|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 8079 occurrences of 2235 keywords
|
|
|
Results
Found 25398 publication records. Showing 25398 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
21 | Mi-Ae Kim, Kil-Sang Yoo, Won-Hyung Lee |
Fragile Watermarking Scheme for Accepting Image Compression. |
EUC |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Weidong Shi, Hsien-Hsin S. Lee, Mrinmoy Ghosh, Chenghuai Lu |
Architectural Support for High Speed Protection of Memory Integrity and Confidentiality in Multiprocessor Systems. |
IEEE PACT |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Michael Walker 0001 |
On the Security of 3GPP Networks. |
EUROCRYPT |
2000 |
DBLP DOI BibTeX RDF |
|
21 | Chi-Chun Lo, Yi-Chun Yeh |
Security issues on B-ISDN billing system. |
NOMS |
1998 |
DBLP DOI BibTeX RDF |
|
21 | Tatsuaki Okamoto, Kazuo Ohta |
Disposable Zero-Knowledge Authentications and Their Applications to Untraceable Electronic Cash. |
CRYPTO |
1989 |
DBLP DOI BibTeX RDF |
|
21 | Giovanni Di Crescenzo, R. F. Graveman, Renwei Ge, Gonzalo R. Arce |
Approximate Message Authentication and Biometric Entity Authentication. |
Financial Cryptography |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Jiansheng Chen, Yiu Sang Moon, Hoi-Wo Yeung |
Palmprint Authentication Using Time Series. |
AVBPA |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Byungjun Son, Yillbyung Lee |
Biometric Authentication System Using Reduced Joint Feature Vector of Iris and Face. |
AVBPA |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Jacek Czyz, Mohammad Sadeghi 0001, Josef Kittler, Luc Vandendorpe |
Decision Fusion for Face Authentication. |
ICBA |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Miguel Gustavo Lizárraga, Luan Ling Lee |
Biometric Personal Authentication Based on Handwritten Signals. |
ICBA |
2004 |
DBLP DOI BibTeX RDF |
|
21 | M. Wirotius, Jean-Yves Ramel, Nicole Vincent |
New Features for Authentication by On-Line Handwritten Signatures. |
ICBA |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Lívia C. F. Araújo, Luiz H. R. Sucupira, Miguel Gustavo Lizárraga, Lee Luan Ling, João Baptista T. Yabu-uti |
User Authentication through Typing Biometrics Features. |
ICBA |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Olaf Henniger, Katrin Franke |
Biometric User Authentication on Smart Cards by Means of Handwritten Signatures. |
ICBA |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Purdy Ho, John Armington |
A Dual-Factor Authentication System Featuring Speaker Verification and Token Technology. |
AVBPA |
2003 |
DBLP DOI BibTeX RDF |
|
21 | Sung-Bae Cho, Frank E. Pollick |
Toward Person Authentication with Point Light Display Using Neural Network Ensembles. |
AVBPA |
2003 |
DBLP DOI BibTeX RDF |
|
21 | Raul Sánchez-Reillo |
Including Biometric Authentication in a Smart Card Operating System. |
AVBPA |
2001 |
DBLP DOI BibTeX RDF |
|
21 | Alexander De Luca, Katja Hertzschuch, Heinrich Hussmann |
ColorPIN: securing PIN entry through indirect input. |
CHI |
2010 |
DBLP DOI BibTeX RDF |
atm, colorpin, security, authentication |
21 | Moni Naor, Guy N. Rothblum |
The complexity of online memory checking. |
J. ACM |
2009 |
DBLP DOI BibTeX RDF |
Memory checking, authentication |
21 | Saar Drimer, Steven J. Murdoch, Ross J. Anderson |
Optimised to Fail: Card Readers for Online Banking. |
Financial Cryptography |
2009 |
DBLP DOI BibTeX RDF |
banking security, chip and PIN, authentication, reverse engineering, liability |
21 | Ki-Woong Park, Sang Seok Lim, Kyu Ho Park |
Computationally Efficient PKI-Based Single Sign-On Protocol, PKASSO for Mobile Devices. |
IEEE Trans. Computers |
2008 |
DBLP DOI BibTeX RDF |
Authentication, Network-level security and protection |
21 | Jeffery H. K. Wu, Ruey-Feng Chang, Chii-Jen Chen, Ching-Lin Wang, Ta-Hsun Kuo, Woo Kyung Moon, Dar-Ren Chen |
Tamper Detection and Recovery for Medical Images Using Near-lossless Information Hiding Technique. |
J. Digit. Imaging |
2008 |
DBLP DOI BibTeX RDF |
image processing, Medical image, image authentication |
21 | Kevser Karaca, Albert Levi |
Towards a framework for security analysis of multiple password schemes. |
EUROSEC |
2008 |
DBLP DOI BibTeX RDF |
multiple passwords, security analysis, password based authentication, impersonation |
21 | Baris Coskun, Cormac Herley |
Can "Something You Know" Be Saved?. |
ISC |
2008 |
DBLP DOI BibTeX RDF |
Authentication, passwords, challenge response |
21 | Jinxin He, Gaochao Xu, Xiaodong Fu, Zhiguo Zhou, Jianhua Jiang |
LMCM: Layered Multiple Chaining Model for Authenticating Multicast Streams. |
SNPD |
2008 |
DBLP DOI BibTeX RDF |
Source Authentication, Chain hashing, Non-repudiation, Multicast security |
21 | Paul Z. Kolano |
Mesh: secure, lightweight grid middleware using existing SSH infrastructure. |
SACMAT |
2007 |
DBLP DOI BibTeX RDF |
security, distributed systems, authentication, access control, middleware, grids, authorization, delegation, single sign-on, SSH |
21 | Daeyoung Kim 0004, Younggang Cui, Sangjin Kim, Heekuck Oh |
A Privacy Protecting UMTS AKA Protocol Providing Perfect Forward Secrecy. |
ICCSA (2) |
2007 |
DBLP DOI BibTeX RDF |
privacy, authentication, UMTS, perfect forward secrecy |
21 | Hung-Yu Chien, Chen-Wei Huang |
A Lightweight RFID Protocol Using Substring. |
EUC |
2007 |
DBLP DOI BibTeX RDF |
low-cost cryptography, DOS attack, authentication, RFID, tracing, reader |
21 | Lourdes López-Santidrián, José-Fernán Martínez, Alfonso Muñoz, Vicente Hernández, Antonio Dasilva 0001, Ana Belén García |
ASA: advanced secure architecture for preventing unauthorized access in personal computer platforms and BIOS. |
EATIS |
2007 |
DBLP DOI BibTeX RDF |
authentication and authorization, cryptographic models, security computing platforms, security, secure architecture |
21 | Les Green, Linas Maknavicius |
Secure Billing for Ubiquitous Service Delivery. |
ICQT |
2006 |
DBLP DOI BibTeX RDF |
Security, Authentication, Billing, Ubiquity |
21 | Rafael Marín López, Antonio Fernandez Gómez-Skarmeta, Julien Bournelle, Maryline Laurent-Maknavicius, Jean Michel Combes |
Improved EAP keying framework for a secure mobility access service. |
IWCMC |
2006 |
DBLP DOI BibTeX RDF |
key hierarchy, mobility, authentication, access control, key management, roaming, EAP |
21 | Janne Lindqvist, Laura Takkinen |
Privacy management for secure mobility. |
WPES |
2006 |
DBLP DOI BibTeX RDF |
privacy, mobility, authentication, host identity protocol |
21 | He Ge, Stephen R. Tate |
Efficient Authenticated Key-Exchange for Devices with a Trusted Manager. |
ITNG |
2006 |
DBLP DOI BibTeX RDF |
Embedded Systems, Authentication, Key Exchange, Strong RSA Assumption |
21 | Susan Wiedenbeck, Jim Waters, Leonardo Sobrado, Jean-Camille Birget |
Design and evaluation of a shoulder-surfing resistant graphical password scheme. |
AVI |
2006 |
DBLP DOI BibTeX RDF |
convex hull click scheme, authentication, usable security, graphical passwords, shoulder-surfing, password security |
21 | Michel Abdalla, Emmanuel Bresson, Olivier Chevassut, David Pointcheval |
Password-Based Group Key Exchange in a Constant Number of Rounds. |
Public Key Cryptography |
2006 |
DBLP DOI BibTeX RDF |
Group Key Exchange, Password-based Authentication |
21 | Furkan Tari, A. Ant Ozok, Stephen H. Holden |
A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords. |
SOUPS |
2006 |
DBLP DOI BibTeX RDF |
authentication, human factors, usable security, graphical passwords, social engineering, shoulder surfing, password security |
21 | Mun-Kyu Lee, Jung Ki Min, Seok Hun Kang, Sang-Hwa Chung, Howon Kim 0001, Dong Kyue Kim |
Efficient Implementation of Pseudorandom Functions for Electronic Seal Protection Protocols. |
WISA |
2006 |
DBLP DOI BibTeX RDF |
electronic seal, RFID, AES, message authentication code, pseudorandom function |
21 | David Recordon, Drummond Reed |
OpenID 2.0: a platform for user-centric identity management. |
Digital Identity Management |
2006 |
DBLP DOI BibTeX RDF |
authentication, authorization, open source, identity, open standard, user-centric |
21 | Hsien-Chu Wu, Chuan-Po Yeh, Chwei-Shyong Tsai |
A Semi-fragile Watermarking Scheme Based on SVD and VQ Techniques. |
ICCSA (3) |
2006 |
DBLP DOI BibTeX RDF |
Vector quantization (VQ), Singular value decomposition (SVD), Image authentication, Semi-fragile watermarking |
21 | Jihyung Lim, DaeHun Nyang, Jeonil Kang, KyungHee Lee, Hyotaek Lim |
Distributed Certificate Authority Under the GRID-Location Aided Routing Protocol. |
ICCSA (4) |
2006 |
DBLP DOI BibTeX RDF |
Certificate Issuing, Authentication, Ad Hoc Network Security |
21 | May Phyo Oo, Nilar Thein, Thinn Thu Naing |
Grid Security Framework for Managing the Certificate. |
Web Intelligence |
2006 |
DBLP DOI BibTeX RDF |
Counting Process, RSA public key, Authentication method and Authorization method, Certificate |
21 | Jakob E. Bardram |
The trouble with login: on usability and computer security in ubiquitous computing. |
Pers. Ubiquitous Comput. |
2005 |
DBLP DOI BibTeX RDF |
Electronic patient record (EPR), Ubiquitous computing, Computer-supported cooperative work (CSCW), Healthcare, User authentication, Hospitals, Activity-based computing (ABC), Login |
21 | Amos Beimel, Lior Malka |
Efficient reliable communication over partially authenticated networks. |
Distributed Comput. |
2005 |
DBLP DOI BibTeX RDF |
Incomplete networks, Fault tolerance, Authentication, Reliable communication |
21 | Tobias Straub, Thilo-Alexander Ginkel, Johannes Buchmann 0001 |
A Multipurpose Delegation Proxy for WWW Credentials. |
EuroPKI |
2005 |
DBLP DOI BibTeX RDF |
Credential Delegation, WWW Authentication, Usability, X.509 Certificate, Man-In-The-Middle |
21 | Thorsten Staake, Frédéric Thiesse, Elgar Fleisch |
Extending the EPC network: the potential of RFID in anti-counterfeiting. |
SAC |
2005 |
DBLP DOI BibTeX RDF |
track & trace, authentication, RFID, counterfeiting |
21 | Dev Anshul, Suman Roy 0001 |
A ZKP-based identification scheme for base nodes in wireless sensor networks. |
SAC |
2005 |
DBLP DOI BibTeX RDF |
guillou-quisquater protocol, sensor and ad hoc networks, security protocols, wireless security, base stations, zero-knowledge protocol, entity authentication |
21 | Mauro Brunato, Danilo Severina |
WilmaGate: a new open access gateway for hotspot management. |
WMASH |
2005 |
DBLP DOI BibTeX RDF |
access gateways, open access networks, wireless networks, authentication, authorization |
21 | Takeshi Okamoto, Raylin Tso, Eiji Okamoto |
One-Way and Two-Party Authenticated ID-Based Key Agreement Protocols Using Pairing. |
MDAI |
2005 |
DBLP DOI BibTeX RDF |
authentication, Cryptography, key agreement, pairing, ID-based |
21 | Jane You, King Hong Cheung, Qin Li 0001, Prabir Bhattacharya |
An Integration of Biometrics and Mobile Computing for Personal Identification. |
ICAPR (2) |
2005 |
DBLP DOI BibTeX RDF |
Biometrics computing, feature extraction and indexing, identity authentication and verification, mobile computing, guided search |
21 | Ari Juels |
Strengthening EPC tags against cloning. |
Workshop on Wireless Security |
2005 |
DBLP DOI BibTeX RDF |
track and trace, authentication, RFID, cloning, EPC, counterfeiting |
21 | Sung Jin Choi, Hee Yong Youn |
An Efficient Key Pre-distribution Scheme for Secure Distributed Sensor Networks. |
EUC Workshops |
2005 |
DBLP DOI BibTeX RDF |
security, mutual authentication, key pre-distribution, LU decomposition, distributed sensor network |
21 | Chong-zhi Gao, Zheng-an Yao |
How to Authenticate Real Time Streams Using Improved Online/Offline Signatures. |
CANS |
2005 |
DBLP DOI BibTeX RDF |
Online/Offline Signatures, Stream Authentication, Real Time Streams |
21 | Bok-Min Goi, Jintai Ding, Mohammad Umar Siddiqi |
Cryptanalysis of PASS II and MiniPass. |
ICICS |
2005 |
DBLP DOI BibTeX RDF |
partial polynomial evaluation, cryptanalysis, digital signature scheme, NTRU, Authentication scheme |
21 | Di Ma, Robert H. Deng, HweeHwa Pang, Jianying Zhou 0001 |
Authenticating Query Results in Data Publishing. |
ICICS |
2005 |
DBLP DOI BibTeX RDF |
authentication, data publishing, aggregated signature, merkle hash tree |
21 | Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo |
Secure Protected Password Change Scheme. |
MMM-ACNS |
2005 |
DBLP DOI BibTeX RDF |
Cryptography, Key agreement, Password authentication |
21 | Sungsoo Yoon, Seung-Seok Choi, Sung-Hyuk Cha, Yillbyung Lee, Charles C. Tappert |
On the Individuality of the Iris Biometric. |
ICIAR |
2005 |
DBLP DOI BibTeX RDF |
Biometric individuality, Dichotomy model, Iris authentication, Histogram |
21 | Andreas Pashalidis, Chris J. Mitchell |
Single Sign-On Using Trusted Platforms. |
ISC |
2003 |
DBLP DOI BibTeX RDF |
TCPA, authentication, single sign-on |
21 | Chou Chen Yang, Jian Wei Li, Ting Yi Chang |
A Novel Mobile IP Registration Scheme for Hierarchical Mobility Management. |
ICPP Workshops |
2003 |
DBLP DOI BibTeX RDF |
Security, Authentication, Mobility management, Mobile IP |
21 | Mihir Bellare, Bennet S. Yee |
Forward-Security in Private-Key Cryptography. |
CT-RSA |
2003 |
DBLP DOI BibTeX RDF |
pseudorandom bit generators, message authentication, forward security, Symmetric cryptography, audit logs, proofs of security |
21 | Shouhuai Xu, Ravi S. Sandhu |
Authenticated multicast immune to denial-of-service attack. |
SAC |
2002 |
DBLP DOI BibTeX RDF |
multicast authentication, denial-of-service |
21 | Joseph W. Graham II |
Authenticating public access networking. |
SIGUCCS |
2002 |
DBLP DOI BibTeX RDF |
NDS, PPPoE, authentication, networking, wireless, LDAP, Kerberos, directory, DHCP, active directory |
21 | Jeffrey Hoffstein, Jill Pipher, Joseph H. Silverman |
NSS: An NTRU Lattice-Based Signature Scheme. |
EUROCRYPT |
2001 |
DBLP DOI BibTeX RDF |
public key authentication, NSS, digital signature, NTRU, lattice-based cryptography |
21 | Nalini K. Ratha, Jonathan H. Connell, Ruud M. Bolle |
Secure data hiding in wavelet compressed fingerprint images. |
ACM Multimedia Workshops |
2000 |
DBLP DOI BibTeX RDF |
WSQ compression, authentication, biometrics, watermarking, fingerprints, data hiding |
21 | Mark Etzel, Sarvar Patel, Zulfikar Ramzan |
SQUARE HASH: Fast Message Authenication via Optimized Universal Hash Functions. |
CRYPTO |
1999 |
DBLP DOI BibTeX RDF |
Message authentication codes, Universal Hashing |
21 | John G. Brainard |
SecurSight: An Architecture for Secure Information Access. |
ACSAC |
1999 |
DBLP DOI BibTeX RDF |
authentication, architecture, authorization, PKI |
21 | Stefan Wolf 0001 |
Strong Security Against Active Attacks in Information-Theoretic Secret-Key Agreement. |
ASIACRYPT |
1998 |
DBLP DOI BibTeX RDF |
unconditional secrecy, authentication, information theory, privacy amplification, Secret-key agreement |
21 | Jean-Jacques Bascou |
System Survey: Building an Authenticity Profile. |
ICCCN |
1998 |
DBLP DOI BibTeX RDF |
Security, Authentication, User Profile |
20 | Stephen Badan, Julien Probst, Markus Jaton, Damien Vionnet, Jean-Frédéric Wagen, Gérald Litzistorf |
A Rich Client-Server Based Framework for Convenient Security and Management of Mobile Applications. |
MobiSec |
2009 |
DBLP DOI BibTeX RDF |
rich client, transient authentication, theft detection, authentication, smartphone, client-server, mobile security, secure framework |
20 | Muzaffar Bashir, Jürgen Kempf |
Bio-Inspired Reference Level Assigned DTW for Person Identification Using Handwritten Signatures. |
COST 2101/2102 Conference |
2009 |
DBLP DOI BibTeX RDF |
online signature authentication, biometric person authentication, signature normalization, dynamic time warping |
20 | Muhammad Sher, Thomas Magedanz |
Secure access to IP multimedia services using generic bootstrapping architecture (GBA) for 3G & beyond mobile networks. |
Q2SWinet |
2006 |
DBLP DOI BibTeX RDF |
IP multimedia system, authentication proxy, generic authentication architecture, generic bootstrapping architecture, transport layer security, security and privacy |
20 | Michael A. Schneider, Edward W. Felten |
Efficient Commerce Protocols based on One-Time Pads. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
credit transactions, commerce protocol, face-to-face credit card authorizations, transaction outcome agreement, OTPMAC function, one-time identifier, cryptographic pseudo-random number generators, cryptographic MAC functions, security, cryptography, protocols, anonymity, transaction processing, codes, random number generation, business data processing, authorisation, message authentication, message authentication code, one-time pad |
20 | Xunhua Wang, Yih Huang, Yvo Desmedt, David Rine |
Enabling Secure On-Line DNS Dynamic Update. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
secure online DNS dynamic update, Internet Engineering Task Force, DNS Security Extension, zone security key, role separation principle, signature computation time, Internet, authentication, cryptography, distributed databases, RSA, transport protocols, experimental results, message authentication, threshold cryptography, telecommunication security, MD5, Domain Name System, IP addresses, performance penalty, DNSSEC |
20 | Christian Labonté, Sampalli Srinivas |
Group Management Strategies for Secure Multicasting on Active Virtual Private Networks. |
LCN |
2000 |
DBLP DOI BibTeX RDF |
multicast group management, active virtual private networks, message integrity, message privacy, Secure Active VPN Environment, SAVE project, Dalhousie University, authentication, cryptography, cryptography, multicasting, transport protocols, network architecture, multicast communication, message authentication, IP multicast, telecommunication networks, telecommunication security, secure multicasting, business communication, telecommunication network management |
20 | Antonio Fernandez Gómez-Skarmeta, Angel L. Mateo-Martinez, Pedro M. Ruiz-Martinez |
IGMPv3-Based Method for Avoiding DoS Attacks in Multicast-Enabled Networks. |
LCN |
2000 |
DBLP DOI BibTeX RDF |
DoS attack avoidance, IGMPv3-based method, IP multicast-enabled networks, security protection, Internet, authentication, transport protocols, multimedia communication, multimedia communications, video conferencing, teleconferencing, multicast communication, message authentication, telecommunication security, billing, Internet service providers, audio conferencing |
20 | Arun Iyengar, Daniel M. Dias |
Distributed Virtual Malls on the World Wide Web. |
ICDCS |
1998 |
DBLP DOI BibTeX RDF |
virtual mall, distributed authentication, state preservation, virtual shopping, authentication, electronic commerce |
20 | Sarvar Patel |
Number Theoretic Attacks on Secure Password Schemes. |
S&P |
1997 |
DBLP DOI BibTeX RDF |
number theoretic attacks, secure password schemes, Encrypted Key Exchange, EKE, authenticated information exchange, insecure network, secret key cryptography, randomized confounders, RSA version, half encrypted versions, Direct Authentication Protocol, Secret Public Key Protocol versions, secure protocols, message authentication, dictionary attacks, active attacks, password guessing attacks |
20 | Wenbo Mao |
An augmentation of BAN-like logics. |
CSFW |
1995 |
DBLP DOI BibTeX RDF |
BAN-like logics augmentation, protocol idealization, rule-based technique, protocol syntax, protocols, formal logic, message authentication, authentication protocols, symbolic manipulation |
19 | Tomi Kinnunen, Filip Sedlak, Roman Bednarik |
Towards task-independent person authentication using eye movement signals. |
ETRA |
2010 |
DBLP DOI BibTeX RDF |
task independence, eye tracking, biometrics |
19 | Manik Lal Das |
Two-factor user authentication in wireless sensor networks. |
IEEE Trans. Wirel. Commun. |
2009 |
DBLP DOI BibTeX RDF |
|
19 | Lei Zhang 0064, Susanna Spinsante, Chaojing Tang, Ennio Gambi |
Application and performance analysis of various AEAD techniques for space telecommand authentication. |
IEEE Trans. Wirel. Commun. |
2009 |
DBLP DOI BibTeX RDF |
|
19 | Geraldine Kwang, Roland H. C. Yap, Terence Sim, Rajiv Ramnath |
An Usability Study of Continuous Biometrics Authentication. |
ICB |
2009 |
DBLP DOI BibTeX RDF |
|
19 | Sebastian Gajek, Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy |
TruWallet: trustworthy and migratable wallet-based web authentication. |
STC |
2009 |
DBLP DOI BibTeX RDF |
password wallet, secure migration, trusted computing, phishing, identity theft |
19 | Huixian Li, Liaojun Pang |
A Novel Biometric-Based Authentication Scheme with Privacy Protection. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
19 | Yung-Cheng Lee, Wen-Chung Kuo, Yi-Chih Hsieh, Ta-Cheng Chen |
Security Enhancement of the Authentication Protocol for RFID Systems. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
19 | Kuo-Hui Yeh, Nai-Wei Lo |
Improvement of an EPC Gen2 Compliant RFID Authentication Protocol. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
19 | Yike Yu, Xuefeng Zheng, Mingde Zhang, Qingguo Zhang |
An Identity-Based Authentication Model for Mobile Agent. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
19 | Stuart E. Schechter, Serge Egelman, Robert W. Reeder |
It's not what you know, but who you know: a social approach to last-resort authentication. |
CHI |
2009 |
DBLP DOI BibTeX RDF |
security, privacy, usability testing and evaluation |
19 | Binod Vaidya, Jong Hyuk Park, Joel J. P. C. Rodrigues |
HOTP-Based User Authentication Scheme in Home Networks. |
ISA |
2009 |
DBLP DOI BibTeX RDF |
|
19 | Stanislaw Jarecki, Xiaomin Liu |
Private Mutual Authentication and Conditional Oblivious Transfer. |
CRYPTO |
2009 |
DBLP DOI BibTeX RDF |
|
19 | Chiu C. Tan 0001, Bo Sheng, Qun Li 0001 |
Secure and Serverless RFID Authentication and Search Protocols. |
IEEE Trans. Wirel. Commun. |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Caimu Tang, Dapeng Oliver Wu |
An Efficient Mobile Authentication Scheme for Wireless Networks. |
IEEE Trans. Wirel. Commun. |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Li Lu 0001, Jinsong Han, Yunhao Liu 0001, Lei Hu, Jinpeng Huai, Lionel M. Ni, Jian Ma |
Pseudo Trust: Zero-Knowledge Authentication in Anonymous P2Ps. |
IEEE Trans. Parallel Distributed Syst. |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Reihaneh Safavi-Naini, Peter R. Wild |
Information Theoretic Bounds on Authentication Systems in Query Model. |
IEEE Trans. Inf. Theory |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Srdjan Capkun, Mario Cagalj, Ram Kumar Rengaswamy, Ilias Tsigkogiannis, Jean-Pierre Hubaux, Mani B. Srivastava |
Integrity Codes: Message Integrity Protection and Authentication over Insecure Channels. |
IEEE Trans. Dependable Secur. Comput. |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Kotaro Sonoda, Osamu Takizawa |
User Authentication Scheme Using Individual Auditory Pop-Out. |
New Directions in Intelligent Interactive Multimedia |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Hung-Min Sun, King-Hang Wang |
Defending Secret-Key Based Authentication Protocols against the Stolen-Secret Attack. |
ISECS |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Tong-Lee Lim, Tieyan Li |
Exposing an effective denial of information attack from the misuse of EPCglobal standards in an RFID authentication scheme. |
PIMRC |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Takamichi Saito, Kiyomi Sekiguchi, Ryosuke Hatsugai |
Authentication Binding between TLS and HTTP. |
NBiS |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Mike Burmester, Breno de Medeiros, Rossana Motta |
Robust, anonymous RFID authentication with constant key-lookup. |
AsiaCCS |
2008 |
DBLP DOI BibTeX RDF |
provably secure protocols, privacy, scalability, RFID, availability, unlinkability |
19 | Yun-kyung Lee, Deok-Gyu Lee, Jong Wook Han, Jeong-Nyeo Kim |
The home device authentication system construction for pervasive home network. |
MobiQuitous |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Haojin Zhu, Xiaodong Lin 0001, Rongxing Lu, Pin-Han Ho, Xuemin Shen |
AEMA: An Aggregated Emergency Message Authentication Scheme for Enhancing the Security of Vehicular Ad Hoc Networks. |
ICC |
2008 |
DBLP DOI BibTeX RDF |
|
|
|