|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 8079 occurrences of 2235 keywords
|
|
|
Results
Found 25398 publication records. Showing 25398 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
21 | Mi-Ae Kim, Kil-Sang Yoo, Won-Hyung Lee |
Fragile Watermarking Scheme for Accepting Image Compression. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC ![In: Embedded and Ubiquitous Computing - EUC 2005, International Conference EUC 2005, Nagasaki, Japan, December 6-9, 2005, Proceedings, pp. 940-946, 2005, Springer, 3-540-30807-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Weidong Shi, Hsien-Hsin S. Lee, Mrinmoy Ghosh, Chenghuai Lu |
Architectural Support for High Speed Protection of Memory Integrity and Confidentiality in Multiprocessor Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE PACT ![In: 13th International Conference on Parallel Architectures and Compilation Techniques (PACT 2004), 29 September - 3 October 2004, Antibes Juan-les-Pins, France, pp. 123-134, 2004, IEEE Computer Society, 0-7695-2229-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Michael Walker 0001 |
On the Security of 3GPP Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2000, International Conference on the Theory and Application of Cryptographic Techniques, Bruges, Belgium, May 14-18, 2000, Proceeding, pp. 102-103, 2000, Springer, 3-540-67517-5. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
21 | Chi-Chun Lo, Yi-Chun Yeh |
Security issues on B-ISDN billing system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NOMS ![In: 1998 Network Operations and Management Symposium, NOMS 98, New Orleans, LA, USA, February 15-20, 1998. Proceedings, pp. 287, 1998, IEEE, 0-7803-4352-2. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
21 | Tatsuaki Okamoto, Kazuo Ohta |
Disposable Zero-Knowledge Authentications and Their Applications to Untraceable Electronic Cash. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings, pp. 481-496, 1989, Springer, 3-540-97317-6. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
21 | Giovanni Di Crescenzo, R. F. Graveman, Renwei Ge, Gonzalo R. Arce |
Approximate Message Authentication and Biometric Entity Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 9th International Conference, FC 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers, pp. 240-254, 2005, Springer, 3-540-26656-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Jiansheng Chen, Yiu Sang Moon, Hoi-Wo Yeung |
Palmprint Authentication Using Time Series. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AVBPA ![In: Audio- and Video-Based Biometric Person Authentication, 5th International Conference, AVBPA 2005, Hilton Rye Town, NY, USA, July 20-22, 2005, Proceedings, pp. 376-385, 2005, Springer, 3-540-27887-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Byungjun Son, Yillbyung Lee |
Biometric Authentication System Using Reduced Joint Feature Vector of Iris and Face. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AVBPA ![In: Audio- and Video-Based Biometric Person Authentication, 5th International Conference, AVBPA 2005, Hilton Rye Town, NY, USA, July 20-22, 2005, Proceedings, pp. 513-522, 2005, Springer, 3-540-27887-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Jacek Czyz, Mohammad Sadeghi 0001, Josef Kittler, Luc Vandendorpe |
Decision Fusion for Face Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICBA ![In: Biometric Authentication, First International Conference, ICBA 2004, Hong Kong, China, July 15-17, 2004, Proceedings, pp. 686-693, 2004, Springer, 3-540-22146-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Miguel Gustavo Lizárraga, Luan Ling Lee |
Biometric Personal Authentication Based on Handwritten Signals. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICBA ![In: Biometric Authentication, First International Conference, ICBA 2004, Hong Kong, China, July 15-17, 2004, Proceedings, pp. 533-539, 2004, Springer, 3-540-22146-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
21 | M. Wirotius, Jean-Yves Ramel, Nicole Vincent |
New Features for Authentication by On-Line Handwritten Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICBA ![In: Biometric Authentication, First International Conference, ICBA 2004, Hong Kong, China, July 15-17, 2004, Proceedings, pp. 577-584, 2004, Springer, 3-540-22146-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Lívia C. F. Araújo, Luiz H. R. Sucupira, Miguel Gustavo Lizárraga, Lee Luan Ling, João Baptista T. Yabu-uti |
User Authentication through Typing Biometrics Features. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICBA ![In: Biometric Authentication, First International Conference, ICBA 2004, Hong Kong, China, July 15-17, 2004, Proceedings, pp. 694-700, 2004, Springer, 3-540-22146-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Olaf Henniger, Katrin Franke |
Biometric User Authentication on Smart Cards by Means of Handwritten Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICBA ![In: Biometric Authentication, First International Conference, ICBA 2004, Hong Kong, China, July 15-17, 2004, Proceedings, pp. 547-554, 2004, Springer, 3-540-22146-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Purdy Ho, John Armington |
A Dual-Factor Authentication System Featuring Speaker Verification and Token Technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AVBPA ![In: Audio-and Video-Based Biometrie Person Authentication, 4th International Conference, AVBPA 2003, Guildford, UK, June 9-11, 2003 Proceedings, pp. 128-136, 2003, Springer, 3-540-40302-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
21 | Sung-Bae Cho, Frank E. Pollick |
Toward Person Authentication with Point Light Display Using Neural Network Ensembles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AVBPA ![In: Audio-and Video-Based Biometrie Person Authentication, 4th International Conference, AVBPA 2003, Guildford, UK, June 9-11, 2003 Proceedings, pp. 878-885, 2003, Springer, 3-540-40302-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
21 | Raul Sánchez-Reillo |
Including Biometric Authentication in a Smart Card Operating System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AVBPA ![In: Audio- and Video-Based Biometric Person Authentication, Third International Conference, AVBPA 2001 Halmstad, Sweden, June 6-8, 2001, Proceedings, pp. 342-347, 2001, Springer, 3-540-42216-1. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
21 | Alexander De Luca, Katja Hertzschuch, Heinrich Hussmann |
ColorPIN: securing PIN entry through indirect input. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI ![In: Proceedings of the 28th International Conference on Human Factors in Computing Systems, CHI 2010, Atlanta, Georgia, USA, April 10-15, 2010, pp. 1103-1106, 2010, ACM, 978-1-60558-929-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
atm, colorpin, security, authentication |
21 | Moni Naor, Guy N. Rothblum |
The complexity of online memory checking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. ACM ![In: J. ACM 56(1), pp. 2:1-2:46, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Memory checking, authentication |
21 | Saar Drimer, Steven J. Murdoch, Ross J. Anderson |
Optimised to Fail: Card Readers for Online Banking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 13th International Conference, FC 2009, Accra Beach, Barbados, February 23-26, 2009. Revised Selected Papers, pp. 184-200, 2009, Springer. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
banking security, chip and PIN, authentication, reverse engineering, liability |
21 | Ki-Woong Park, Sang Seok Lim, Kyu Ho Park |
Computationally Efficient PKI-Based Single Sign-On Protocol, PKASSO for Mobile Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 57(6), pp. 821-834, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Authentication, Network-level security and protection |
21 | Jeffery H. K. Wu, Ruey-Feng Chang, Chii-Jen Chen, Ching-Lin Wang, Ta-Hsun Kuo, Woo Kyung Moon, Dar-Ren Chen |
Tamper Detection and Recovery for Medical Images Using Near-lossless Information Hiding Technique. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Digit. Imaging ![In: J. Digit. Imaging 21(1), pp. 59-76, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
image processing, Medical image, image authentication |
21 | Kevser Karaca, Albert Levi |
Towards a framework for security analysis of multiple password schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROSEC ![In: Proceedings of the First European Workshop on System Security, EUROSEC 2008, Glasgow, Scotland, UK, March 31, 2008, pp. 16-21, 2008, ACM, 978-1-60558-119-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
multiple passwords, security analysis, password based authentication, impersonation |
21 | Baris Coskun, Cormac Herley |
Can "Something You Know" Be Saved?. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings, pp. 421-440, 2008, Springer, 978-3-540-85884-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Authentication, passwords, challenge response |
21 | Jinxin He, Gaochao Xu, Xiaodong Fu, Zhiguo Zhou, Jianhua Jiang |
LMCM: Layered Multiple Chaining Model for Authenticating Multicast Streams. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SNPD ![In: Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2008, In conjunction with Second International Workshop on Advanced Internet Technology and Applications, August 6-8, 2008, Phuket, Thailand, pp. 206-211, 2008, IEEE Computer Society, 978-0-7695-3263-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Source Authentication, Chain hashing, Non-repudiation, Multicast security |
21 | Paul Z. Kolano |
Mesh: secure, lightweight grid middleware using existing SSH infrastructure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 12th ACM Symposium on Access Control Models and Technologies, SACMAT 2007, Sophia Antipolis, France, June 20-22, 2007, Proceedings, pp. 111-120, 2007, ACM, 978-1-59593-745-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
security, distributed systems, authentication, access control, middleware, grids, authorization, delegation, single sign-on, SSH |
21 | Daeyoung Kim 0004, Younggang Cui, Sangjin Kim, Heekuck Oh |
A Privacy Protecting UMTS AKA Protocol Providing Perfect Forward Secrecy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (2) ![In: Computational Science and Its Applications - ICCSA 2007, International Conference, Kuala Lumpur, Malaysia, August 26-29, 2007. Proceedings, Part II, pp. 987-995, 2007, Springer, 978-3-540-74475-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
privacy, authentication, UMTS, perfect forward secrecy |
21 | Hung-Yu Chien, Chen-Wei Huang |
A Lightweight RFID Protocol Using Substring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC ![In: Embedded and Ubiquitous Computing, International Conference, EUC 2007, Taipei, Taiwan, December 17-20, 2007, Proceedings, pp. 422-431, 2007, Springer, 978-3-540-77091-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
low-cost cryptography, DOS attack, authentication, RFID, tracing, reader |
21 | Lourdes López-Santidrián, José-Fernán Martínez, Alfonso Muñoz, Vicente Hernández, Antonio Dasilva 0001, Ana Belén García |
ASA: advanced secure architecture for preventing unauthorized access in personal computer platforms and BIOS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EATIS ![In: Proceedings of the 2007 Euro American conference on Telematics and Information Systems, EATIS 2007, Faro, Portugal, May 14-17, 2007, pp. 18, 2007, 978-1-59593-598-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
authentication and authorization, cryptographic models, security computing platforms, security, secure architecture |
21 | Les Green, Linas Maknavicius |
Secure Billing for Ubiquitous Service Delivery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICQT ![In: Performability Has its Price, 5th International Workshop on Internet Charging and QoS Technologies, ICQT 2006, St. Malo, France, June 27, 2006, Proceedings, pp. 90-101, 2006, Springer, 3-540-35456-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Security, Authentication, Billing, Ubiquity |
21 | Rafael Marín López, Antonio Fernandez Gómez-Skarmeta, Julien Bournelle, Maryline Laurent-Maknavicius, Jean Michel Combes |
Improved EAP keying framework for a secure mobility access service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWCMC ![In: Proceedings of the International Conference on Wireless Communications and Mobile Computing, IWCMC 2006, Vancouver, British Columbia, Canada, July 3-6, 2006, pp. 183-188, 2006, ACM, 1-59593-306-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
key hierarchy, mobility, authentication, access control, key management, roaming, EAP |
21 | Janne Lindqvist, Laura Takkinen |
Privacy management for secure mobility. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2006 ACM Workshop on Privacy in the Electronic Society, WPES 2006, Alexandria, VA, USA, October 30, 2006, pp. 63-66, 2006, ACM, 1-59593-556-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
privacy, mobility, authentication, host identity protocol |
21 | He Ge, Stephen R. Tate |
Efficient Authenticated Key-Exchange for Devices with a Trusted Manager. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Third International Conference on Information Technology: New Generations (ITNG 2006), 10-12 April 2006, Las Vegas, Nevada, USA, pp. 198-203, 2006, IEEE Computer Society, 0-7695-2497-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Embedded Systems, Authentication, Key Exchange, Strong RSA Assumption |
21 | Susan Wiedenbeck, Jim Waters, Leonardo Sobrado, Jean-Camille Birget |
Design and evaluation of a shoulder-surfing resistant graphical password scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AVI ![In: Proceedings of the working conference on Advanced visual interfaces, AVI 2006, Venezia, Italy, May 23-26, 2006, pp. 177-184, 2006, ACM Press, 1-59593-353-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
convex hull click scheme, authentication, usable security, graphical passwords, shoulder-surfing, password security |
21 | Michel Abdalla, Emmanuel Bresson, Olivier Chevassut, David Pointcheval |
Password-Based Group Key Exchange in a Constant Number of Rounds. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings, pp. 427-442, 2006, Springer, 3-540-33851-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Group Key Exchange, Password-based Authentication |
21 | Furkan Tari, A. Ant Ozok, Stephen H. Holden |
A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOUPS ![In: Proceedings of the 2nd Symposium on Usable Privacy and Security, SOUPS 2006, Pittsburgh, Pennsylvania, USA, July 12-14, 2006, pp. 56-66, 2006, ACM, 1-59593-448-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
authentication, human factors, usable security, graphical passwords, social engineering, shoulder surfing, password security |
21 | Mun-Kyu Lee, Jung Ki Min, Seok Hun Kang, Sang-Hwa Chung, Howon Kim 0001, Dong Kyue Kim |
Efficient Implementation of Pseudorandom Functions for Electronic Seal Protection Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers, pp. 173-186, 2006, Springer, 978-3-540-71092-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
electronic seal, RFID, AES, message authentication code, pseudorandom function |
21 | David Recordon, Drummond Reed |
OpenID 2.0: a platform for user-centric identity management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 2006 Workshop on Digital Identity Management, Alexandria, VA, USA, November 3, 2006, pp. 11-16, 2006, ACM, 1-59593-547-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
authentication, authorization, open source, identity, open standard, user-centric |
21 | Hsien-Chu Wu, Chuan-Po Yeh, Chwei-Shyong Tsai |
A Semi-fragile Watermarking Scheme Based on SVD and VQ Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (3) ![In: Computational Science and Its Applications - ICCSA 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part III, pp. 406-415, 2006, Springer, 3-540-34075-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Vector quantization (VQ), Singular value decomposition (SVD), Image authentication, Semi-fragile watermarking |
21 | Jihyung Lim, DaeHun Nyang, Jeonil Kang, KyungHee Lee, Hyotaek Lim |
Distributed Certificate Authority Under the GRID-Location Aided Routing Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (4) ![In: Computational Science and Its Applications - ICCSA 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part IV, pp. 380-387, 2006, Springer, 3-540-34077-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Certificate Issuing, Authentication, Ad Hoc Network Security |
21 | May Phyo Oo, Nilar Thein, Thinn Thu Naing |
Grid Security Framework for Managing the Certificate. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Web Intelligence ![In: 2006 IEEE / WIC / ACM International Conference on Web Intelligence (WI 2006), 18-22 December 2006, Hong Kong, China, pp. 166-169, 2006, IEEE Computer Society, 0-7695-2747-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Counting Process, RSA public key, Authentication method and Authorization method, Certificate |
21 | Jakob E. Bardram |
The trouble with login: on usability and computer security in ubiquitous computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Pers. Ubiquitous Comput. ![In: Pers. Ubiquitous Comput. 9(6), pp. 357-367, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Electronic patient record (EPR), Ubiquitous computing, Computer-supported cooperative work (CSCW), Healthcare, User authentication, Hospitals, Activity-based computing (ABC), Login |
21 | Amos Beimel, Lior Malka |
Efficient reliable communication over partially authenticated networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Distributed Comput. ![In: Distributed Comput. 18(1), pp. 1-19, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Incomplete networks, Fault tolerance, Authentication, Reliable communication |
21 | Tobias Straub, Thilo-Alexander Ginkel, Johannes Buchmann 0001 |
A Multipurpose Delegation Proxy for WWW Credentials. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, Second European PKI Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30 - July 1, 2005, Revised Selected Papers, pp. 1-21, 2005, Springer, 3-540-28062-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Credential Delegation, WWW Authentication, Usability, X.509 Certificate, Man-In-The-Middle |
21 | Thorsten Staake, Frédéric Thiesse, Elgar Fleisch |
Extending the EPC network: the potential of RFID in anti-counterfeiting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), Santa Fe, New Mexico, USA, March 13-17, 2005, pp. 1607-1612, 2005, ACM, 1-58113-964-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
track & trace, authentication, RFID, counterfeiting |
21 | Dev Anshul, Suman Roy 0001 |
A ZKP-based identification scheme for base nodes in wireless sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), Santa Fe, New Mexico, USA, March 13-17, 2005, pp. 319-323, 2005, ACM, 1-58113-964-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
guillou-quisquater protocol, sensor and ad hoc networks, security protocols, wireless security, base stations, zero-knowledge protocol, entity authentication |
21 | Mauro Brunato, Danilo Severina |
WilmaGate: a new open access gateway for hotspot management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WMASH ![In: Proceedings of the 3rd ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots, WMASH 2005, Cologne, Germany, September 2, 2005, pp. 56-64, 2005, ACM, 1-59593-143-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
access gateways, open access networks, wireless networks, authentication, authorization |
21 | Takeshi Okamoto, Raylin Tso, Eiji Okamoto |
One-Way and Two-Party Authenticated ID-Based Key Agreement Protocols Using Pairing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MDAI ![In: Modeling Decisions for Artificial Intelligence, Second International Conference, MDAI 2005, Tsukuba, Japan, July 25-27, 2005, Proceedings, pp. 122-133, 2005, Springer, 3-540-27871-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
authentication, Cryptography, key agreement, pairing, ID-based |
21 | Jane You, King Hong Cheung, Qin Li 0001, Prabir Bhattacharya |
An Integration of Biometrics and Mobile Computing for Personal Identification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICAPR (2) ![In: Pattern Recognition and Image Analysis, Third International Conference on Advances in Pattern Recognition, ICAPR 2005, Bath, UK, August 22-25, 2005, Proceedings, Part II, pp. 226-235, 2005, Springer, 3-540-28833-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Biometrics computing, feature extraction and indexing, identity authentication and verification, mobile computing, guided search |
21 | Ari Juels |
Strengthening EPC tags against cloning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Workshop on Wireless Security ![In: Proceedings of the 2005 ACM Workshop on Wireless Security, Cologne, Germany, September 2, 2005, pp. 67-76, 2005, ACM, 1-59593-142-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
track and trace, authentication, RFID, cloning, EPC, counterfeiting |
21 | Sung Jin Choi, Hee Yong Youn |
An Efficient Key Pre-distribution Scheme for Secure Distributed Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC Workshops ![In: Embedded and Ubiquitous Computing - EUC 2005 Workshops, EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Nagasaki, Japan, December 6-9, 2005, Proceedings, pp. 1088-1097, 2005, Springer, 3-540-30803-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
security, mutual authentication, key pre-distribution, LU decomposition, distributed sensor network |
21 | Chong-zhi Gao, Zheng-an Yao |
How to Authenticate Real Time Streams Using Improved Online/Offline Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 4th International Conference, CANS 2005, Xiamen, China, December 14-16, 2005, Proceedings, pp. 134-146, 2005, Springer, 3-540-30849-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Online/Offline Signatures, Stream Authentication, Real Time Streams |
21 | Bok-Min Goi, Jintai Ding, Mohammad Umar Siddiqi |
Cryptanalysis of PASS II and MiniPass. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005, Proceedings, pp. 159-168, 2005, Springer, 3-540-30934-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
partial polynomial evaluation, cryptanalysis, digital signature scheme, NTRU, Authentication scheme |
21 | Di Ma, Robert H. Deng, HweeHwa Pang, Jianying Zhou 0001 |
Authenticating Query Results in Data Publishing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005, Proceedings, pp. 376-388, 2005, Springer, 3-540-30934-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
authentication, data publishing, aggregated signature, merkle hash tree |
21 | Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo |
Secure Protected Password Change Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security, Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings, pp. 472-477, 2005, Springer, 3-540-29113-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Cryptography, Key agreement, Password authentication |
21 | Sungsoo Yoon, Seung-Seok Choi, Sung-Hyuk Cha, Yillbyung Lee, Charles C. Tappert |
On the Individuality of the Iris Biometric. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIAR ![In: Image Analysis and Recognition, Second International Conference, ICIAR 2005, Toronto, Canada, September 28-30, 2005, Proceedings, pp. 1118-1124, 2005, Springer, 3-540-29069-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Biometric individuality, Dichotomy model, Iris authentication, Histogram |
21 | Andreas Pashalidis, Chris J. Mitchell |
Single Sign-On Using Trusted Platforms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 6th International Conference, ISC 2003, Bristol, UK, October 1-3, 2003, Proceedings, pp. 54-68, 2003, Springer, 3-540-20176-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
TCPA, authentication, single sign-on |
21 | Chou Chen Yang, Jian Wei Li, Ting Yi Chang |
A Novel Mobile IP Registration Scheme for Hierarchical Mobility Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPP Workshops ![In: 32nd International Conference on Parallel Processing Workshops (ICPP 2003 Workshops), 6-9 October 2003, Kaohsiung, Taiwan, pp. 367-374, 2003, IEEE Computer Society, 0-7695-2018-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Security, Authentication, Mobility management, Mobile IP |
21 | Mihir Bellare, Bennet S. Yee |
Forward-Security in Private-Key Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2003, The Cryptographers' Track at the RSA Conference 2003, San Francisco, CA, USA, April 13-17, 2003, Proceedings, pp. 1-18, 2003, Springer, 3-540-00847-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
pseudorandom bit generators, message authentication, forward security, Symmetric cryptography, audit logs, proofs of security |
21 | Shouhuai Xu, Ravi S. Sandhu |
Authenticated multicast immune to denial-of-service attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2002 ACM Symposium on Applied Computing (SAC), March 10-14, 2002, Madrid, Spain, pp. 196-200, 2002, ACM, 1-58113-445-2. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
multicast authentication, denial-of-service |
21 | Joseph W. Graham II |
Authenticating public access networking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGUCCS ![In: Proceedings of the 30th annual ACM SIGUCCS conference on User services: Charting Bold Courses - New Worlds in User Services, Providence, Rhode Island, USA, November 20-23, 2002, pp. 247-248, 2002, ACM, 1-58113-564-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
NDS, PPPoE, authentication, networking, wireless, LDAP, Kerberos, directory, DHCP, active directory |
21 | Jeffrey Hoffstein, Jill Pipher, Joseph H. Silverman |
NSS: An NTRU Lattice-Based Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2001, International Conference on the Theory and Application of Cryptographic Techniques, Innsbruck, Austria, May 6-10, 2001, Proceeding, pp. 211-228, 2001, Springer, 3-540-42070-3. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
public key authentication, NSS, digital signature, NTRU, lattice-based cryptography |
21 | Nalini K. Ratha, Jonathan H. Connell, Ruud M. Bolle |
Secure data hiding in wavelet compressed fingerprint images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Multimedia Workshops ![In: Proceedings of the ACM Multimedia 2000 Workshops, Los Angeles, CA, USA, October 30 - November 3, 2000, pp. 127-130, 2000, ACM Press, 1-58113-311-1. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
WSQ compression, authentication, biometrics, watermarking, fingerprints, data hiding |
21 | Mark Etzel, Sarvar Patel, Zulfikar Ramzan |
SQUARE HASH: Fast Message Authenication via Optimized Universal Hash Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings, pp. 234-251, 1999, Springer, 3-540-66347-9. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Message authentication codes, Universal Hashing |
21 | John G. Brainard |
SecurSight: An Architecture for Secure Information Access. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 15th Annual Computer Security Applications Conference (ACSAC 1999), 6-10 December 1999, Scottsdale, AZ, USA, pp. 349-357, 1999, IEEE Computer Society, 0-7695-0346-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
authentication, architecture, authorization, PKI |
21 | Stefan Wolf 0001 |
Strong Security Against Active Attacks in Information-Theoretic Secret-Key Agreement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT '98, International Conference on the Theory and Applications of Cryptology and Information Security, Beijing, China, October 18-22, 1998, Proceedings, pp. 405-419, 1998, Springer, 3-540-65109-8. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
unconditional secrecy, authentication, information theory, privacy amplification, Secret-key agreement |
21 | Jean-Jacques Bascou |
System Survey: Building an Authenticity Profile. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCCN ![In: Proceedings of the International Conference On Computer Communications and Networks (ICCCN 1998), October 12-15, 1998, Lafayette, Louisiana, USA, pp. 284-288, 1998, IEEE Computer Society, 0-8186-9014-3. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
Security, Authentication, User Profile |
20 | Stephen Badan, Julien Probst, Markus Jaton, Damien Vionnet, Jean-Frédéric Wagen, Gérald Litzistorf |
A Rich Client-Server Based Framework for Convenient Security and Management of Mobile Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiSec ![In: Security and Privacy in Mobile Information and Communication Systems, First International ICST Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009, Revised Selected Papers, pp. 23-34, 2009, Springer, 978-3-642-04433-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
rich client, transient authentication, theft detection, authentication, smartphone, client-server, mobile security, secure framework |
20 | Muzaffar Bashir, Jürgen Kempf |
Bio-Inspired Reference Level Assigned DTW for Person Identification Using Handwritten Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COST 2101/2102 Conference ![In: Biometric ID Management and Multimodal Communication, Joint COST 2101 and 2102 International Conference, BioID_MultiComm 2009, Madrid, Spain, September 16-18, 2009. Proceedings, pp. 200-206, 2009, Springer, 978-3-642-04390-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
online signature authentication, biometric person authentication, signature normalization, dynamic time warping |
20 | Muhammad Sher, Thomas Magedanz |
Secure access to IP multimedia services using generic bootstrapping architecture (GBA) for 3G & beyond mobile networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Q2SWinet ![In: Q2SWinet'06 - Proceedings of the Second ACM Workshop on Q2S and Security for Wireless and Mobile Networks, Terromolinos, Spain, October 2, 2006, pp. 17-24, 2006, ACM, 1-59593-486-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
IP multimedia system, authentication proxy, generic authentication architecture, generic bootstrapping architecture, transport layer security, security and privacy |
20 | Michael A. Schneider, Edward W. Felten |
Efficient Commerce Protocols based on One-Time Pads. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 16th Annual Computer Security Applications Conference (ACSAC 2000), 11-15 December 2000, New Orleans, Louisiana, USA, pp. 317-, 2000, IEEE Computer Society, 0-7695-0859-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
credit transactions, commerce protocol, face-to-face credit card authorizations, transaction outcome agreement, OTPMAC function, one-time identifier, cryptographic pseudo-random number generators, cryptographic MAC functions, security, cryptography, protocols, anonymity, transaction processing, codes, random number generation, business data processing, authorisation, message authentication, message authentication code, one-time pad |
20 | Xunhua Wang, Yih Huang, Yvo Desmedt, David Rine |
Enabling Secure On-Line DNS Dynamic Update. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 16th Annual Computer Security Applications Conference (ACSAC 2000), 11-15 December 2000, New Orleans, Louisiana, USA, pp. 52-, 2000, IEEE Computer Society, 0-7695-0859-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
secure online DNS dynamic update, Internet Engineering Task Force, DNS Security Extension, zone security key, role separation principle, signature computation time, Internet, authentication, cryptography, distributed databases, RSA, transport protocols, experimental results, message authentication, threshold cryptography, telecommunication security, MD5, Domain Name System, IP addresses, performance penalty, DNSSEC |
20 | Christian Labonté, Sampalli Srinivas |
Group Management Strategies for Secure Multicasting on Active Virtual Private Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: Proceedings 27th Conference on Local Computer Networks, Tampa, Florida, USA, 8-10 November, 2000, pp. 213-222, 2000, IEEE Computer Society, 0-7695-0912-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
multicast group management, active virtual private networks, message integrity, message privacy, Secure Active VPN Environment, SAVE project, Dalhousie University, authentication, cryptography, cryptography, multicasting, transport protocols, network architecture, multicast communication, message authentication, IP multicast, telecommunication networks, telecommunication security, secure multicasting, business communication, telecommunication network management |
20 | Antonio Fernandez Gómez-Skarmeta, Angel L. Mateo-Martinez, Pedro M. Ruiz-Martinez |
IGMPv3-Based Method for Avoiding DoS Attacks in Multicast-Enabled Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: Proceedings 27th Conference on Local Computer Networks, Tampa, Florida, USA, 8-10 November, 2000, pp. 94-95, 2000, IEEE Computer Society, 0-7695-0912-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
DoS attack avoidance, IGMPv3-based method, IP multicast-enabled networks, security protection, Internet, authentication, transport protocols, multimedia communication, multimedia communications, video conferencing, teleconferencing, multicast communication, message authentication, telecommunication security, billing, Internet service providers, audio conferencing |
20 | Arun Iyengar, Daniel M. Dias |
Distributed Virtual Malls on the World Wide Web. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS ![In: Proceedings of the 18th International Conference on Distributed Computing Systems, Amsterdam, The Netherlands, May 26-29, 1998, pp. 58-65, 1998, IEEE Computer Society, 0-8186-8292-2. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
virtual mall, distributed authentication, state preservation, virtual shopping, authentication, electronic commerce |
20 | Sarvar Patel |
Number Theoretic Attacks on Secure Password Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 1997 IEEE Symposium on Security and Privacy, May 4-7, 1997, Oakland, CA, USA, pp. 236-247, 1997, IEEE Computer Society, 0-8186-7828-3. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
number theoretic attacks, secure password schemes, Encrypted Key Exchange, EKE, authenticated information exchange, insecure network, secret key cryptography, randomized confounders, RSA version, half encrypted versions, Direct Authentication Protocol, Secret Public Key Protocol versions, secure protocols, message authentication, dictionary attacks, active attacks, password guessing attacks |
20 | Wenbo Mao |
An augmentation of BAN-like logics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: The Eighth IEEE Computer Security Foundations Workshop (CSFW '95), March 13-15, 1995, Kenmare, County Kerry, Ireland, pp. 44-, 1995, IEEE Computer Society, 0-8186-7033-9. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
BAN-like logics augmentation, protocol idealization, rule-based technique, protocol syntax, protocols, formal logic, message authentication, authentication protocols, symbolic manipulation |
19 | Tomi Kinnunen, Filip Sedlak, Roman Bednarik |
Towards task-independent person authentication using eye movement signals. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ETRA ![In: Proceedings of the 2010 Symposium on Eye-Tracking Research & Applications, ETRA 2010, Austin, Texas, USA, March 22-24, 2010, pp. 187-190, 2010, ACM, 978-1-60558-994-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
task independence, eye tracking, biometrics |
19 | Manik Lal Das |
Two-factor user authentication in wireless sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Wirel. Commun. ![In: IEEE Trans. Wirel. Commun. 8(3), pp. 1086-1090, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
19 | Lei Zhang 0064, Susanna Spinsante, Chaojing Tang, Ennio Gambi |
Application and performance analysis of various AEAD techniques for space telecommand authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Wirel. Commun. ![In: IEEE Trans. Wirel. Commun. 8(1), pp. 308-319, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
19 | Geraldine Kwang, Roland H. C. Yap, Terence Sim, Rajiv Ramnath |
An Usability Study of Continuous Biometrics Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICB ![In: Advances in Biometrics, Third International Conference, ICB 2009, Alghero, Italy, June 2-5, 2009. Proceedings, pp. 828-837, 2009, Springer, 978-3-642-01792-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
19 | Sebastian Gajek, Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy |
TruWallet: trustworthy and migratable wallet-based web authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STC ![In: Proceedings of the 4th ACM Workshop on Scalable Trusted Computing, STC 2009, Chicago, Illinois, USA, November 13, 2009, pp. 19-28, 2009, ACM, 978-1-60558-788-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
password wallet, secure migration, trusted computing, phishing, identity theft |
19 | Huixian Li, Liaojun Pang |
A Novel Biometric-Based Authentication Scheme with Privacy Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Fifth International Conference on Information Assurance and Security, IAS 2009, Xi'An, China, 18-20 August 2009, pp. 295-298, 2009, IEEE Computer Society, 978-0-7695-3744-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
19 | Yung-Cheng Lee, Wen-Chung Kuo, Yi-Chih Hsieh, Ta-Cheng Chen |
Security Enhancement of the Authentication Protocol for RFID Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Fifth International Conference on Information Assurance and Security, IAS 2009, Xi'An, China, 18-20 August 2009, pp. 521-524, 2009, IEEE Computer Society, 978-0-7695-3744-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
19 | Kuo-Hui Yeh, Nai-Wei Lo |
Improvement of an EPC Gen2 Compliant RFID Authentication Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Fifth International Conference on Information Assurance and Security, IAS 2009, Xi'An, China, 18-20 August 2009, pp. 532-535, 2009, IEEE Computer Society, 978-0-7695-3744-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
19 | Yike Yu, Xuefeng Zheng, Mingde Zhang, Qingguo Zhang |
An Identity-Based Authentication Model for Mobile Agent. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Fifth International Conference on Information Assurance and Security, IAS 2009, Xi'An, China, 18-20 August 2009, pp. 475-478, 2009, IEEE Computer Society, 978-0-7695-3744-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
19 | Stuart E. Schechter, Serge Egelman, Robert W. Reeder |
It's not what you know, but who you know: a social approach to last-resort authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI ![In: Proceedings of the 27th International Conference on Human Factors in Computing Systems, CHI 2009, Boston, MA, USA, April 4-9, 2009, pp. 1983-1992, 2009, ACM, 978-1-60558-246-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
security, privacy, usability testing and evaluation |
19 | Binod Vaidya, Jong Hyuk Park, Joel J. P. C. Rodrigues |
HOTP-Based User Authentication Scheme in Home Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISA ![In: Advances in Information Security and Assurance, Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings, pp. 672-681, 2009, Springer, 978-3-642-02616-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
19 | Stanislaw Jarecki, Xiaomin Liu |
Private Mutual Authentication and Conditional Oblivious Transfer. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009. Proceedings, pp. 90-107, 2009, Springer, 978-3-642-03355-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
19 | Chiu C. Tan 0001, Bo Sheng, Qun Li 0001 |
Secure and Serverless RFID Authentication and Search Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Wirel. Commun. ![In: IEEE Trans. Wirel. Commun. 7(4), pp. 1400-1407, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Caimu Tang, Dapeng Oliver Wu |
An Efficient Mobile Authentication Scheme for Wireless Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Wirel. Commun. ![In: IEEE Trans. Wirel. Commun. 7(4), pp. 1408-1416, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Li Lu 0001, Jinsong Han, Yunhao Liu 0001, Lei Hu, Jinpeng Huai, Lionel M. Ni, Jian Ma |
Pseudo Trust: Zero-Knowledge Authentication in Anonymous P2Ps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Parallel Distributed Syst. ![In: IEEE Trans. Parallel Distributed Syst. 19(10), pp. 1325-1337, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Reihaneh Safavi-Naini, Peter R. Wild |
Information Theoretic Bounds on Authentication Systems in Query Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Theory ![In: IEEE Trans. Inf. Theory 54(6), pp. 2426-2436, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Srdjan Capkun, Mario Cagalj, Ram Kumar Rengaswamy, Ilias Tsigkogiannis, Jean-Pierre Hubaux, Mani B. Srivastava |
Integrity Codes: Message Integrity Protection and Authentication over Insecure Channels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 5(4), pp. 208-223, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Kotaro Sonoda, Osamu Takizawa |
User Authentication Scheme Using Individual Auditory Pop-Out. ![Search on Bibsonomy](Pics/bibsonomy.png) |
New Directions in Intelligent Interactive Multimedia ![In: New Directions in Intelligent Interactive Multimedia, pp. 341-349, 2008, Springer, 978-3-540-68126-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Hung-Min Sun, King-Hang Wang |
Defending Secret-Key Based Authentication Protocols against the Stolen-Secret Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISECS ![In: Proceedings of The International Symposium on Electronic Commerce and Security, ISECS 2008, August 3-5, 2008, Guangzhou, China, pp. 385-389, 2008, IEEE Computer Society, 978-0-7695-3258-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Tong-Lee Lim, Tieyan Li |
Exposing an effective denial of information attack from the misuse of EPCglobal standards in an RFID authentication scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PIMRC ![In: Proceedings of the IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC 2008, 15-18 September 2008, Cannes, French Riviera, France, pp. 1-6, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Takamichi Saito, Kiyomi Sekiguchi, Ryosuke Hatsugai |
Authentication Binding between TLS and HTTP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NBiS ![In: Network-Based Information Systems, 2nd International Conference, NBiS 2008, Turin, Italy, September 1-5, 2008. Proceedings, pp. 252-262, 2008, Springer, 978-3-540-85692-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Mike Burmester, Breno de Medeiros, Rossana Motta |
Robust, anonymous RFID authentication with constant key-lookup. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2008, Tokyo, Japan, March 18-20, 2008, pp. 283-291, 2008, ACM, 978-1-59593-979-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
provably secure protocols, privacy, scalability, RFID, availability, unlinkability |
19 | Yun-kyung Lee, Deok-Gyu Lee, Jong Wook Han, Jeong-Nyeo Kim |
The home device authentication system construction for pervasive home network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiQuitous ![In: 5th Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking, and Services, MobiQuitous 2008, July 21-25, 2008, Dublin, Ireland, 2008, ICST / ACM, 978-963-9799-27-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Haojin Zhu, Xiaodong Lin 0001, Rongxing Lu, Pin-Han Ho, Xuemin Shen |
AEMA: An Aggregated Emergency Message Authentication Scheme for Enhancing the Security of Vehicular Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: Proceedings of IEEE International Conference on Communications, ICC 2008, Beijing, China, 19-23 May 2008, pp. 1436-1440, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
|
|