The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for authentication with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1973-1981 (18) 1982-1984 (22) 1985-1986 (22) 1987 (21) 1988 (25) 1989 (33) 1990 (36) 1991 (31) 1992 (40) 1993 (50) 1994 (65) 1995 (55) 1996 (112) 1997 (145) 1998 (98) 1999 (167) 2000 (208) 2001 (294) 2002 (330) 2003 (618) 2004 (905) 2005 (1106) 2006 (1033) 2007 (1140) 2008 (1183) 2009 (1031) 2010 (805) 2011 (788) 2012 (820) 2013 (879) 2014 (955) 2015 (1035) 2016 (1133) 2017 (1173) 2018 (1332) 2019 (1500) 2020 (1379) 2021 (1410) 2022 (1499) 2023 (1523) 2024 (379)
Publication types (Num. hits)
article(10875) book(17) data(3) incollection(161) inproceedings(14078) phdthesis(247) proceedings(17)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 8079 occurrences of 2235 keywords

Results
Found 25398 publication records. Showing 25398 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
19Tatsuya Mori, Hideki Tode, Koso Murakami Integrated Method for Loss-Resilient Multicast Source Authentication and Data Reconstruction. Search on Bibsonomy ICC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Jiankun Hu, Don Gingrich, Andy Sentosa A k-Nearest Neighbor Approach for User Authentication through Biometric Keystroke Dynamics. Search on Bibsonomy ICC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Jian Wang, Haihang Wang, Chengxiang Tan Cryptanalysis and Improvement of an 'Efficient Remote Mutual Authentication and Key Agreement'. Search on Bibsonomy APSCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Ghaith Hammouri, Berk Sunar PUF-HB: A Tamper-Resilient HB Based Authentication Protocol. Search on Bibsonomy ACNS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF HB+, tamper resilience, provable security, PUF
19Guojun Peng, Xuanchen Pan, Huanguo Zhang, Jianming Fu Dynamic Trustiness Authentication Framework Based on Software's Behavior Integrity. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Adrian Kapczynski, Marcin Sobota Distributed Authentication Systems Enhanced by Quantum Protocols. Search on Bibsonomy ITNG The full citation details ... 2008 DBLP  DOI  BibTeX  RDF quantum protocols, BB84, B92, biometric
19Rosa R. Heckle, Wayne G. Lutters, David Gurzick Network authentication using single sign-on: the challenge of aligning mental models. Search on Bibsonomy CHIMIT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security, human factors, management, mental models, SSO
19Chandragupta Borkotoky, Swapil Galgate, S. B. Nimbekar Human computer interaction: harnessing P300 potential brain waves for authentication of individuals. Search on Bibsonomy Bangalore Compute Conf. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Carmen Alonso-Montes, Marcos Ortega, Manuel G. Penedo, David López Vilariño Pixel parallel vessel tree extraction for a personal authentication system. Search on Bibsonomy ISCAS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Miao Qi, Yinghua Lu, Jinsong Li, Xiaolu Li, Jun Kong User-Specific Iris Authentication Based on Feature Selection. Search on Bibsonomy CSSE (1) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Qiang Zhang, Xiaowei Wang, Zhenghu Gong A Role-Based Automated Trust Negotiation and Authentication Design in Mobile Ad Hoc Networks. Search on Bibsonomy CSSE (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Jongpil Jeong, Min Young Chung, Hyunseung Choo Integrated OTP-Based User Authentication Scheme Using Smart Cards in Home Networks. Search on Bibsonomy HICSS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Baptiste Hemery, Julien Mahier, Marc Pasquet, Christophe Rosenberger Face Authentication for Banking. Search on Bibsonomy ACHI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security, face recognition, biometrics, banking, commerce
19Jiawei Huang 0007, John C. Lach IC Activation and User Authentication for Security-Sensitive Systems. Search on Bibsonomy HOST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Wei Liu, Lin Yang, Quan-Lin Li, Dai Hao, Bin Hou Performance Analytic Model for Authentication Mechanism. Search on Bibsonomy ICNSC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Shinsaku Kiyomoto, Toshiaki Tanaka Anonymous attribute authentication scheme using self-blindable certificates. Search on Bibsonomy ISI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Feng Cheng 0002, Christoph Meinel Strong Authentication over Lock-Keeper. Search on Bibsonomy SOFSEM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Xunhua Wang, Philip D. Huff, Brett C. Tjaden Improving the Efficiency of Capture-Resistant Biometric Authentication Based on Set Intersection. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Najwa Aaraj, Srivaths Ravi 0001, Anand Raghunathan, Niraj K. Jha Hybrid Architectures for Efficient and Secure Face Authentication in Embedded Systems. Search on Bibsonomy IEEE Trans. Very Large Scale Integr. Syst. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Miao Yu, Hongjie He, Jiashu Zhang A digital authentication watermarking scheme for JPEG images with superior localization and security. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF localization accuracy, collage attack, fragile watermarking, JPEG compression
19Cunsheng Ding, Tor Helleseth, Torleiv Kløve, X. Wang A Generic Construction of Cartesian Authentication Codes. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Bo Shen 0003, Ton Kalker Re-quantization Based Semi-Fragile Authentication for General Uniform Quantizer. Search on Bibsonomy ICIP (6) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Sylvain Hocquet, Jean-Yves Ramel, Hubert Cardot User Classification for Keystroke Dynamics Authentication. Search on Bibsonomy ICB The full citation details ... 2007 DBLP  DOI  BibTeX  RDF clustering, keystroke dynamics, parameters adaptation
19Arathi Arakala, Jason Jeffers, Kathy J. Horadam Fuzzy Extractors for Minutiae-Based Fingerprint Authentication. Search on Bibsonomy ICB The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19M. M. Chowdhury An Authentication Scheme Using Non-Commutative Semigroups. Search on Bibsonomy IAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Moti Yung On the Evolution of User Authentication: Non-bilateral Factors. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Hyung-Woo Lee Secure Authentication and Accounting Mechanism on WLAN with Interaction of Mobile Message Service. Search on Bibsonomy HCI (6) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Antonia Azzini, Stefania Marrara Toward Trust-based Multi-modal User Authentication on the Web: A Fuzzy Approach. Search on Bibsonomy FUZZ-IEEE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Riddhiman Ghosh, Mohamed Dekhil BlueCard: Mobile Device-Based Authentication and Profile Exchange. Search on Bibsonomy SCSS (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Ji Ma 0001, Mehmet A. Orgun Specifying Agent Beliefs for Authentication Systems. Search on Bibsonomy ECUMN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Kui Ren 0001, Wenjing Lou, Yanchao Zhang Multi-user Broadcast Authentication in Wireless Sensor Networks. Search on Bibsonomy SECON The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Yuh-Min Tseng, Tsu-Yang Wu, Jui-Di Wu A mutual authentication and key exchange scheme from bilinear pairings for low power computing devices. Search on Bibsonomy COMPSAC (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Roman V. Yampolskiy Secure Network Authentication with PassText. Search on Bibsonomy ITNG The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Li Lu 0001, Jinsong Han, Lei Hu, Jinpeng Huai, Yunhao Liu 0001, Lionel M. Ni Pseudo Trust: Zero-Knowledge Based Authentication in Anonymous Peer-to-Peer Protocols. Search on Bibsonomy IPDPS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Rene Mayrhofer Towards an Open Source Toolkit for Ubiquitous Device Authentication. Search on Bibsonomy PerCom Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Li Lu 0001, Jinsong Han, Lei Hu, Yunhao Liu 0001, Lionel M. Ni Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems. Search on Bibsonomy PerCom The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Chiu C. Tan 0001, Bo Sheng, Qun Li 0001 Severless Search and Authentication Protocols for RFID. Search on Bibsonomy PerCom The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19MyungSoo Bae, Anshuman Razdan, Gerald E. Farin Automated 3D Face authentication & recognition. Search on Bibsonomy AVSS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Keiichi Hirota, Noboru Sonehara Simple and Secure Authentication Escrow for Rights Trading Protocol. Search on Bibsonomy SAINT Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Yun-kyung Lee, Deok-Gyu Lee, Jong Wook Han Home Device Authentication Method Based on PKI. Search on Bibsonomy FGCN (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Jin-Oh Jeon, Su-Bong Ryu, Tae-Min Chang, Ho-Yong Choi, Min-Sup Kang Digital Codec Design for RFID Tag Based on Cryptographic Authentication Protocol. Search on Bibsonomy FGCN (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19B. Sathish Babu, Pallapa Venkataram An Authentication Scheme for Personalized Mobile Multimedia Services: A Cognitive Agents Based Approach. Search on Bibsonomy FGCN (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Anders Moen Hagalisletto Validating Attacks on Authentication Protocols. Search on Bibsonomy ISCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Silke Holtmanns, Son Phan-Anh Access Authentication to IMS Systems in Next Generation Networks. Search on Bibsonomy ICN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Rene Mayrhofer, Hans Gellersen Shake Well Before Use: Authentication Based on Accelerometer Data. Search on Bibsonomy Pervasive The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Walter Geisselhardt, Taswar Iqbal High-Capacity Invisible Background Encoding for Digital Authentication of Hardcopy Documents. Search on Bibsonomy IWDW The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Smart IDs, data tampering, entertainment tickets protection, printing scanning, 2-D Bar codes, HD-DataStripe, data encoding in background images, biometrics, watermarking, copy detection, counterfeiting, halftone images
19Robert H. Deng, Yanjiang Yang Achieving End-to-End Authentication in Intermediary-Enabled Multimedia Delivery Systems. Search on Bibsonomy ISPEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Song Han 0004, Vidyasagar M. Potdar, Elizabeth Chang 0001 Mutual Authentication Protocol for RFID Tags Based on Synchronized Secret Information with Monitor. Search on Bibsonomy ICCSA (3) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Ilsun You A Ticket Based Binding Update Authentication Method for Trusted Nodes in Mobile IPv6 Domain. Search on Bibsonomy EUC Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Sun-Hee Lim, Okyeon Yi, Chang-Hoon Jung, Ki-Seok Bang A Fast and Efficient Authentication Protocol for a Seamless Handover between a WLAN and WiBro. Search on Bibsonomy COMSWARE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Rajadurai Rajavelsamy, Venkateswar Jeedigunta, Osok Song A Novel Method for Authentication Optimization during Handover in Heterogeneous Wireless Networks. Search on Bibsonomy COMSWARE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Shrijit S. Joshi, Vir V. Phoha Competition between SOM Clusters to Model User Authentication System in Computer Networks. Search on Bibsonomy COMSWARE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Li Chen, Haojun Zhang, Nan Liu Authentication and Micropayment Protocols based on Self-Updating Hash Chains. Search on Bibsonomy GCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Deok-Gyu Lee, Jong Wook Han, Jong Hyuk Park User Authentication for Multi Domain in Home Network Environments. Search on Bibsonomy MUE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Ki-Woong Park, Hyunchul Seok, Kyu Ho Park pKASSO: Towards Seamless Authentication Providing Non-Repudiation on Resource-Constrained Devices. Search on Bibsonomy AINA Workshops (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Mingqiu Song, Xiangpei Hu, Jiahua Li, Guishi Deng An Authentication Model Involving Trusted Third Party for M-Commerce. Search on Bibsonomy ICMB The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Xiangqian Wu 0002, David Zhang 0001, Kuanquan Wang, Ning Qi Fusion of Palmprint and Iris for Personal Authentication. Search on Bibsonomy ADMA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Jie Tian 0001, Liang Li, Xin Yang 0001 Fingerprint-Based Identity Authentication and Digital Media Protection in Network Environment. Search on Bibsonomy J. Comput. Sci. Technol. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF techniques and algorithms, biometrics, information security, cryptosystem, fingerprint recognition
19Charles G. Boncelet Jr. The NTMAC for authentication of noisy messages. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Hongmei Liu 0001, Ling Zhu, Jiwu Huang A Hybrid Watermarking Scheme for Video Authentication. Search on Bibsonomy ICIP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Huajian Liu, Martin Steinebach Digital Watermarking for Image Authentication with Localization. Search on Bibsonomy ICIP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Siew Chin Chong, Andrew Teoh Beng Jin, David Ngo Chek Ling Iris Authentication Using Privatized Advanced Correlation Filter. Search on Bibsonomy ICB The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Fengling Han, Jiankun Hu, Xinghuo Yu 0001, Yong Feng 0001, Jie Zhou 0001 A Novel Hybrid Crypto-Biometric Authentication Scheme for ATM Based Banking Applications. Search on Bibsonomy ICB The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Olaf Henniger, Björn Schneider, Bruno Struif, Ulrich Waldmann Improving the Binding of Electronic Signatures to the Signer by Biometric Authentication. Search on Bibsonomy ICB The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Hassnaa Moustafa, Gilles Bourdon, Yvon Gourhant Providing Authentication and Access Control in Vehicular Network Environment. Search on Bibsonomy SEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Hyewon K. Lee, Jaeyoung Choi Multistage Authentication Scheme for Mobile Ad-Hoc Network Using Clustering Mechanism. Search on Bibsonomy HPCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Edith C. H. Ngai, Michael R. Lyu An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation. Search on Bibsonomy SUTC (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Hae Young Lee, Tae Ho Cho Fuzzy-Based Adaptive Threshold Determining Method for the Interleaved Authentication in Sensor Networks. Search on Bibsonomy MICAI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Goichiro Hanaoka, Yumiko Hanaoka, Manabu Hagiwara, Hajime Watanabe, Hideki Imai Unconditionally Secure Chaffing-and-Winnowing: A Relationship Between Encryption and Authentication. Search on Bibsonomy AAECC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Batbold Toiruul, KyungOh Lee, HyunJun Lee, YoungHan Lee, Yoon Young Park Mutual-Authentication Mechanism for RFID Systems. Search on Bibsonomy MSN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF RFID, AES, cryptograph
19Mirang Park, Naonobu Okazaki, Yoshimasa Baba A New User Authentication Protocol for Mobile Terminals in Wireless Network. Search on Bibsonomy MDM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Feng Zhu 0010, Matt W. Mutka, Lionel M. Ni The Master Key: A Private Authentication Approach for Pervasive Computing Environments. Search on Bibsonomy PerCom The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Hideyuki Takamizawa, Kenji Kaijiri Reliable Authentication Method by Using Cellular Phones in WBT. Search on Bibsonomy ICN/ICONS/MCL The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Ghazanfar Ali Safdar, Clare McGrath, Máire McLoone Limitations of existing wireless networks authentication and key management techniques for MANETs. Search on Bibsonomy ISCN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Zhenchuan Chai, Zhenfu Cao, Rongxing Lu Remote Authentication with Forward Security. Search on Bibsonomy ATC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Yanqin Zhu, Peide Qian, Yueqin Liu A Role-based PMI Authentication Model and its Application. Search on Bibsonomy SNPD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Levente Buttyán, Tamás Holczer, István Vajda Optimal Key-Trees for Tree-Based Private Authentication. Search on Bibsonomy Privacy Enhancing Technologies The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Yuen-Yan Chan, Jin Li 0002 BGN Authentication and Its Extension to Convey Message Commitments. Search on Bibsonomy ICCSA (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Deok-Gyu Lee, Seo-Il Kang, Dae-Hee Seo, Im-Yeong Lee Authentication for Single/Multi Domain in Ubiquitous Computing Using Attribute Certification. Search on Bibsonomy ICCSA (4) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Youngkwon Lee, Taekyoung Kwon 0002 An Improved Fingerprint-Based Remote User Authentication Scheme Using Smart Cards. Search on Bibsonomy ICCSA (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Mi-Og Park, Dea-Woo Park SUALPPA Scheme: Enhanced Solution for User Authentication in the GSM System. Search on Bibsonomy ICCSA (4) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Sung-Won Moon, Young-Gab Kim, Chang-Joo Moon, Doo-Kwon Baik Password-Based User Authentication Protocol for Mobile Environment. Search on Bibsonomy ICOIN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Sylvain Pasini, Serge Vaudenay An Optimal Non-interactive Message Authentication Protocol. Search on Bibsonomy CT-RSA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Mario Cagalj, Jean-Pierre Hubaux, Srdjan Capkun, Ram Kumar Rengaswamy, Ilias Tsigkogiannis, Mani B. Srivastava Integrity (I) Codes: Message Integrity Protection and Authentication Over Insecure Channels. Search on Bibsonomy S&P The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Daphna Weinshall Cognitive Authentication Schemes Safe Against Spyware (Short Paper). Search on Bibsonomy S&P The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Huajian Liu, Martin Steinebach Semi-Fragile Watermarking for Image Authentication with High Tampering Localization Capability. Search on Bibsonomy AXMEDIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Candido Rodriguez, Ajay Daryanani, Diego R. López, Jose M. Macias AA-RR: working with authentication and authorization infrastructures. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF privacy, software testing, identification, computer network security
19Jawad Drissi, Qijun Gu Localized Broadcast Authentication in Large Sensor Networks. Search on Bibsonomy ICNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Jin Wang, Jia Yu 0005, Daxing Li, Xi Bai 0002, Zhongtian Jia Combining User Authentication with Role-Based Authorazition Based on Identity-Based Signature. Search on Bibsonomy CIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Inshil Doh, Kijoon Chae Key Establishment and Authentication Mechanism for Secure Sensor Networks. Search on Bibsonomy APWeb Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Atsushi Harada, Takeo Isarida, Tadanori Mizuno, Masakatsu Nishigaki A User Authentication System Using Schema of Visual Memory. Search on Bibsonomy BioADIT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Muxiang Zhang, Yuguang Fang Security analysis and enhancements of 3GPP authentication and key agreement protocol. Search on Bibsonomy IEEE Trans. Wirel. Commun. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
19Patrick Schaumont, David Hwang 0001, Ingrid Verbauwhede Platform-based design for an embedded-fingerprint-authentication device. Search on Bibsonomy IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
19Filareti Tsalakanidou, Sotiris Malassiotis, Michael G. Strintzis Face localization and authentication using color and depth images. Search on Bibsonomy IEEE Trans. Image Process. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
19Sergio Vicente Denser Pamboukian, Hae Yong Kim, Ricardo L. de Queiroz Watermarking JBIG2 text region for image authentication. Search on Bibsonomy ICIP (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
19Joon Heo, Choong Seon Hong An Identity Authentication Protocol for Acknowledgment in IEEE 802.15.4 Network. Search on Bibsonomy NPC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
19Jesus Luna, Manel Medina, Oscar Manso Towards a Unified Authentication and Authorization Infrastructure for Grid Services: Implementing an Enhanced OCSP Service Provider into GT4. Search on Bibsonomy EuroPKI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
19M. Wirotius, Jean-Yves Ramel, Nicole Vincent Distance and Matching for Authentication by On-Line Signature. Search on Bibsonomy AutoID The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
19Jun-Cheol Jeon, Kee-Won Kim, Kee-Young Yoo Non-group Cellular Automata Based One Time Password Authentication Scheme in Wireless Networks. Search on Bibsonomy MADNES The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
19Jeonil Kang, DaeHun Nyang RFID Authentication Protocol with Strong Resistance Against Traceability and Denial of Service Attacks. Search on Bibsonomy ESAS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
Displaying result #901 - #1000 of 25398 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][19][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license