The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for passwords with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1977-1990 (15) 1991-1995 (18) 1996-1997 (16) 1998-2000 (19) 2001 (17) 2002 (19) 2003 (26) 2004 (44) 2005 (68) 2006 (83) 2007 (67) 2008 (90) 2009 (66) 2010 (26) 2011 (27) 2012 (36) 2013 (41) 2014 (59) 2015 (54) 2016 (37) 2017 (55) 2018 (39) 2019 (41) 2020 (36) 2021 (34) 2022 (26) 2023 (30) 2024 (5)
Publication types (Num. hits)
article(284) book(1) incollection(2) inproceedings(793) phdthesis(12) proceedings(2)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 815 occurrences of 362 keywords

Results
Found 1094 publication records. Showing 1094 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
10Wai Chee Yau, Dinesh Kant Kumar, Tharangini Chinnadurai Lip-Reading Technique Using Spatio-Temporal Templates and Support Vector Machines. Search on Bibsonomy CIARP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF support vector machines, feature selection, motion segmentation, Zernike moments, visual speech recognition
10Tim Dasilva, Kevin Eustice, Peter L. Reiher Johnny Appleseed: wardriving to reduce interference in chaotic wireless deployments. Search on Bibsonomy MSWiM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF chaotic wireless deployments, wardriving, wireless channel assignment
10Kazuki Yoneyama Efficient and Strongly Secure Password-Based Server Aided Key Exchange (Extended Abstract). Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF password-based key exchange, password-based server aided key exchange, leakage of internal states, undetectable on-line dictionary attack
10Jongpil Jeong, Min Young Chung, Hyunseung Choo Integrated OTP-Based User Authentication Scheme Using Smart Cards in Home Networks. Search on Bibsonomy HICSS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Sudhir Aggarwal, Zhenhai Duan, Leo Kermes, Breno de Medeiros E-Crime Investigative Technologies. Search on Bibsonomy HICSS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Yoginder S. Dandass Using FPGAs to Parallelize Dictionary Attacks for Password Cracking. Search on Bibsonomy HICSS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Siddharth Tiwari, Richa Bansal, Divya Bansal Optimized client side solution for cross site scripting. Search on Bibsonomy ICON The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Yu Sasaki, Lei Wang 0031, Kazuo Ohta, Noboru Kunihiro Security of MD5 Challenge and Response: Extension of APOP Password Recovery Attack. Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF APOP, Challenge and Response, Password Recovery, Message Difference, Hash Function, Collision Attack, MD5
10Deholo Nali, Paul C. van Oorschot CROO: A Universal Infrastructure and Protocol to Detect Identity Fraud. Search on Bibsonomy ESORICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Mohamed Chenafa, Dan Istrate, Valeriu Vrabie, Michel Herbin Biometric System Based on Voice Recognition Using Multiclassifiers. Search on Bibsonomy BIOID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Biometric recognition system, Isolated word recognition, GMM/UBM, Data fusion, Speaker identification
10Wen-Gong Shieh, Wen-Bing Horng Efficient and complete remote authentication scheme with smart cards. Search on Bibsonomy ISI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Marcos Faúndez-Zanuy Protecting Face Biometric DCT Templates by Means of Pseudo-random Permutations. Search on Bibsonomy COST 2102 Conference (Prague) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Abbas Cheddad, Joan Condell, Kevin Curran, Paul McKevitt Combating digital document forgery using new secure information hiding algorithm. Search on Bibsonomy ICDIM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Muhammad Sharif 0001, Tariq Faiz, Mudassar Raza Time signatures - an implementation of Keystroke and click patterns for practical and secure authentication. Search on Bibsonomy ICDIM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10William Enck, Kevin R. B. Butler, Thomas Richardson, Patrick D. McDaniel, Adam D. Smith Defending Against Attacks on Main Memory Persistence. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Ragib Hasan, Marianne Winslett, Richard M. Conlan, Brian Slesinsky, Nandakumar Ramani Please Permit Me: Stateless Delegated Authorization in Mashups. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Nathan L. Clarke, Steven Furnell Authenticating mobile phone users using keystroke analysis. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Keystroke analysis, Authentication, Mobile devices, Biometrics, Keystroke dynamics
10Yossef Oren, Adi Shamir Remote Password Extraction from RFID Tags. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2007 DBLP  DOI  BibTeX  RDF sidechannel attacks, RFID, cryptanalysis, power analysis
10Naveen Agarwal, Scott G. Renfro, Arturo Bejar Phishing Forbidden. Search on Bibsonomy ACM Queue The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Xiangqian Wu 0002, David Zhang 0001, Kuanquan Wang A Palmprint Cryptosystem. Search on Bibsonomy ICB The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Rachel R. M. Roberts, Roy A. Maxion, Kevin S. Killourhy, Fahd Arshad User Discrimination through Structured Writing on PDAs. Search on Bibsonomy DSN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Chris Karlof, Umesh Shankar, J. Doug Tygar, David A. Wagner 0001 Dynamic pharming attacks and locked same-origin policies for web browsers. Search on Bibsonomy CCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF same-origin policy, pharming, web authentication
10Benoît Libert, Jean-Jacques Quisquater, Moti Yung Forward-secure signatures in untrusted update environments: efficient and generic constructions. Search on Bibsonomy CCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Mohammad Mannan, Paul C. van Oorschot Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer. Search on Bibsonomy Financial Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Tyler Moore 0001, Richard Clayton 0001 Examining the impact of website take-down on phishing. Search on Bibsonomy eCrime Researchers Summit The full citation details ... 2007 DBLP  DOI  BibTeX  RDF electronic crime, phishing, security economics
10Pierre E. Abi-Char, Abdallah Mhamed, Bachar El-Hassan A Secure Authenticated Key Agreement Protocol Based on Elliptic Curve Cryptography. Search on Bibsonomy IAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Pierre E. Abi-Char, Abdallah Mhamed, Bachar El-Hassan A Secure Authenticated Key Agreement Protocol For Wireless Security. Search on Bibsonomy IAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Weijia Wang, Lei Hu, Yong Li 0002 Provably Secure N-Party Authenticated Key Exchange in the Multicast DPWA Setting. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Password, key distribution, authenticated key exchange, multi-party protocols
10Kazuki Yoneyama, Haruki Ota, Kazuo Ohta Secure Cross-Realm Client-to-Client Password-Based Authenticated Key Exchange Against Undetectable On-Line Dictionary Attacks. Search on Bibsonomy AAECC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF different password, C2C-PAKE, cross-realm setting, undetectable on-line dictionary attacks, Authenticated key exchange
10Atul Prakash 0001 Security in Practice - Security-Usability Chasm. Search on Bibsonomy ICISS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Joe Lim University of Toronto Mississauga: "the one" project. Search on Bibsonomy SIGUCCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF centralizing systems, enhancing student experience, help desk, id
10Mohamad Badra, Samer El-Sawda, Ibrahim Hajjeh Phishing attacks and solutions. Search on Bibsonomy MobiMedia The full citation details ... 2007 DBLP  DOI  BibTeX  RDF RSA, phishing, public key infrastructures, TLS, Diffie-Hellman, SRP
10Roman V. Yampolskiy Secure Network Authentication with PassText. Search on Bibsonomy ITNG The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Gaëtan Leurent Message Freedom in MD4 and MD5 Collisions: Application to APOP. Search on Bibsonomy FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF message modification, meaningful collisions, APOP security, Hash function, MD5, MD4
10Manu Kumar, Tal Garfinkel, Dan Boneh, Terry Winograd Reducing shoulder-surfing by using gaze-based password entry. Search on Bibsonomy SOUPS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF gaze-based password entry, password entry, eye tracking, shoulder surfing
10Katelin Bailey, Linden Vongsathorn, Apu Kapadia, Chris Masone, Sean W. Smith TwoKind authentication: usable authenticators for untrustworthy environments. Search on Bibsonomy SOUPS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Terrance E. Boult, Walter J. Scheirer, Robert Woodworth Revocable Fingerprint Biotokens: Accuracy and Security Analysis. Search on Bibsonomy CVPR The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Terence Sim, Rajkumar Janakiraman Are Digraphs Good for Free-Text Keystroke Dynamics? Search on Bibsonomy CVPR The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Anil K. Jain 0001 Biometric Recognition: Overview and Recent Advances. Search on Bibsonomy CIARP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10SeongHan Shin, Kazukuni Kobara, Hideki Imai A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol. Search on Bibsonomy IWSEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Meihua Wang, Kefeng Fan, Qingqi Pei, Shuguang Wang, Shan Cao A Novel Digital Content Protection System Based on Iris Biometric. Search on Bibsonomy FSKD (4) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Wahyudi Martono, Hasimah Ali, Momoh-Jimoh E. Salami Keystroke Pressure-Based Typing Biometrics Authentication System Using Support Vector Machines. Search on Bibsonomy ICCSA (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF keystroke, maximum pressure, time latency and support vector machine, security, Biometric
10Aslan Askarov, Andrei Sabelfeld Gradual Release: Unifying Declassification, Encryption and Key Release Policies. Search on Bibsonomy S&P The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Saber Zrelli, Yoichi Shinoda Specifying Kerberos over EAP: Towards an integrated network access and Kerberos single sign-on process. Search on Bibsonomy AINA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Jun Liu, Jianxin Liao, Xiaomin Zhu 0002 A Password-Based Authentication and Key Establishment Scheme for Mobile Environment. Search on Bibsonomy AINA Workshops (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Hongfeng Zhu, Tianhua Liu, Jie Liu, Guiran Chang An Efficient Client-to-Client Password-Authenticated Key Exchange Resilient to Server Compromise. Search on Bibsonomy PRDC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Youngsook Lee, Junghyun Nam, Jin Kwak, Dongho Won Password-Only Authenticated Key Exchange Between Two Agents in the Four-Party Setting. Search on Bibsonomy KES-AMSTA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF authentication, agent, Password, key exchange, inter-domain
10B. Chen, V. Chandran Biometric Based Cryptographic Key Generation from Faces. Search on Bibsonomy DICTA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Heesun Park, Stan Redford Client certificate and IP address based multi-factor authentication for J2EE web applications. Search on Bibsonomy CASCON The full citation details ... 2007 DBLP  DOI  BibTeX  RDF IP address checking, J2EE web application, SSL client certificate, certificate based authentication, multi-factor authentication
10Jie Tian 0001, Liang Li, Xin Yang 0001 Fingerprint-Based Identity Authentication and Digital Media Protection in Network Environment. Search on Bibsonomy J. Comput. Sci. Technol. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF techniques and algorithms, biometrics, information security, cryptosystem, fingerprint recognition
10Andrew Teoh Beng Jin, Alwyn Goh, David Ngo Chek Ling Random Multispace Quantization as an Analytic Mechanism for BioHashing of Biometric and Random Identity Inputs. Search on Bibsonomy IEEE Trans. Pattern Anal. Mach. Intell. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF BioHashing, random multispace quantization, face recognition, Cancellable biometrics
10Stéphanie Delaune, Florent Jacquemard Decision Procedures for the Security of Protocols with Probabilistic Encryption against Offline Dictionary Attacks. Search on Bibsonomy J. Autom. Reason. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF verification, formal methods, cryptographic protocols, dictionary attacks, probabilistic encryption
10Massimo Merro, Matthew Hennessy A bisimulation-based semantic theory of Safe Ambients. Search on Bibsonomy ACM Trans. Program. Lang. Syst. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF distributed systems, Mobile agents, bisimulation
10Maria Teresa Carta, Daniele D. Giusto, Cristian Perra, Barbara Podda Exploiting JPEG2000 and Jpip for Image Based Authentication. Search on Bibsonomy ICIP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Haojun Zhang, Yuefei Zhu Self-Updating Hash Chains and Their Implementations. Search on Bibsonomy WISE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Server-Supported Signature, authentication, updating, hash chain
10Xavier Boyen, Hovav Shacham, Emily Shen, Brent Waters Forward-secure signatures with untrusted update. Search on Bibsonomy CCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF untrusted storage, digital signatures, forward security, two-factor authentication
10Michel Abdalla, Emmanuel Bresson, Olivier Chevassut, Bodo Möller, David Pointcheval Provably secure password-based authentication in TLS. Search on Bibsonomy AsiaCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF encrypted key exchange, password authentication, TLS
10John G. Brainard, Ari Juels, Ronald L. Rivest, Michael Szydlo, Moti Yung Fourth-factor authentication: somebody you know. Search on Bibsonomy CCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF hardware tokens, vouchers, authentication
10Dasari Shailaja, Phalguni Gupta A Simple Geometric Approach for Ear Recognition. Search on Bibsonomy ICIT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Weidong Shi, Joshua B. Fryman, Guofei Gu, Hsien-Hsin S. Lee, Youtao Zhang, Jun Yang 0002 InfoShield: a security architecture for protecting information usage in memory. Search on Bibsonomy HPCA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Carlos Villarrubia, Eduardo Fernández-Medina, Mario Piattini Quality of Password Management Policy. Search on Bibsonomy ARES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Maurizio Adriano Strangio An Optimal Round Two-Party Password-Authenticated Key Agreement Protocol. Search on Bibsonomy ARES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Sylvia B. Encheva, Sharil Tumin Safe Use of Protected Web Resources. Search on Bibsonomy Intelligent Information Processing The full citation details ... 2006 DBLP  DOI  BibTeX  RDF E-services
10Nalini K. Ratha, Jonathan H. Connell, Ruud M. Bolle, Sharat Chikkerur Cancelable Biometrics: A Case Study in Fingerprints. Search on Bibsonomy ICPR (4) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Erhan J. Kartaltepe, Shouhuai Xu Towards Blocking Outgoing Malicious Impostor Emails. Search on Bibsonomy WOWMOM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Alisher Kholmatov, Berrin A. Yanikoglu Biometric Cryptosystem Using Online Signatures. Search on Bibsonomy ISCIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Nele Mentens, Lejla Batina, Bart Preneel, Ingrid Verbauwhede Time-Memory Trade-Off Attack on FPGA Platforms: UNIX Password Cracking. Search on Bibsonomy ARC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF exhaustive key search, cryptanalysis, hash-functions, FPGA implementation, time-memory trade-off, rainbow table
10Elena Vildjiounaite, Satu-Marja Mäkelä, Mikko Lindholm, Reima Riihimäki, Vesa Kyllönen, Jani Mäntyjärvi, Heikki Ailisto Unobtrusive Multimodal Biometrics for Ensuring Privacy and Information Security with Personal Devices. Search on Bibsonomy Pervasive The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Jin Wook Byun, Hyun Suk Rhee, Hyun-A Park, Dong Hoon Lee 0001 Off-Line Keyword Guessing Attacks on Recent Keyword Search Schemes over Encrypted Data. Search on Bibsonomy Secure Data Management The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Michel Abdalla, Emmanuel Bresson, Olivier Chevassut, David Pointcheval Password-Based Group Key Exchange in a Constant Number of Rounds. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Group Key Exchange, Password-based Authentication
10Yin Yin, Bao Li 0001 Secure Cross-Realm C2C-PAKE Protocol. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Vijayakrishnan Pasupathinathan, Josef Pieprzyk, Huaxiong Wang, Joo Yeon Cho Formal analysis of card-based payment systems in mobile devices. Search on Bibsonomy ACSW The full citation details ... 2006 DBLP  BibTeX  RDF card-based systems, formal verification, mobile payment, electronic payments
10Ka-Ping Yee, Kragen Sitaker Passpet: convenient password management and phishing protection. Search on Bibsonomy SOUPS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Leif Nixon The Stakkato Intrusions: What Happened and What Have We Learned?. Search on Bibsonomy CCGRID The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10John P. Watt, Oluwafemi O. Ajayi, Jipu Jiang, Jos Koetsier, Richard O. Sinnott A Shibboleth-Protected Privilege Management Infrastructure for e-Science Education. Search on Bibsonomy CCGRID The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Byungkwan Park, Daesung Moon, Yongwha Chung, Jin-Won Park Impact of Embedding Scenarios on the Smart Card-Based Fingerprint Verification. Search on Bibsonomy WISA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Performance Evaluation, Smart Card, Fingerprint Verification
10Jongho Ryu EAP Using the Split Password-Based Authenticated Key Agreement. Search on Bibsonomy WISA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Taekyoung Kwon 0002, Dong Hoon Lee 0002 Three-Party Password Authenticated Key Agreement Resistant to Server Compromise. Search on Bibsonomy WISA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciarini, Elisa Bertino Privacy preserving multi-factor authentication with biometrics. Search on Bibsonomy Digital Identity Management The full citation details ... 2006 DBLP  DOI  BibTeX  RDF identity theft prevention, privacy, authentication, biometrics
10Mauricio Orozco Trujillo, Yednek Asfaw, Shervin Shirmohammadi, Andy Adler, Abdulmotaleb El-Saddik Haptic-Based Biometrics: A Feasibility Study. Search on Bibsonomy HAPTICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Haptic Authentication, Continuous Authentication, Biometrics
10Vasile Gaburici, Peter J. Keleher, Bobby Bhattacharjee File System Support for Collaboration in theWide Area. Search on Bibsonomy ICDCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Supriya Singh, Anuja Cabraal, Gabriele Hermansson What is your husband's name?: sociological dimensions of internet banking authentication. Search on Bibsonomy OZCHI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF sociological dimensions, authentication, qualitative research, Australia, Internet banking, security design
10Ann Nosseir, Richard Connor 0001, Karen Renaud Question-based group authentication. Search on Bibsonomy OZCHI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF security, human factors, computers and society, web-based services, social and behavioral sciences
10Robert Paquet, Abbas Z. Kouzani Advances in 3D-Based Face Recognition. Search on Bibsonomy IJCNN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Craig Gentry, Philip D. MacKenzie, Zulfikar Ramzan A Method for Making Password-Based Key Exchange Resilient to Server Compromise. Search on Bibsonomy CRYPTO The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Shuhua Wu, Yuefei Zhu Practical Password-Based Authenticated Key Exchange Protocol. Search on Bibsonomy CIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Jin Wook Byun, Dong Hoon Lee 0001, Jongin Lim 0001 Efficient and Provably Secure Client-to-Client Password-Based Key Exchange Protocol. Search on Bibsonomy APWeb The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Human memorable password, different password authentication, mobile computing, dictionary attacks, authenticated key exchange
10Ravi Chandra Jammalamadaka, Timothy W. van der Horst, Sharad Mehrotra, Kent E. Seamons, Nalini Venkatasubramanian Delegate: A Proxy Based Architecture for Secure Website Access from an Untrusted Machine. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Jun-Cheol Jeon, Kee-Young Yoo Authentication Based on Singular Cellular Automata. Search on Bibsonomy ACRI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Singular Operation, Authentication, Cellular Automata, Hash function, One-Time Password
10Errol A. Blake The management of access controls/biometrics in organizations. Search on Bibsonomy InfoSecCD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF IT spending, access control policy (ACP), cyber risk insurance, information technology (IT) information security (InfoSec), system specific policy (SSP), authentication, trust, policy, risk management, systems, return on investment (ROI)
10Jakob E. Bardram The trouble with login: on usability and computer security in ubiquitous computing. Search on Bibsonomy Pers. Ubiquitous Comput. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Electronic patient record (EPR), Ubiquitous computing, Computer-supported cooperative work (CSCW), Healthcare, User authentication, Hospitals, Activity-based computing (ABC), Login
10Sara Sinclair, Sean W. Smith The TIPPI Point: Toward Trustworthy Interfaces. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF TIPPI, authentication methods, phishing
10Kuo-Feng Hwang, I-En Liao Two attacks on a user friendly remote authentication scheme with smart cards. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF cryptanalysis, smart card, remote authentication
10Vance Bjorn Biometrics hit the mainstream: an analysis of security and privacy implications. Search on Bibsonomy CCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Tobias Straub, Thilo-Alexander Ginkel, Johannes Buchmann 0001 A Multipurpose Delegation Proxy for WWW Credentials. Search on Bibsonomy EuroPKI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Credential Delegation, WWW Authentication, Usability, X.509 Certificate, Man-In-The-Middle
10Alex Biryukov, Sourav Mukhopadhyay, Palash Sarkar 0001 Improved Time-Memory Trade-Offs with Multiple Data. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF time/memory/data trade-off, key sizes, block-cipher
10Jun-Cheol Jeon, Kee-Won Kim, Kee-Young Yoo Non-group Cellular Automata Based One Time Password Authentication Scheme in Wireless Networks. Search on Bibsonomy MADNES The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Xia Brustoloni, José Carlos Brustoloni Hardening Web browsers against man-in-the-middle and eavesdropping attacks. Search on Bibsonomy WWW The full citation details ... 2005 DBLP  DOI  BibTeX  RDF eavesdropping attack, just-in-time instruction, safe staging, well-in-advance instruction, certificate, HTTPS, password, Web browser, SSL, man-in-the-middle attack
10Minh-Huyen Nguyen The Relationship Between Password-Authenticated Key Exchange and Other Cryptographic Primitives. Search on Bibsonomy TCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Mauro Brunato, Danilo Severina WilmaGate: a new open access gateway for hotspot management. Search on Bibsonomy WMASH The full citation details ... 2005 DBLP  DOI  BibTeX  RDF access gateways, open access networks, wireless networks, authentication, authorization
Displaying result #901 - #1000 of 1094 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license