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PCM (3) ![In: Advances in Multimedia Information Processing - PCM 2004, 5th Pacific Rim Conference on Multimedia, Tokyo, Japan, November 30 - December 3, 2004, Proceedings, Part III, pp. 410-417, 2004, Springer, 3-540-23985-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Digital watermarking, eigenface, personal authentication |
23 | Xin Li 0010, Mizuhito Ogawa |
A Lightweight Mutual Authentication Based on Proxy Certificate Trust List. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PDCAT ![In: Parallel and Distributed Computing: Applications and Technologies, 5th International Conference, PDCAT 2004, Singapore, December 8-10, 2004, Proceedings, pp. 628-632, 2004, Springer, 3-540-24013-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Grid Computing, Mutual Authentication, Proxy Certificate |
23 | Hyun-Sung Kim 0001, Sung-Woon Lee, Kee-Young Yoo |
ID-based password authentication scheme using smart cards and fingerprints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGOPS Oper. Syst. Rev. ![In: ACM SIGOPS Oper. Syst. Rev. 37(4), pp. 32-41, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
ID-based scheme, smart card, fingerprint, password authentication |
23 | Yuqing Zhang, Dehua Zhang |
Authentication and Access Control in P2P Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GCC (1) ![In: Grid and Cooperative Computing, Second International Workshop, GCC 2003, Shanghai, China, December 7-10, 2003, Revised Papers, Part I, pp. 468-470, 2003, Springer, 3-540-21988-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
authentication, access control, network security, P2P Network |
23 | Douglas L. Whiting, Michael J. Sabin |
Montgomery Prime Hashing for Message Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2003, The Cryptographers' Track at the RSA Conference 2003, San Francisco, CA, USA, April 13-17, 2003, Proceedings, pp. 50-67, 2003, Springer, 3-540-00847-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
MAC, message authentication, Universal hash |
23 | Mohamed Al-Ibrahim, Anton Cerný |
Authentication of Anycast Communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security, Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings, pp. 419-423, 2003, Springer, 3-540-40797-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
authentication, proxy signature, Anycast |
23 | Alan Harbitter, Daniel A. Menascé |
A methodology for analyzing the performance of authentication protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 5(4), pp. 458-491, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
mobile computing, Authentication, performance modeling, public key cryptography, proxy servers, Kerberos |
23 | Mark D. Corner, Brian Noble |
Zero-interaction authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiCom ![In: Proceedings of the Eighth Annual International Conference on Mobile Computing and Networking, MOBICOM 2002, Atlanta, Georgia, USA, September 23-28, 2002, pp. 1-11, 2002, ACM, 1-58113-486-X. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
transient authentication, mobile computing, stackable file systems, cryptographic file systems |
23 | Dylan Carline, Paul Coulton |
Internet Authentication of LUT-Based FPGA Configuration Files. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPDPS ![In: 16th International Parallel and Distributed Processing Symposium (IPDPS 2002), 15-19 April 2002, Fort Lauderdale, FL, USA, CD-ROM/Abstracts Proceedings, 2002, IEEE Computer Society, 0-7695-1573-8. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Configuration Files, FPGA, Authentication, Bitstream |
23 | Jalal Al-Muhtadi, Anand Ranganathan, Roy H. Campbell, M. Dennis Mickunas |
A Flexible, Privacy-Preserving Authentication Framework for Ubiquitous Computing Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS Workshops ![In: 22nd International Conference on Distributed Computing Systems, Workshops (ICDCSW '02) July 2-5, 2002, Vienna, Austria, Proceedings, pp. 771-776, 2002, IEEE Computer Society, 0-7695-1588-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Mist, security, privacy, Ubiquitous computing, authentication, context-awareness |
23 | Jung-Min Park 0001, Edwin K. P. Chong, Howard Jay Siegel |
Efficient Multicast Packet Authentication Using Signature Amortization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 2002 IEEE Symposium on Security and Privacy, Berkeley, California, USA, May 12-15, 2002, pp. 227-240, 2002, IEEE Computer Society, 0-7695-1543-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Information Dispersal Algorithm (IDA), authentication, multicast, digital signatures, erasure codes |
23 | Anastasios Tefas, Constantine Kotropoulos, Ioannis Pitas |
Using Support Vector Machines to Enhance the Performance of Elastic Graph Matching for Frontal Face Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Pattern Anal. Mach. Intell. ![In: IEEE Trans. Pattern Anal. Mach. Intell. 23(7), pp. 735-746, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Fisher's discriminant ratio, constrained least-squares optimization, Support Vector Machines, Face authentication, elastic graph matching |
23 | Horatiu Cirstea |
Specifying Authentication Protocols Using Rewriting and Strategies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PADL ![In: Practical Aspects of Declarative Languages, Third International Symposium, PADL 2001, Las Vegas, Nevada, USA, March 11-12, 2001, Proceedings, pp. 138-152, 2001, Springer, 3-540-41768-0. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
model-checking, strategy, rewriting, authentication protocols |
23 | Alan Harbitter, Daniel A. Menascé |
The performance of public key-enabled kerberos authentication in mobile computing applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: CCS 2001, Proceedings of the 8th ACM Conference on Computer and Communications Security, Philadelphia, Pennsylvania, USA, November 6-8, 2001., pp. 78-85, 2001, ACM, 1-58113-385-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
mobile computing, authentication, performance modeling, public key cryptography, proxy servers, kerberos |
23 | Markus Jakobsson, David Pointcheval |
Mutual Authentication for Low-Power Mobile Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography, 5th International Conference, FC 2001, Grand Cayman, British West Indies, February 19-22, 2002, Proceedings, pp. 169-186, 2001, Springer, 3-540-44079-8. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP BibTeX RDF |
gap problem, Low power, medical informatics, mutual authentication |
23 | Chih-Hsuan Tzeng, Wen-Hsiang Tsai |
A new technique for authentication of image/video for multimedia applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MM&Sec ![In: Proceedings of the 4th workshop on Multimedia & Security: New Challenges, MM&Sec 2001, Ottawa, Ontario, Canada, October 5, 2001, pp. 23-26, 2001, ACM, 1-58113-393-6. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
JPEG/MPEG compression, compression tolerance, image/video authentication, digital signature |
23 | André Weimerskirch, Gilles Thonet |
A Distributed Light-Weight Authentication Model for Ad-hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2001, 4th International Conference Seoul, Korea, December 6-7, 2001, Proceedings, pp. 341-354, 2001, Springer, 3-540-43319-8. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
low-value transactions, security, Ad-hoc network, authentication, trust, public-key |
23 | Hyejoung Yoo, Kwangsoo Lee, Sangjin Lee 0002, Jongin Lim 0001 |
Off-Line Authentication Using Watermarks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2001, 4th International Conference Seoul, Korea, December 6-7, 2001, Proceedings, pp. 200-213, 2001, Springer, 3-540-43319-8. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
off-line authentication, PS distortion, PSP distortion, e-commerce |
23 | Jaap-Henk Hoepman |
Secret Key Authentication with Software-Only Verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography, 4th International Conference, FC 2000 Anguilla, British West Indies, February 20-24, 2000, Proceedings, pp. 313-326, 2000, Springer, 3-540-42700-7. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
symmetric key cryptography, authentication, smart cards |
23 | Chun-Shien Lu, Hong-Yuan Mark Liao |
Structural digital signature for image authentication: an incidental distortion resistant scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Multimedia Workshops ![In: Proceedings of the ACM Multimedia 2000 Workshops, Los Angeles, CA, USA, October 30 - November 3, 2000, pp. 115-118, 2000, ACM Press, 1-58113-311-1. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
fragility, authentication, robustness, wavelet transform, digital signature |
23 | Stuart E. Schechter, Todd Parnell, Alexander J. Hartemink |
Anonymous Authentication of Membership in Dynamic Groups. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography, Third International Conference, FC'99, Anguilla, British West Indies, February 1999, Proceedings, pp. 184-195, 1999, Springer, 3-540-66362-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
key replacement, verifiably common secret encoding, authentication, anonymity, identification |
23 | Chiara Bodei, Pierpaolo Degano, Riccardo Focardi, Corrado Priami |
Authentication via Localized Names. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: Proceedings of the 12th IEEE Computer Security Foundations Workshop, CSFW 1999, Mordano, Italy, June 28-30, 1999, pp. 98-110, 1999, IEEE Computer Society, 0-7695-0201-6. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Local Environments, Mobility, Authentication, Concurrency, Process Algebras |
23 | Mahmoud T. El-Hadidi, Nadia Hamed Hegazi, Heba Kamal Aslan |
Performance Evaluation of a New Hybrid Encryption Protocol for Authentication and Key Distribution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the Fourth IEEE Symposium on Computers and Communications (ISCC 1999), 6-8 July 1999, Sharm El Sheikh, Red Sea, Egypt, pp. 16-22, 1999, IEEE Computer Society, 0-7695-0250-4. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Authentication, Performance Analysis, Key Distribution, Hybrid Encryption |
23 | Steve A. Schneider |
Verifying Authentication Protocols in CSP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 24(9), pp. 741-758, 1998. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
Needham-Schroeder protocol, verification, Authentication, formal methods, security protocols, CSP |
23 | Gerrit Bleumer |
Biometric yet Privacy Protecting Person Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, Second International Workshop, Portland, Oregon, USA, April 14-17, 1998, Proceedings, pp. 99-110, 1998, Springer, 3-540-65386-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
Non-transferable certificates, Wallets-with-observer, Biometric person authentication, Blind Signatures, Interactive proofs |
23 | Steve A. Schneider |
Verifying authentication protocols with CSP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 10th Computer Security Foundations Workshop (CSFW '97), June 10-12, 1997, Rockport, Massachusetts, USA, pp. 3-17, 1997, IEEE Computer Society, 0-8186-7990-5. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
Needham-Schroeder protocol, verification, Authentication, formal methods, security protocols, CSP |
23 | Malte Borderding |
Levels of Authentication in Distributed Agreement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WDAG ![In: Distributed Algorithms, 10th International Workshop, WDAG '96, Bologna, Italy, October 9-11, 1996, Proceedings, pp. 40-55, 1996, Springer, 3-540-61769-8. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
crusader agreement, fault tolerance, distributed systems, authentication, Byzantine agreement |
23 | Gabriele Wedel, Volker Kessler |
Formal Semantics for Authentication Logics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 96, 4th European Symposium on Research in Computer Security, Rome, Italy, September 25-27, 1996, Proceedings, pp. 219-241, 1996, Springer, 3-540-61770-1. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
logic of authentication, Formal verification, key management, cryptographic protocols |
23 | Kwok-Yan Lam, Thomas Beth |
Timely Authentication in Distributed Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 92, Second European Symposium on Research in Computer Security, Toulouse, France, November 23-25, 1992, Proceedings, pp. 293-303, 1992, Springer, 3-540-56246-X. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
Authentication Protocols, Interprocess Communications, Distributed Operating Systems |
22 | Dimitri do B. DeFigueiredo |
The Case for Mobile Two-Factor Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 9(5), pp. 81-85, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
mobile authentication, online PINs, offline PINs, mobile computing, mobile phones, computer security, passwords, PINs, two-factor authentication |
22 | Haowen Chan, Adrian Perrig |
Round-Efficient Broadcast Authentication Protocols for Fixed Topology Classes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Symposium on Security and Privacy ![In: 31st IEEE Symposium on Security and Privacy, SP 2010, 16-19 May 2010, Berleley/Oakland, California, USA, pp. 257-272, 2010, IEEE Computer Society, 978-0-7695-4035-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Multicast Authentication, Linear Topology, Path Topology, Fully Connected Topology, Broadcast Authentication |
22 | Huy Hoang Ngo, Xianping Wu, Phu Dung Le, Bala Srinivasan 0002 |
An Authentication Model for Wireless Network Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA ![In: 24th IEEE International Conference on Advanced Information Networking and Applications, AINA 2010, Perth, Australia, 20-13 April 2010, pp. 996-1003, 2010, IEEE Computer Society, 978-0-7695-4018-4. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
wireless network services, dynamic keys, group authentication, authentication |
22 | Huachun Zhou, Hongke Zhang |
An Authentication Protocol for Proxy Mobile IPv6. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MSN ![In: MSN 2008, The 4th International Conference on Mobile Ad-hoc and Sensor Networks, Wuhan, China, December 10-12, 2008, pp. 129-136, 2008, IEEE Computer Society, 978-0-7695-3457-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
authentication latency, authentication cost, analytic model, proxy mobile IPv6 |
22 | Jørgen Brandt, Ivan Damgård, Peter Landrock, Torben P. Pedersen |
Zero-Knowledge Authentication Scheme with Secret Key Exchange. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 11(3), pp. 147-159, 1998. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
Authentication, Authentication, Key exchange, Key exchange, Zero-knowledge, Zero-knowledge, Key words |
21 | Matthew Canton |
The presence table: a reactive surface for ambient connection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TEI ![In: Proceedings of the 5th International Conference on Tangible and Embedded Interaction 2011, Funchal, Madeira, Portugal, January 22-26, 2011, pp. 401-402, 2011, ACM, 978-1-4503-0478-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Gregory Neven |
Privacy-enhanced access control in primelife. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 6th Workshop on Digital Identity Management, Chicago, Illinois, USA, October 8, 2010, pp. 1-2, 2010, ACM, 978-1-4503-0090-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Jan Camenisch, Markulf Kohlweiss, Claudio Soriente |
An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings, pp. 481-500, 2009, Springer, 978-3-642-00467-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
revocation, anonymous credentials, dynamic accumulators |
21 | Ben-Jye Chang, Szu-Liang Kuo, Ying-Hsin Liang, De-Yu Wang |
Markov Chain-Based Trust Model for Analyzing Trust Value in Distributed Multicasting Mobile Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APSCC ![In: Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, APSCC 2008, Yilan, Taiwan, 9-12 December 2008, pp. 156-161, 2008, IEEE Computer Society, 978-0-7695-3473-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Hiroshi Dozono, Masanori Nakakuni |
An integration method of multi-modal biometrics using supervised pareto learning self organizing maps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IJCNN ![In: Proceedings of the International Joint Conference on Neural Networks, IJCNN 2008, part of the IEEE World Congress on Computational Intelligence, WCCI 2008, Hong Kong, China, June 1-6, 2008, pp. 602-606, 2008, IEEE, 978-1-4244-1820-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Baoshi Zhu, Jiankang Wu, Mohan S. Kankanhalli |
Render Sequence Encoding for Document Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Multim. ![In: IEEE Trans. Multim. 9(1), pp. 16-24, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Manuel Sánchez, Gabriel López Millán, Óscar Cánovas Reverte, Antonio Fernandez Gómez-Skarmeta |
Bootstrapping a Global SSO from Network Access Control Mechanisms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, 4th European PKI Workshop: Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007, Proceedings, pp. 170-180, 2007, Springer, 978-3-540-73407-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
authorization, federation, SSO, SAML |
21 | Saber Zrelli, Tunç D. Medeni, Yoichi Shinoda, Ihsan Tolga Medeni |
Improving Kerberos Security System for Cross-Realm Collaborative Interactions: An Innovative Example of Knowledge Technology for Evolving & Verifiable E-Society. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RIVF ![In: 2007 IEEE International Conference on Research, Innovation and Vision for the Future in Computing & Communication Technologies, RIVF 2007, Hanoi, Vietnam, 5-9 March 2007, pp. 211-219, 2007, IEEE. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Jinyoung Moon, Jongyoul Park, Eui Hyun Paik |
JavaCard-based Two-Level User Key Management for IP Conditional Access Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICON ![In: Proceedings of the 15th IEEE International Conference on Networks, ICON 2007, 19-21 November 2007, Adelaide, Australia, pp. 72-76, 2007, IEEE, 1-4244-1230-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Charalampos Papamanthou, Roberto Tamassia |
Time and Space Efficient Algorithms for Two-Party Authenticated Data Structures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007, Proceedings, pp. 1-15, 2007, Springer, 978-3-540-77047-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Salekul Islam, J. William Atwood |
Sender Access Control in IP Multicast. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: 32nd Annual IEEE Conference on Local Computer Networks (LCN 2007), 15-18 October 2007, Clontarf Castle, Dublin, Ireland, Proceedings, pp. 79-86, 2007, IEEE Computer Society, 0-7695-3000-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Hae Young Lee, Tae Ho Cho |
Key Inheritance-Based False Data Filtering Scheme in Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCIT ![In: Distributed Computing and Internet Technology, Third International Conference, ICDCIT 2006, Bhubaneswar, India, December 20-23, 2006, Proceedings, pp. 116-127, 2006, Springer, 3-540-68379-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Hitoshi Morioka, Hiroshi Mano, Motoyuki Ohrnori, Masataka Ohta |
MIS Protocol for Secure Connection and Fast Handover on Wireless LAN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA (1) ![In: 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 18-20 April 2006, Vienna, Austria, pp. 533-540, 2006, IEEE Computer Society, 0-7695-2466-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
|
|