The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for authentication with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1973-1981 (18) 1982-1984 (22) 1985-1986 (22) 1987 (21) 1988 (25) 1989 (33) 1990 (36) 1991 (31) 1992 (40) 1993 (50) 1994 (65) 1995 (55) 1996 (112) 1997 (145) 1998 (98) 1999 (167) 2000 (208) 2001 (294) 2002 (330) 2003 (618) 2004 (905) 2005 (1106) 2006 (1033) 2007 (1140) 2008 (1183) 2009 (1031) 2010 (805) 2011 (788) 2012 (820) 2013 (879) 2014 (955) 2015 (1035) 2016 (1133) 2017 (1173) 2018 (1332) 2019 (1500) 2020 (1379) 2021 (1410) 2022 (1499) 2023 (1523) 2024 (379)
Publication types (Num. hits)
article(10875) book(17) data(3) incollection(161) inproceedings(14078) phdthesis(247) proceedings(17)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 8079 occurrences of 2235 keywords

Results
Found 25398 publication records. Showing 25398 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
21Mi-Ae Kim, Kil-Sang Yoo, Won-Hyung Lee Fragile Watermarking Scheme for Accepting Image Compression. Search on Bibsonomy EUC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21Weidong Shi, Hsien-Hsin S. Lee, Mrinmoy Ghosh, Chenghuai Lu Architectural Support for High Speed Protection of Memory Integrity and Confidentiality in Multiprocessor Systems. Search on Bibsonomy IEEE PACT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
21Michael Walker 0001 On the Security of 3GPP Networks. Search on Bibsonomy EUROCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
21Chi-Chun Lo, Yi-Chun Yeh Security issues on B-ISDN billing system. Search on Bibsonomy NOMS The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
21Tatsuaki Okamoto, Kazuo Ohta Disposable Zero-Knowledge Authentications and Their Applications to Untraceable Electronic Cash. Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
21Giovanni Di Crescenzo, R. F. Graveman, Renwei Ge, Gonzalo R. Arce Approximate Message Authentication and Biometric Entity Authentication. Search on Bibsonomy Financial Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21Jiansheng Chen, Yiu Sang Moon, Hoi-Wo Yeung Palmprint Authentication Using Time Series. Search on Bibsonomy AVBPA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21Byungjun Son, Yillbyung Lee Biometric Authentication System Using Reduced Joint Feature Vector of Iris and Face. Search on Bibsonomy AVBPA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21Jacek Czyz, Mohammad Sadeghi 0001, Josef Kittler, Luc Vandendorpe Decision Fusion for Face Authentication. Search on Bibsonomy ICBA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
21Miguel Gustavo Lizárraga, Luan Ling Lee Biometric Personal Authentication Based on Handwritten Signals. Search on Bibsonomy ICBA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
21M. Wirotius, Jean-Yves Ramel, Nicole Vincent New Features for Authentication by On-Line Handwritten Signatures. Search on Bibsonomy ICBA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
21Lívia C. F. Araújo, Luiz H. R. Sucupira, Miguel Gustavo Lizárraga, Lee Luan Ling, João Baptista T. Yabu-uti User Authentication through Typing Biometrics Features. Search on Bibsonomy ICBA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
21Olaf Henniger, Katrin Franke Biometric User Authentication on Smart Cards by Means of Handwritten Signatures. Search on Bibsonomy ICBA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
21Purdy Ho, John Armington A Dual-Factor Authentication System Featuring Speaker Verification and Token Technology. Search on Bibsonomy AVBPA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
21Sung-Bae Cho, Frank E. Pollick Toward Person Authentication with Point Light Display Using Neural Network Ensembles. Search on Bibsonomy AVBPA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
21Raul Sánchez-Reillo Including Biometric Authentication in a Smart Card Operating System. Search on Bibsonomy AVBPA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
21Alexander De Luca, Katja Hertzschuch, Heinrich Hussmann ColorPIN: securing PIN entry through indirect input. Search on Bibsonomy CHI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF atm, colorpin, security, authentication
21Moni Naor, Guy N. Rothblum The complexity of online memory checking. Search on Bibsonomy J. ACM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Memory checking, authentication
21Saar Drimer, Steven J. Murdoch, Ross J. Anderson Optimised to Fail: Card Readers for Online Banking. Search on Bibsonomy Financial Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF banking security, chip and PIN, authentication, reverse engineering, liability
21Ki-Woong Park, Sang Seok Lim, Kyu Ho Park Computationally Efficient PKI-Based Single Sign-On Protocol, PKASSO for Mobile Devices. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Authentication, Network-level security and protection
21Jeffery H. K. Wu, Ruey-Feng Chang, Chii-Jen Chen, Ching-Lin Wang, Ta-Hsun Kuo, Woo Kyung Moon, Dar-Ren Chen Tamper Detection and Recovery for Medical Images Using Near-lossless Information Hiding Technique. Search on Bibsonomy J. Digit. Imaging The full citation details ... 2008 DBLP  DOI  BibTeX  RDF image processing, Medical image, image authentication
21Kevser Karaca, Albert Levi Towards a framework for security analysis of multiple password schemes. Search on Bibsonomy EUROSEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF multiple passwords, security analysis, password based authentication, impersonation
21Baris Coskun, Cormac Herley Can "Something You Know" Be Saved?. Search on Bibsonomy ISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Authentication, passwords, challenge response
21Jinxin He, Gaochao Xu, Xiaodong Fu, Zhiguo Zhou, Jianhua Jiang LMCM: Layered Multiple Chaining Model for Authenticating Multicast Streams. Search on Bibsonomy SNPD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Source Authentication, Chain hashing, Non-repudiation, Multicast security
21Paul Z. Kolano Mesh: secure, lightweight grid middleware using existing SSH infrastructure. Search on Bibsonomy SACMAT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security, distributed systems, authentication, access control, middleware, grids, authorization, delegation, single sign-on, SSH
21Daeyoung Kim 0004, Younggang Cui, Sangjin Kim, Heekuck Oh A Privacy Protecting UMTS AKA Protocol Providing Perfect Forward Secrecy. Search on Bibsonomy ICCSA (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF privacy, authentication, UMTS, perfect forward secrecy
21Hung-Yu Chien, Chen-Wei Huang A Lightweight RFID Protocol Using Substring. Search on Bibsonomy EUC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF low-cost cryptography, DOS attack, authentication, RFID, tracing, reader
21Lourdes López-Santidrián, José-Fernán Martínez, Alfonso Muñoz, Vicente Hernández, Antonio Dasilva 0001, Ana Belén García ASA: advanced secure architecture for preventing unauthorized access in personal computer platforms and BIOS. Search on Bibsonomy EATIS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF authentication and authorization, cryptographic models, security computing platforms, security, secure architecture
21Les Green, Linas Maknavicius Secure Billing for Ubiquitous Service Delivery. Search on Bibsonomy ICQT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Security, Authentication, Billing, Ubiquity
21Rafael Marín López, Antonio Fernandez Gómez-Skarmeta, Julien Bournelle, Maryline Laurent-Maknavicius, Jean Michel Combes Improved EAP keying framework for a secure mobility access service. Search on Bibsonomy IWCMC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF key hierarchy, mobility, authentication, access control, key management, roaming, EAP
21Janne Lindqvist, Laura Takkinen Privacy management for secure mobility. Search on Bibsonomy WPES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF privacy, mobility, authentication, host identity protocol
21He Ge, Stephen R. Tate Efficient Authenticated Key-Exchange for Devices with a Trusted Manager. Search on Bibsonomy ITNG The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Embedded Systems, Authentication, Key Exchange, Strong RSA Assumption
21Susan Wiedenbeck, Jim Waters, Leonardo Sobrado, Jean-Camille Birget Design and evaluation of a shoulder-surfing resistant graphical password scheme. Search on Bibsonomy AVI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF convex hull click scheme, authentication, usable security, graphical passwords, shoulder-surfing, password security
21Michel Abdalla, Emmanuel Bresson, Olivier Chevassut, David Pointcheval Password-Based Group Key Exchange in a Constant Number of Rounds. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Group Key Exchange, Password-based Authentication
21Furkan Tari, A. Ant Ozok, Stephen H. Holden A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords. Search on Bibsonomy SOUPS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF authentication, human factors, usable security, graphical passwords, social engineering, shoulder surfing, password security
21Mun-Kyu Lee, Jung Ki Min, Seok Hun Kang, Sang-Hwa Chung, Howon Kim 0001, Dong Kyue Kim Efficient Implementation of Pseudorandom Functions for Electronic Seal Protection Protocols. Search on Bibsonomy WISA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF electronic seal, RFID, AES, message authentication code, pseudorandom function
21David Recordon, Drummond Reed OpenID 2.0: a platform for user-centric identity management. Search on Bibsonomy Digital Identity Management The full citation details ... 2006 DBLP  DOI  BibTeX  RDF authentication, authorization, open source, identity, open standard, user-centric
21Hsien-Chu Wu, Chuan-Po Yeh, Chwei-Shyong Tsai A Semi-fragile Watermarking Scheme Based on SVD and VQ Techniques. Search on Bibsonomy ICCSA (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Vector quantization (VQ), Singular value decomposition (SVD), Image authentication, Semi-fragile watermarking
21Jihyung Lim, DaeHun Nyang, Jeonil Kang, KyungHee Lee, Hyotaek Lim Distributed Certificate Authority Under the GRID-Location Aided Routing Protocol. Search on Bibsonomy ICCSA (4) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Certificate Issuing, Authentication, Ad Hoc Network Security
21May Phyo Oo, Nilar Thein, Thinn Thu Naing Grid Security Framework for Managing the Certificate. Search on Bibsonomy Web Intelligence The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Counting Process, RSA public key, Authentication method and Authorization method, Certificate
21Jakob E. Bardram The trouble with login: on usability and computer security in ubiquitous computing. Search on Bibsonomy Pers. Ubiquitous Comput. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Electronic patient record (EPR), Ubiquitous computing, Computer-supported cooperative work (CSCW), Healthcare, User authentication, Hospitals, Activity-based computing (ABC), Login
21Amos Beimel, Lior Malka Efficient reliable communication over partially authenticated networks. Search on Bibsonomy Distributed Comput. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Incomplete networks, Fault tolerance, Authentication, Reliable communication
21Tobias Straub, Thilo-Alexander Ginkel, Johannes Buchmann 0001 A Multipurpose Delegation Proxy for WWW Credentials. Search on Bibsonomy EuroPKI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Credential Delegation, WWW Authentication, Usability, X.509 Certificate, Man-In-The-Middle
21Thorsten Staake, Frédéric Thiesse, Elgar Fleisch Extending the EPC network: the potential of RFID in anti-counterfeiting. Search on Bibsonomy SAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF track & trace, authentication, RFID, counterfeiting
21Dev Anshul, Suman Roy 0001 A ZKP-based identification scheme for base nodes in wireless sensor networks. Search on Bibsonomy SAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF guillou-quisquater protocol, sensor and ad hoc networks, security protocols, wireless security, base stations, zero-knowledge protocol, entity authentication
21Mauro Brunato, Danilo Severina WilmaGate: a new open access gateway for hotspot management. Search on Bibsonomy WMASH The full citation details ... 2005 DBLP  DOI  BibTeX  RDF access gateways, open access networks, wireless networks, authentication, authorization
21Takeshi Okamoto, Raylin Tso, Eiji Okamoto One-Way and Two-Party Authenticated ID-Based Key Agreement Protocols Using Pairing. Search on Bibsonomy MDAI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF authentication, Cryptography, key agreement, pairing, ID-based
21Jane You, King Hong Cheung, Qin Li 0001, Prabir Bhattacharya An Integration of Biometrics and Mobile Computing for Personal Identification. Search on Bibsonomy ICAPR (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Biometrics computing, feature extraction and indexing, identity authentication and verification, mobile computing, guided search
21Ari Juels Strengthening EPC tags against cloning. Search on Bibsonomy Workshop on Wireless Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF track and trace, authentication, RFID, cloning, EPC, counterfeiting
21Sung Jin Choi, Hee Yong Youn An Efficient Key Pre-distribution Scheme for Secure Distributed Sensor Networks. Search on Bibsonomy EUC Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF security, mutual authentication, key pre-distribution, LU decomposition, distributed sensor network
21Chong-zhi Gao, Zheng-an Yao How to Authenticate Real Time Streams Using Improved Online/Offline Signatures. Search on Bibsonomy CANS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Online/Offline Signatures, Stream Authentication, Real Time Streams
21Bok-Min Goi, Jintai Ding, Mohammad Umar Siddiqi Cryptanalysis of PASS II and MiniPass. Search on Bibsonomy ICICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF partial polynomial evaluation, cryptanalysis, digital signature scheme, NTRU, Authentication scheme
21Di Ma, Robert H. Deng, HweeHwa Pang, Jianying Zhou 0001 Authenticating Query Results in Data Publishing. Search on Bibsonomy ICICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF authentication, data publishing, aggregated signature, merkle hash tree
21Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo Secure Protected Password Change Scheme. Search on Bibsonomy MMM-ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Cryptography, Key agreement, Password authentication
21Sungsoo Yoon, Seung-Seok Choi, Sung-Hyuk Cha, Yillbyung Lee, Charles C. Tappert On the Individuality of the Iris Biometric. Search on Bibsonomy ICIAR The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Biometric individuality, Dichotomy model, Iris authentication, Histogram
21Andreas Pashalidis, Chris J. Mitchell Single Sign-On Using Trusted Platforms. Search on Bibsonomy ISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF TCPA, authentication, single sign-on
21Chou Chen Yang, Jian Wei Li, Ting Yi Chang A Novel Mobile IP Registration Scheme for Hierarchical Mobility Management. Search on Bibsonomy ICPP Workshops The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Security, Authentication, Mobility management, Mobile IP
21Mihir Bellare, Bennet S. Yee Forward-Security in Private-Key Cryptography. Search on Bibsonomy CT-RSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF pseudorandom bit generators, message authentication, forward security, Symmetric cryptography, audit logs, proofs of security
21Shouhuai Xu, Ravi S. Sandhu Authenticated multicast immune to denial-of-service attack. Search on Bibsonomy SAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF multicast authentication, denial-of-service
21Joseph W. Graham II Authenticating public access networking. Search on Bibsonomy SIGUCCS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF NDS, PPPoE, authentication, networking, wireless, LDAP, Kerberos, directory, DHCP, active directory
21Jeffrey Hoffstein, Jill Pipher, Joseph H. Silverman NSS: An NTRU Lattice-Based Signature Scheme. Search on Bibsonomy EUROCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF public key authentication, NSS, digital signature, NTRU, lattice-based cryptography
21Nalini K. Ratha, Jonathan H. Connell, Ruud M. Bolle Secure data hiding in wavelet compressed fingerprint images. Search on Bibsonomy ACM Multimedia Workshops The full citation details ... 2000 DBLP  DOI  BibTeX  RDF WSQ compression, authentication, biometrics, watermarking, fingerprints, data hiding
21Mark Etzel, Sarvar Patel, Zulfikar Ramzan SQUARE HASH: Fast Message Authenication via Optimized Universal Hash Functions. Search on Bibsonomy CRYPTO The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Message authentication codes, Universal Hashing
21John G. Brainard SecurSight: An Architecture for Secure Information Access. Search on Bibsonomy ACSAC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF authentication, architecture, authorization, PKI
21Stefan Wolf 0001 Strong Security Against Active Attacks in Information-Theoretic Secret-Key Agreement. Search on Bibsonomy ASIACRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF unconditional secrecy, authentication, information theory, privacy amplification, Secret-key agreement
21Jean-Jacques Bascou System Survey: Building an Authenticity Profile. Search on Bibsonomy ICCCN The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Security, Authentication, User Profile
20Stephen Badan, Julien Probst, Markus Jaton, Damien Vionnet, Jean-Frédéric Wagen, Gérald Litzistorf A Rich Client-Server Based Framework for Convenient Security and Management of Mobile Applications. Search on Bibsonomy MobiSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF rich client, transient authentication, theft detection, authentication, smartphone, client-server, mobile security, secure framework
20Muzaffar Bashir, Jürgen Kempf Bio-Inspired Reference Level Assigned DTW for Person Identification Using Handwritten Signatures. Search on Bibsonomy COST 2101/2102 Conference The full citation details ... 2009 DBLP  DOI  BibTeX  RDF online signature authentication, biometric person authentication, signature normalization, dynamic time warping
20Muhammad Sher, Thomas Magedanz Secure access to IP multimedia services using generic bootstrapping architecture (GBA) for 3G & beyond mobile networks. Search on Bibsonomy Q2SWinet The full citation details ... 2006 DBLP  DOI  BibTeX  RDF IP multimedia system, authentication proxy, generic authentication architecture, generic bootstrapping architecture, transport layer security, security and privacy
20Michael A. Schneider, Edward W. Felten Efficient Commerce Protocols based on One-Time Pads. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF credit transactions, commerce protocol, face-to-face credit card authorizations, transaction outcome agreement, OTPMAC function, one-time identifier, cryptographic pseudo-random number generators, cryptographic MAC functions, security, cryptography, protocols, anonymity, transaction processing, codes, random number generation, business data processing, authorisation, message authentication, message authentication code, one-time pad
20Xunhua Wang, Yih Huang, Yvo Desmedt, David Rine Enabling Secure On-Line DNS Dynamic Update. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF secure online DNS dynamic update, Internet Engineering Task Force, DNS Security Extension, zone security key, role separation principle, signature computation time, Internet, authentication, cryptography, distributed databases, RSA, transport protocols, experimental results, message authentication, threshold cryptography, telecommunication security, MD5, Domain Name System, IP addresses, performance penalty, DNSSEC
20Christian Labonté, Sampalli Srinivas Group Management Strategies for Secure Multicasting on Active Virtual Private Networks. Search on Bibsonomy LCN The full citation details ... 2000 DBLP  DOI  BibTeX  RDF multicast group management, active virtual private networks, message integrity, message privacy, Secure Active VPN Environment, SAVE project, Dalhousie University, authentication, cryptography, cryptography, multicasting, transport protocols, network architecture, multicast communication, message authentication, IP multicast, telecommunication networks, telecommunication security, secure multicasting, business communication, telecommunication network management
20Antonio Fernandez Gómez-Skarmeta, Angel L. Mateo-Martinez, Pedro M. Ruiz-Martinez IGMPv3-Based Method for Avoiding DoS Attacks in Multicast-Enabled Networks. Search on Bibsonomy LCN The full citation details ... 2000 DBLP  DOI  BibTeX  RDF DoS attack avoidance, IGMPv3-based method, IP multicast-enabled networks, security protection, Internet, authentication, transport protocols, multimedia communication, multimedia communications, video conferencing, teleconferencing, multicast communication, message authentication, telecommunication security, billing, Internet service providers, audio conferencing
20Arun Iyengar, Daniel M. Dias Distributed Virtual Malls on the World Wide Web. Search on Bibsonomy ICDCS The full citation details ... 1998 DBLP  DOI  BibTeX  RDF virtual mall, distributed authentication, state preservation, virtual shopping, authentication, electronic commerce
20Sarvar Patel Number Theoretic Attacks on Secure Password Schemes. Search on Bibsonomy S&P The full citation details ... 1997 DBLP  DOI  BibTeX  RDF number theoretic attacks, secure password schemes, Encrypted Key Exchange, EKE, authenticated information exchange, insecure network, secret key cryptography, randomized confounders, RSA version, half encrypted versions, Direct Authentication Protocol, Secret Public Key Protocol versions, secure protocols, message authentication, dictionary attacks, active attacks, password guessing attacks
20Wenbo Mao An augmentation of BAN-like logics. Search on Bibsonomy CSFW The full citation details ... 1995 DBLP  DOI  BibTeX  RDF BAN-like logics augmentation, protocol idealization, rule-based technique, protocol syntax, protocols, formal logic, message authentication, authentication protocols, symbolic manipulation
19Tomi Kinnunen, Filip Sedlak, Roman Bednarik Towards task-independent person authentication using eye movement signals. Search on Bibsonomy ETRA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF task independence, eye tracking, biometrics
19Manik Lal Das Two-factor user authentication in wireless sensor networks. Search on Bibsonomy IEEE Trans. Wirel. Commun. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
19Lei Zhang 0064, Susanna Spinsante, Chaojing Tang, Ennio Gambi Application and performance analysis of various AEAD techniques for space telecommand authentication. Search on Bibsonomy IEEE Trans. Wirel. Commun. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
19Geraldine Kwang, Roland H. C. Yap, Terence Sim, Rajiv Ramnath An Usability Study of Continuous Biometrics Authentication. Search on Bibsonomy ICB The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
19Sebastian Gajek, Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy TruWallet: trustworthy and migratable wallet-based web authentication. Search on Bibsonomy STC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF password wallet, secure migration, trusted computing, phishing, identity theft
19Huixian Li, Liaojun Pang A Novel Biometric-Based Authentication Scheme with Privacy Protection. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
19Yung-Cheng Lee, Wen-Chung Kuo, Yi-Chih Hsieh, Ta-Cheng Chen Security Enhancement of the Authentication Protocol for RFID Systems. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
19Kuo-Hui Yeh, Nai-Wei Lo Improvement of an EPC Gen2 Compliant RFID Authentication Protocol. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
19Yike Yu, Xuefeng Zheng, Mingde Zhang, Qingguo Zhang An Identity-Based Authentication Model for Mobile Agent. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
19Stuart E. Schechter, Serge Egelman, Robert W. Reeder It's not what you know, but who you know: a social approach to last-resort authentication. Search on Bibsonomy CHI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF security, privacy, usability testing and evaluation
19Binod Vaidya, Jong Hyuk Park, Joel J. P. C. Rodrigues HOTP-Based User Authentication Scheme in Home Networks. Search on Bibsonomy ISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
19Stanislaw Jarecki, Xiaomin Liu Private Mutual Authentication and Conditional Oblivious Transfer. Search on Bibsonomy CRYPTO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
19Chiu C. Tan 0001, Bo Sheng, Qun Li 0001 Secure and Serverless RFID Authentication and Search Protocols. Search on Bibsonomy IEEE Trans. Wirel. Commun. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Caimu Tang, Dapeng Oliver Wu An Efficient Mobile Authentication Scheme for Wireless Networks. Search on Bibsonomy IEEE Trans. Wirel. Commun. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Li Lu 0001, Jinsong Han, Yunhao Liu 0001, Lei Hu, Jinpeng Huai, Lionel M. Ni, Jian Ma Pseudo Trust: Zero-Knowledge Authentication in Anonymous P2Ps. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Reihaneh Safavi-Naini, Peter R. Wild Information Theoretic Bounds on Authentication Systems in Query Model. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Srdjan Capkun, Mario Cagalj, Ram Kumar Rengaswamy, Ilias Tsigkogiannis, Jean-Pierre Hubaux, Mani B. Srivastava Integrity Codes: Message Integrity Protection and Authentication over Insecure Channels. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Kotaro Sonoda, Osamu Takizawa User Authentication Scheme Using Individual Auditory Pop-Out. Search on Bibsonomy New Directions in Intelligent Interactive Multimedia The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Hung-Min Sun, King-Hang Wang Defending Secret-Key Based Authentication Protocols against the Stolen-Secret Attack. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Tong-Lee Lim, Tieyan Li Exposing an effective denial of information attack from the misuse of EPCglobal standards in an RFID authentication scheme. Search on Bibsonomy PIMRC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Takamichi Saito, Kiyomi Sekiguchi, Ryosuke Hatsugai Authentication Binding between TLS and HTTP. Search on Bibsonomy NBiS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Mike Burmester, Breno de Medeiros, Rossana Motta Robust, anonymous RFID authentication with constant key-lookup. Search on Bibsonomy AsiaCCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF provably secure protocols, privacy, scalability, RFID, availability, unlinkability
19Yun-kyung Lee, Deok-Gyu Lee, Jong Wook Han, Jeong-Nyeo Kim The home device authentication system construction for pervasive home network. Search on Bibsonomy MobiQuitous The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Haojin Zhu, Xiaodong Lin 0001, Rongxing Lu, Pin-Han Ho, Xuemin Shen AEMA: An Aggregated Emergency Message Authentication Scheme for Enhancing the Security of Vehicular Ad Hoc Networks. Search on Bibsonomy ICC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
Displaying result #801 - #900 of 25398 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license