|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 8079 occurrences of 2235 keywords
|
|
|
Results
Found 25398 publication records. Showing 25398 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
81 | Stuart E. Schechter, Robert W. Reeder |
1 + 1 = you: measuring the comprehensibility of metaphors for configuring backup authentication. |
SOUPS |
2009 |
DBLP DOI BibTeX RDF |
backup authentication, password reset, authentication |
77 | Jae-Woo Lee |
Security Agent Model Using Interactive Authentication Database. |
AIS |
2004 |
DBLP DOI BibTeX RDF |
|
71 | Jae-Woo Lee |
Client Authentication Model Using Duplicated Authentication Server Systems. |
AIS |
2004 |
DBLP DOI BibTeX RDF |
|
68 | Goce Jakimoski |
Unconditionally Secure Information Authentication in Presence of Erasures. |
IMACC |
2005 |
DBLP DOI BibTeX RDF |
erasure- resilient codes, erasure-tolerant authentication, message authentication, authentication codes |
64 | David Q. Liu, Mark Coslow |
Extensible authentication protocols for IEEE standards 802.11 and 802.16. |
Mobility Conference |
2008 |
DBLP DOI BibTeX RDF |
extensible authentication protocol, wireless, IEEE 802.11, EAP |
64 | Guojun Wang 0001, Qiong Wang, Jiannong Cao 0001, Minyi Guo |
An Effective Trust Establishment Scheme for Authentication in Mobile Ad Hoc Networks. |
CIT |
2007 |
DBLP DOI BibTeX RDF |
Trust Transfer, Mobile Ad-Hoc Networks, Authentication, Cryptography, Secret Sharing |
64 | Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciarini, Elisa Bertino |
Privacy preserving multi-factor authentication with biometrics. |
Digital Identity Management |
2006 |
DBLP DOI BibTeX RDF |
identity theft prevention, privacy, authentication, biometrics |
60 | Youngsook Lee, Junghyun Nam, Seungjoo Kim, Dongho Won |
Two Efficient and Secure Authentication Schemes Using Smart Cards. |
ICCSA (5) |
2006 |
DBLP DOI BibTeX RDF |
smart card, password, mutual authentication, Authentication scheme |
56 | Lunwei Wang, Lianyue He, Xiangke Liao, Huaimin Wang |
Research on Control Flags-based Weighted Authentication Trustworthiness Model. |
PRDC |
2005 |
DBLP DOI BibTeX RDF |
|
56 | Lunwei Wang, Lifeng Wei, Xiangke Liao, Huaimin Wang |
AT-RBAC: An Authentication Trustworthiness-Based RBAC Model. |
GCC Workshops |
2004 |
DBLP DOI BibTeX RDF |
|
56 | Peng Ning, An Liu, Wenliang Du |
Mitigating DoS attacks against broadcast authentication in wireless sensor networks. |
ACM Trans. Sens. Networks |
2008 |
DBLP DOI BibTeX RDF |
security, Sensor networks, broadcast authentication, DoS attacks |
56 | Heesun Park, Stan Redford |
Client certificate and IP address based multi-factor authentication for J2EE web applications. |
CASCON |
2007 |
DBLP DOI BibTeX RDF |
IP address checking, J2EE web application, SSL client certificate, certificate based authentication, multi-factor authentication |
56 | Reihaneh Safavi-Naini, Huaxiong Wang, Chaoping Xing |
Linear Authentication Codes: Bounds and Constructions. |
INDOCRYPT |
2001 |
DBLP DOI BibTeX RDF |
Linear Authentication Codes, Distributed Authentication Codes, Authentication Codes |
52 | Yatao Yang, Yonghao Gu, Xi Tan, Lina Ma |
A New Wireless Mesh Network Authentication Scheme Based on Threshold Method. |
ICYCS |
2008 |
DBLP DOI BibTeX RDF |
|
52 | Chung-Ming Huang, Jian-Wei Li |
One-Pass Authentication and Key Agreement Procedure in IP Multimedia Subsystem for UMTS. |
AINA |
2007 |
DBLP DOI BibTeX RDF |
|
52 | Qing Li 0034, Wade Trappe |
Reducing delay and enhancing DoS resistance in multicast authentication through multigrade security. |
IEEE Trans. Inf. Forensics Secur. |
2006 |
DBLP DOI BibTeX RDF |
|
52 | Jaeduck Choi, Souhwan Jung, Younghan Kim 0002, Myungsik Yoo |
A Fast and Efficient Handover Authentication Achieving Conditional Privacy in V2I Networks. |
NEW2AN |
2009 |
DBLP DOI BibTeX RDF |
V2I, Handover Authentication, Conditional Privacy, VANET |
52 | Takeyuki Uehara, Reihaneh Safavi-Naini, Philip Ogunbona |
A secure and flexible authentication system for digital images. |
Multim. Syst. |
2004 |
DBLP DOI BibTeX RDF |
Compression tolerance, JPEG, Image authentication |
52 | Hao Chen 0095 |
Efficient compromising resilient authentication schemes for large scale wireless sensor networks. |
WISEC |
2010 |
DBLP DOI BibTeX RDF |
code and function based authentication schemes, polynomial based authentication scheme, wireless sensor netowork |
48 | Jung-Muk Lim, Hyung-Jin Lim, Tai-Myoung Chung |
Performance Evaluation of Public Key Based Mechanisms for Mobile IPv4 Authentication in AAA Environments. |
ICOIN |
2006 |
DBLP DOI BibTeX RDF |
|
48 | Jiayang Liu, Lin Zhong 0001, Jehan Wickramasuriya, Venu Vasudevan |
User evaluation of lightweight user authentication with a single tri-axis accelerometer. |
Mobile HCI |
2009 |
DBLP DOI BibTeX RDF |
authentication, user study, gesture, accelerometer |
48 | Seong-Soo Park 0001, Jong-Hyouk Lee, Tai-Myoung Chung |
Authentication Analysis Based on Certificate for Proxy Mobile IPv6 Environment. |
ICCSA (1) |
2009 |
DBLP DOI BibTeX RDF |
Proxy MIPv6, EAP-TLS, Authentication, Certificate, BAN Logic |
48 | Ivonne Thomas, Michael Menzel 0001, Christoph Meinel |
Using quantified trust levels to describe authentication requirements in federated identity management. |
SWS |
2008 |
DBLP DOI BibTeX RDF |
authentication and access control, trust levels, web service federation, trust management, federated identity management |
48 | Su Jung Yu, Joo-Seok Song |
A New Authentication and Key Agreement Protocol Scheme in Convergence of UMTS and DVB-H Networks. |
KES (3) |
2007 |
DBLP DOI BibTeX RDF |
security, authentication, UMTS, DVB-H, convergence networks |
48 | Haifeng Qian, Zhenfu Cao, Lichen Wang, Qingshui Xue |
Efficient Non-interactive Deniable Authentication Protocols. |
CIT |
2005 |
DBLP DOI BibTeX RDF |
Tight security, Authentication, Digital signature, MAC, Deniablity, Impersonation attack, Trapdoor permutations |
48 | IkSu Park, Seung Bae Park, ByeongKyun Oh |
User Authentication Protocol Based on Human Memorable Password and Using RSA. |
ICCSA (1) |
2004 |
DBLP DOI BibTeX RDF |
Password Dictionary, Authentication, Cryptography, public key cryptography, Password authentication |
48 | IkSu Park, Seung Bae Park, ByeongKyun Oh |
User Authentication Protocol Based on Human Memorable Password and Using RSA. |
ICCSA (4) |
2004 |
DBLP DOI BibTeX RDF |
Password Dictionary, Authentication, Cryptography, public key cryptography, Password authentication |
46 | Saber Zrelli, Yoichi Shinoda |
Experimental Evaluation of EAP Performance in Roaming Scenarios. |
AINTEC |
2007 |
DBLP DOI BibTeX RDF |
|
46 | Seo-Il Kang, Deok-Gyu Lee, Im-Yeong Lee |
A Study on Key Distribution and ID Registration in the AAA System for Ubiquitous Multimedia Environments. |
MMM (2) |
2007 |
DBLP DOI BibTeX RDF |
ID registration, Authentication, key distribution, Multimedia service |
46 | Suguru Fujisawa, Makoto Otani, Kenzi Watanabe |
Implementation of PKI Authentication Functions for Network User Authentication System "Opengate". |
SAINT |
2008 |
DBLP DOI BibTeX RDF |
UPKI, Network User Authentication, Opengate, PKI |
45 | Leonid Kompanets, Janusz Bobulski, Roman Wyrzykowski |
Pseudo-entropy Similarity for Human Biometrics. |
Biometric Authentication |
2002 |
DBLP DOI BibTeX RDF |
|
44 | Jae-Woo Lee |
A Policy of Copyright Protection Using Authentication Key Based on Digital Watermarking. |
MUE |
2007 |
DBLP DOI BibTeX RDF |
|
44 | Chuhong Fei, Deepa Kundur, Raymond H. Kwong |
Analysis and design of secure watermark-based authentication systems. |
IEEE Trans. Inf. Forensics Secur. |
2006 |
DBLP DOI BibTeX RDF |
|
44 | Takamichi Saito, Ryosuke Hatsugai, Toshiyuki Kito |
On Compromising Password-Based Authentication over HTTPS. |
AINA (1) |
2006 |
DBLP DOI BibTeX RDF |
|
44 | Kihun Hong, Souhwan Jung, Shyhtsun Felix Wu |
A Hash-Chain Based Authentication Scheme for Fast Handover in Wireless Network. |
WISA |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Koji Iwano, Taro Miyazaki, Sadaoki Furui |
Multimodal Speaker Verification Using Ear Image Features Extracted by PCA and ICA. |
AVBPA |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Hea Suk Jo, Hee Yong Youn |
A New Synchronization Protocol for Authentication in Wireless LAN Environment. |
ICCSA (1) |
2004 |
DBLP DOI BibTeX RDF |
|
44 | Hea Suk Jo, Hee Yong Youn |
A New Synchronization Protocol for Authentication in Wireless LAN Environment. |
ICCSA (3) |
2004 |
DBLP DOI BibTeX RDF |
|
44 | Michael J. Covington, Mustaque Ahamad, Irfan A. Essa, H. Venkateswaran |
Parameterized Authentication. |
ESORICS |
2004 |
DBLP DOI BibTeX RDF |
|
44 | Ji Ma 0001, Mehmet A. Orgun |
Formalising theories of trust for authentication protocols. |
Inf. Syst. Frontiers |
2008 |
DBLP DOI BibTeX RDF |
Trust theory, Agents, Authentication protocols, Belief logic |
44 | Jihwan Lim, Heekuck Oh, Sangjin Kim |
A New Hash-Based RFID Mutual Authentication Protocol Providing Enhanced User Privacy Protection. |
ISPEC |
2008 |
DBLP DOI BibTeX RDF |
Authentication, RFID, User Privacy |
44 | Youngsook Lee, Junghyun Nam, Dongho Won |
Vulnerabilities in a Remote Agent Authentication Scheme Using Smart Cards. |
KES-AMSTA |
2008 |
DBLP DOI BibTeX RDF |
distributed system, smart card, impersonation attack, authentication scheme |
44 | Kui Ren 0001, Wenjing Lou |
Privacy-enhanced, Attack-resilient Access Control in Pervasive Computing Environments with Optional Context Authentication Capability. |
Mob. Networks Appl. |
2007 |
DBLP DOI BibTeX RDF |
pervasive computing environment (PCE), context authentication, security, privacy, access control |
44 | Giovanni Di Crescenzo, Munir Cochinwala, Hyong Sop Shim |
Modeling cryptographic properties of voice and voice-based entity authentication. |
Digital Identity Management |
2007 |
DBLP DOI BibTeX RDF |
modeling human factors, biometrics, voice, entity authentication |
44 | Kai Chen 0007, Xinglei Zhu, Zhishou Zhang |
A Hybrid Content-Based Image Authentication Scheme. |
PCM |
2007 |
DBLP DOI BibTeX RDF |
Content hash, Watermarking, Digital Signature, ECC, Image Authentication |
44 | Cástor Mariño, Manuel G. Penedo, Marta Penas, María J. Carreira, F. González |
Personal authentication using digital retinal images. |
Pattern Anal. Appl. |
2006 |
DBLP DOI BibTeX RDF |
Digital retinal images, Registration, Personal authentication, Creases |
44 | Byungkwan Park, Daesung Moon, Yongwha Chung, Jin-Won Park |
Capacity Planning for Scalable Fingerprint Authentication. |
KES (1) |
2006 |
DBLP DOI BibTeX RDF |
Performance Evaluation, Authentication Protocol, Fingerprint Verification |
44 | Hea Suk Jo, Hee Yong Youn |
A Secure User Authentication Protocol Based on One-Time-Password for Home Network. |
ICCSA (1) |
2005 |
DBLP DOI BibTeX RDF |
three-way handshake, security, Authentication, home network, one-time password |
44 | Shiqun Li, Jianying Zhou 0001, Xiangxue Li, Kefei Chen |
An Authentication Protocol for Pervasive Computing. |
ISPA |
2005 |
DBLP DOI BibTeX RDF |
Pervasive Computing Security, Authentication, E-Commerce, Public Key Infrastructure |
44 | Zheng Liu, Xue Li 0001, Zhaoyang Dong |
Multimedia authentication with sensor-based watermarking. |
MM&Sec |
2004 |
DBLP DOI BibTeX RDF |
fuzzy identification system, authentication, fragile watermarking |
44 | Michael Kaminsky, George Savvides, David Mazières, M. Frans Kaashoek |
Decentralized user authentication in a global file system. |
SOSP |
2003 |
DBLP DOI BibTeX RDF |
authentication, authorization, file system, groups, users, credentials, ACL, SFS |
44 | Willy Susilo, Yi Mu 0001 |
Non-interactive Deniable Ring Authentication. |
ICISC |
2003 |
DBLP DOI BibTeX RDF |
Ring signature schemes, non-interactive, ring-to-ring authentication, deniable |
43 | Xiehua Li, ShuTang Yang, Jian-Hua Li, HongWen Zhu |
Security Protocol Analysis with Improved Authentication Tests. |
ISPEC |
2006 |
DBLP DOI BibTeX RDF |
Authentication tests, Message type, Neuman-Stubblebine protocol, Improved authentication tests |
43 | Kee-Won Kim, Jun-Cheol Jeon, Kee-Young Yoo |
Efficient and Secure Password Authentication Schemes for Low-Power Devices. |
MSN |
2005 |
DBLP DOI BibTeX RDF |
low-power device, wireless network, password authentication, mutual authentication |
43 | Adrian Perrig |
The BiBa one-time signature and broadcast authentication protocol. |
CCS |
2001 |
DBLP DOI BibTeX RDF |
signature based on a one-way function without trapdoor, source authentication for multicast, broadcast authentication, one-time signature |
43 | Reihaneh Safavi-Naini, Huaxiong Wang |
New Results on Multi-Receiver Authentication Codes. |
EUROCRYPT |
1998 |
DBLP DOI BibTeX RDF |
Multi-receiver authentication code, Authentication code |
43 | Taekyoung Kwon 0002, JooSeok Song |
Security and efficiency in authentication protocols resistant to password guessing attack. |
LCN |
1997 |
DBLP DOI BibTeX RDF |
password guessing attack resistance, secret, user-chosen weak secret, security-oriented protocols, cipher operations, protocol steps, poorly-chosen weak secret protection, security, efficiency, cryptographic protocols, key exchange, message authentication, authentication protocols, secure communications, random numbers, dictionary attacks |
43 | Antonio Izquierdo, Nada Golmie, Katrin Hoeper, Lidong Chen |
Using the EAP framework for fast media independent handover authentication. |
WICON |
2008 |
DBLP DOI BibTeX RDF |
pre-authentication, re-authentication, performance, authentication, handover, EAP |
42 | Jochen Liedtke |
A Short Note on Small Virtually-Addresses Control Blocks. |
ACM SIGOPS Oper. Syst. Rev. |
1995 |
DBLP DOI BibTeX RDF |
|
42 | Jiafen Liu, Mingtian Zhou |
Designing an Authentication Protocol via Authentication Test. |
ISCC |
2007 |
DBLP DOI BibTeX RDF |
|
42 | Qinghan Xiao |
Biometric User Authentication for Heightened Information Security. |
ICBA |
2004 |
DBLP DOI BibTeX RDF |
|
42 | Jae-Woo Lee, Doo-Kwon Baik |
Improved Client Authentication Using Session Authentication in the Internet. |
Human.Society@Internet 2003 |
2003 |
DBLP DOI BibTeX RDF |
|
42 | Kenta Matsumiya, Soko Aoki, Masana Murase, Hideyuki Tokuda |
Zero-Stop Authentication: Sensor-Based Real-Time Authentication System. |
RTCSA |
2003 |
DBLP DOI BibTeX RDF |
|
41 | Deok-Gyu Lee, Yun-kyung Lee, Jong Wook Han, Jong Hyuk Park, Im-Yeong Lee |
Intelligent Home Network Authentication: Home Device Authentication Using Device Certification. |
OTM Conferences (2) |
2007 |
DBLP DOI BibTeX RDF |
home device authentication, home device certificate |
41 | Yun-kyung Lee, Deok-Gyu Lee, Jong Wook Han, Kyo-Il Chung |
Home Network Device Authentication: Device Authentication Framework and Device Certificate Profile. |
APWeb/WAIM Workshops |
2007 |
DBLP DOI BibTeX RDF |
home network security, home device authentication, home device certificate |
41 | Ruud M. Bolle, Andrew W. Senior, Nalini K. Ratha, Sharath Pankanti |
Fingerprint Minutiae: A Constructive Definition. |
Biometric Authentication |
2002 |
DBLP DOI BibTeX RDF |
|
41 | Massimo Tistarelli, Andrea Lagorio, Enrico Grosso |
Understanding Iconic Image-Based Face Biometrics. |
Biometric Authentication |
2002 |
DBLP DOI BibTeX RDF |
|
41 | Tetiana Valchuk, Roman Wyrzykowski, Leonid Kompanets |
Mental Characteristics of Person as Basic Biometrics |
Biometric Authentication |
2002 |
DBLP DOI BibTeX RDF |
|
40 | Paul L. Yu, John S. Baras, Brian M. Sadler |
Physical-Layer Authentication. |
IEEE Trans. Inf. Forensics Secur. |
2008 |
DBLP DOI BibTeX RDF |
|
40 | Patryk Chamuczynski, Omar Alfandi, Henrik Brosenne, Constantin Werner, Dieter Hogrefe |
Enabling Pervasiveness by Seamless Inter-domain Handover: Performance Study of PANA Pre-authentication. |
PerCom |
2008 |
DBLP DOI BibTeX RDF |
Pervasive Computing |
40 | Cástor Mariño, Manuel G. Penedo, Marta Penas |
Retinal Based Authentication via Distributed Web Application. |
EUROCAST |
2005 |
DBLP DOI BibTeX RDF |
|
40 | Jong-hu Lee, Jae-Cheol Ryou 0001 |
Strong User Authentication in IEEE802.11 Wireless LAN. |
Human.Society@Internet 2003 |
2003 |
DBLP DOI BibTeX RDF |
|
40 | Muxiang Zhang |
Adaptive Protocol for Entity Authentication and Key Agreement in Mobile Networks. |
ICISC |
2003 |
DBLP DOI BibTeX RDF |
|
39 | Hassnaa Moustafa, Jacky Forestier, Mohamed Chaari |
Distributed authentication for services commercialization in ad hoc networks. |
Mobility Conference |
2009 |
DBLP DOI BibTeX RDF |
authentication access controls, services commercialization using ad hoc networks, ad hoc networks |
39 | Zhimin Yang, Adam C. Champion, Boxuan Gu, Xiaole Bai, Dong Xuan |
Link-layer protection in 802.11i WLANS with dummy authentication. |
WISEC |
2009 |
DBLP DOI BibTeX RDF |
dummy authentication, security, wlan, open access |
39 | Ralph Holz, Heiko Niedermayer, Peter Hauck, Georg Carle |
Trust-Rated Authentication for Domain-Structured Distributed Systems. |
EuroPKI |
2008 |
DBLP DOI BibTeX RDF |
Trust-Rating, Distributed Systems, Peer-to-Peer, Authentication, Protocols, PKI, Multi-Domain |
39 | Debasis Giri, Parmeshwary Dayal Srivastava |
Cryptanalysis and the Improvement of Kim et al.'s Password Authentication Schemes. |
ICISS |
2007 |
DBLP DOI BibTeX RDF |
Authentication, Smart card, Attack, Timestamp, Nonce |
39 | Maryna Komarova, Michel Riguidel |
Optimized ticket distribution scheme for fast re-authentication protocol (fap). |
Q2SWinet |
2007 |
DBLP DOI BibTeX RDF |
inter-domain roaming, authentication, authorization, wireless security |
39 | Hui-Feng Huang |
An Efficient Mutual Authentication Protocol on RFID Tags. |
EUC Workshops |
2007 |
DBLP DOI BibTeX RDF |
security, authentication, RFID system |
39 | Young-Soo Kim, Sung-Ja Choi, Gang-Soo Lee, Geuk Lee |
Entity Based Message Authentication System. |
KES-AMSTA |
2007 |
DBLP DOI BibTeX RDF |
entity based cryptosystem, security, authentication, agent, public key cryptosystem |
39 | John G. Brainard, Ari Juels, Ronald L. Rivest, Michael Szydlo, Moti Yung |
Fourth-factor authentication: somebody you know. |
CCS |
2006 |
DBLP DOI BibTeX RDF |
hardware tokens, vouchers, authentication |
39 | Ralf Wienzek, Rajendra Persaud |
Fast Re-authentication for Handovers in Wireless Communication Networks. |
Networking |
2006 |
DBLP DOI BibTeX RDF |
Wireless Networks, Authentication, Handover |
39 | Youngsook Lee, Junghyun Nam, Dongho Won |
Security Enhancement of a Remote User Authentication Scheme Using Smart Cards. |
OTM Workshops (1) |
2006 |
DBLP DOI BibTeX RDF |
parallel session attack, smart card, password, Authentication scheme, reflection attack |
39 | Yongjian Li, Jun Pang 0001 |
Generalized Unsolicited Tests for Authentication Protocol Analysis. |
PDCAT |
2006 |
DBLP DOI BibTeX RDF |
the Otway-Rees protocol, authentication, cryptographic protocols, strand space |
39 | Ana Sanz Merino, Yasuhiko Matsunaga, Manish Shah, Takashi Suzuki, Randy H. Katz |
Secure Authentication System for Public WLAN Roaming. |
Mob. Networks Appl. |
2005 |
DBLP DOI BibTeX RDF |
policy control, authentication, wireless LAN, roaming, link layer security |
39 | Jun Li 0025, Bruce Christianson, Martin J. Loomes |
"Fair" Authentication in Pervasive Computing. |
MADNES |
2005 |
DBLP DOI BibTeX RDF |
Human self-determination, Mobile ad-hoc Networks, Authentication, Trust, Pervasive Computing |
39 | Makoto Otani, Katsuhiko Eguchi, Hirofumi Eto, Kenzi Watanabe, Shin-ichi Tadaki, Yoshiaki Watanabe |
Implementation of IPv6 functions for a network user authentication system opengate. |
SIGUCCS |
2005 |
DBLP DOI BibTeX RDF |
network user authentication system, opengate, internet, IPv6 |
39 | Nidal Aboudagga, M. Tamer Refaei, Mohamed Eltoweissy, Luiz A. DaSilva, Jean-Jacques Quisquater |
Authentication protocols for ad hoc networks: taxonomy and research issues. |
Q2SWinet |
2005 |
DBLP DOI BibTeX RDF |
protocol taxonomy, ad hoc networks, authentication, network security, credentials, identity verification |
39 | Chin-Chen Chang 0001, Jui-Yi Kuo, Jung-San Lee |
Time-bounded Based Password Authentication Scheme. |
CW |
2005 |
DBLP DOI BibTeX RDF |
Resource access, Authentication, Time-bounded |
39 | Pallav Gupta, Srivaths Ravi 0001, Anand Raghunathan, Niraj K. Jha |
Efficient fingerprint-based user authentication for embedded systems. |
DAC |
2005 |
DBLP DOI BibTeX RDF |
embedded systems, fingerprint, user authentication, extensible processors |
39 | Erik Anderson, Cheryl L. Beaver, Timothy Draelos, Richard Schroeppel, Mark Torgerson |
ManTiCore: Encryption with Joint Cipher-State Authentication. |
ACISP |
2004 |
DBLP DOI BibTeX RDF |
Encryption Mode, Inexpensive Authentication, Luby-Rackoff, Feistel, Middletext, Hash, Cipher |
39 | Valery I. Korzhik, Guillermo Morales-Luna |
Hybrid authentication based on noisy channels. |
Int. J. Inf. Sec. |
2003 |
DBLP DOI BibTeX RDF |
Key sharing, Information-theoretically secure authentication, Hash functions, Privacy amplification |
39 | Yasuhiko Matsunaga, Ana Sanz Merino, Takashi Suzuki, Randy H. Katz |
Secure authentication system for public WLAN roaming. |
WMASH |
2003 |
DBLP DOI BibTeX RDF |
policy control, authentication, wireless LAN, roaming, single sign-on, hotspot, link layer security |
39 | Yong Lee, H. K. Lee, Goo Yeon Lee, Hwa Jong Kim, Choong Kyo Jeong |
Design of hybrid authentication scheme and key distribution for mobile multi-hop relay in IEEE 802.16j. |
EATIS |
2009 |
DBLP DOI BibTeX RDF |
hybrid authentication, mutual authentication, mobile wireless network, multi hop relay, IEEE 802.16j |
39 | Jahan Hassan, Harsha R. Sirisena, Björn Landfeldt |
Trust-Based Fast Authentication for Multiowner Wireless Networks. |
IEEE Trans. Mob. Comput. |
2008 |
DBLP DOI BibTeX RDF |
Fast authentication, inter-domain authentication, Markov Models, handoff, IEEE802.11 |
39 | Roman Weiss, Alexander De Luca |
PassShapes: utilizing stroke based authentication to increase password memorability. |
NordiCHI |
2008 |
DBLP DOI BibTeX RDF |
PassShapes, graphical authentication, shape passwords, security, authentication |
39 | Mohamed Kassab, Abdelfattah Belghith, Jean-Marie Bonnin, Sahbi Sassi |
Fast pre-authentication based on proactive key distribution for 802.11 infrastructure networks. |
WMuNeP |
2005 |
DBLP DOI BibTeX RDF |
IAPP, pre-authentication, re-authentication, handover, WiFi, IEEE 802.11i |
39 | Ya-Fen Chang, Chin-Chen Chang 0001 |
A secure and efficient strong-password authentication protocol. |
ACM SIGOPS Oper. Syst. Rev. |
2004 |
DBLP DOI BibTeX RDF |
strong password, smart card, password authentication, mutual authentication, denial-of-service attack, stolen-verifier attack |
39 | Michael K. Reiter, Stuart G. Stubblebine |
Toward Acceptable Metrics of Authentication. |
S&P |
1997 |
DBLP DOI BibTeX RDF |
authentication metrics design, trusted intermediaries, intersecting paths, key interdependencies, certificates, ambiguities, message authentication, large-scale system, confidence, acceptability, multiple paths |
39 | Stuart G. Stubblebine, Rebecca N. Wright |
An Authentication Logic with Formal Semantics Supporting Synchronization, Revocation, and Recency. |
IEEE Trans. Software Eng. |
2002 |
DBLP DOI BibTeX RDF |
authentication logic, recent-secure authentication, reasoning about time, authentication, formal methods, computer security, security policies, clock synchronization, revocation, security analysis, protocol analysis, distributed systems security |
Displaying result #1 - #100 of 25398 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|