Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
125 | Xiaojian Tian, Duncan S. Wong |
Session Corruption Attack and Improvements on Encryption Based MT-Authenticators. |
CT-RSA |
2006 |
DBLP DOI BibTeX RDF |
MT-authenticator, BCK-model, CK-model, Verifiable Encryption |
92 | Yvonne Hitchcock, Yiu Shing Terry Tin, Juan Manuel González Nieto, Colin Boyd, Paul Montague |
A Password-Based Authenticator: Security Proof and Applications. |
INDOCRYPT |
2003 |
DBLP DOI BibTeX RDF |
key agreement, password authentication, Key management protocols |
75 | Ying-Han Pang, Andrew Teoh Beng Jin, David Ngo Chek Ling |
Personal Authenticator on the Basis of Two-Factors: Palmprint Features and Tokenized Random Data. |
Australian Conference on Artificial Intelligence |
2004 |
DBLP DOI BibTeX RDF |
|
64 | Peng Ning, An Liu, Wenliang Du |
Mitigating DoS attacks against broadcast authentication in wireless sensor networks. |
ACM Trans. Sens. Networks |
2008 |
DBLP DOI BibTeX RDF |
security, Sensor networks, broadcast authentication, DoS attacks |
64 | Katelin Bailey, Apu Kapadia, Linden Vongsathorn, Sean W. Smith |
TwoKind authentication: protecting private information in untrustworthy environments. |
WPES |
2008 |
DBLP DOI BibTeX RDF |
principle of least privilege, authenticators, passwords |
64 | You Sung Kang, KyungHee Oh, Byung-Ho Chung, Kyoil Chung, DaeHun Nyang |
Analysis and Countermeasure on Vulnerability of WPA Key Exchange Mechanism. |
ICOIN |
2004 |
DBLP DOI BibTeX RDF |
802.11i, 802.1X, WPA, WLAN security |
54 | Aleck Nash, Hudan Studiawan, George Grispos, Kim-Kwang Raymond Choo |
Security Analysis of Google Authenticator, Microsoft Authenticator, and Authy. |
ICDF2C (2) |
2023 |
DBLP DOI BibTeX RDF |
|
48 | Huawei Zhao, Jing Qin 0002, Zhifeng Fang |
Converters for Designing Applied Cryptographic Protocols. |
EUC (2) |
2008 |
DBLP DOI BibTeX RDF |
|
48 | Shaoquan Jiang |
Deniable Authentication on the Internet. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
Authentication, Protocol, Key Exchange, Deniability |
48 | Shaoquan Jiang, Guang Gong |
Efficient Authenticators with Application to Key Exchange. |
ICISC |
2005 |
DBLP DOI BibTeX RDF |
|
48 | Changhua He, John C. Mitchell |
Analysis of the 802.11i 4-way handshake. |
Workshop on Wireless Security |
2004 |
DBLP DOI BibTeX RDF |
4-way handshake, authentication, WLAN, key management, denial-of-service, 802.11i |
44 | Tetsuo Kamina, Toshinori Aoki, Yoshiteru Eto, Noboru Koshizuka, Jun Yamada, Ken Sakamura |
Verifying Identifier-Authenticity in Ubiquitous Computing Environment. |
AINA Workshops (2) |
2007 |
DBLP DOI BibTeX RDF |
2-D code, ucode, authenticator, infrastructure, QR Code |
44 | Yiu Shing Terry Tin, Harikrishna Vasanta, Colin Boyd, Juan Manuel González Nieto |
Protocols with Security Proofs for Mobile Applications. |
ACISP |
2004 |
DBLP DOI BibTeX RDF |
secure key exchange, authenticator, Provable security, mobile security |
43 | Ying-Han Pang, Andrew Teoh Beng Jin, David Ngo Chek Ling |
Two-Factor Cancelable Biometrics Authenticator. |
J. Comput. Sci. Technol. |
2007 |
DBLP DOI BibTeX RDF |
face recognition, Geometric moments, cancelable biometrics, pseudo Zernike moment |
43 | Andrew Teoh Beng Jin, David Ngo Chek Ling, Alwyn Goh |
An Integrated Dual Factor Authenticator Based on the Face Data and Tokenised Random Number. |
ICBA |
2004 |
DBLP DOI BibTeX RDF |
|
43 | Donald W. Davies |
A Message Authenticator Algorithm Suitable for A Mainframe Computer. |
CRYPTO |
1984 |
DBLP DOI BibTeX RDF |
|
32 | Manuel Barbosa, Pooya Farshim |
Security Analysis of Standard Authentication and Key Agreement Protocols Utilising Timestamps. |
AFRICACRYPT |
2009 |
DBLP DOI BibTeX RDF |
Key Agreement, Timestamp, Entity Authentication |
32 | M. Abdul Alim, Behçet Sarikaya |
EAP-Sens: a security architecture for wireless sensor networks. |
WICON |
2008 |
DBLP DOI BibTeX RDF |
GPSK, security, wireless sensor network, WPAN, EAP |
32 | Yunlei Zhao, Chan H. Lee, Yiming Zhao, Hong Zhu 0004 |
Some Observations on Zap and Its Applications. |
ACNS |
2004 |
DBLP DOI BibTeX RDF |
Zap, public-coin honest verifier zero-knowledge, deniable authentication, timed commitment, witness indistinguishability |
32 | Yvo Desmedt, Yair Frankel |
Shared Generation of Authenticators and Signatures (Extended Abstract). |
CRYPTO |
1991 |
DBLP DOI BibTeX RDF |
|
32 | Albrecht Beutelspacher |
Perfect and Essentially Perfect Authentication Schemes. |
EUROCRYPT |
1987 |
DBLP DOI BibTeX RDF |
|
28 | Yang Zhang |
Effective Attacks in the Tor Authentication Protocol. |
NSS |
2009 |
DBLP DOI BibTeX RDF |
Tor Authentication Protocol, Onion Routing Protocol, Authenticator, Tor, Universally Composable Security |
28 | Qing Li 0034, Yih-Chun Hu, Meiyuan Zhao, Adrian Perrig, Jesse Walker, Wade Trappe |
SEAR: a secure efficient ad hoc on demand routing protocol for wireless networks. |
AsiaCCS |
2008 |
DBLP DOI BibTeX RDF |
SEAR, authenticator, one-way hash function |
27 | Vassilis Papaspirou, Maria Papathanasaki, Leandros A. Maglaras, Ioanna Kantzavelou, Christos Douligeris, Mohamed Amine Ferrag, Helge Janicke |
A Novel Authentication Method That Combines Honeytokens and Google Authenticator. |
Inf. |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Shay Gueron |
A New Interpretation for the GHASH Authenticator of AES-GCM. |
CSCML |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Michal Kepkowski, Lucjan Hanzlik, Ian D. Wood, Mohamed Ali Kâafar |
How Not to Handle Keys: Timing Attacks on FIDO Authenticator Privacy. |
Proc. Priv. Enhancing Technol. |
2022 |
DBLP DOI BibTeX RDF |
|
27 | Michal Kepkowski, Lucjan Hanzlik, Ian D. Wood, Mohamed Ali Kâafar |
How Not to Handle Keys: Timing Attacks on FIDO Authenticator Privacy. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
27 | Narla John Metilda Sagaya Mary, Srinivasan Umesh, Sandesh Varadaraju Katta |
S-Vectors and TESA: Speaker Embeddings and a Speaker Authenticator Based on Transformer Encoder. |
IEEE ACM Trans. Audio Speech Lang. Process. |
2022 |
DBLP DOI BibTeX RDF |
|
27 | Harshat Kumar, Hojjat Seyed Mousavi, Behrooz Shahsavari |
Fusion-Id: A Photoplethysmography and Motion Sensor Fusion Biometric Authenticator With Few-Shot on-Boarding. |
ICASSP |
2022 |
DBLP DOI BibTeX RDF |
|
27 | Vassilis Papaspirou, Maria Papathanasaki, Leandros A. Maglaras, Ioanna Kantzavelou, Christos Douligeris, Mohamed Amine Ferrag, Helge Janicke |
Security Revisited: Honeytokens meet Google Authenticator. |
SEEDA-CECNSM |
2022 |
DBLP DOI BibTeX RDF |
|
27 | Markus Keil, Philipp Markert, Markus Dürmuth |
"It's Just a Lot of Prerequisites": A User Perception and Usability Analysis of the German ID Card as a FIDO2 Authenticator. |
EuroUSEC |
2022 |
DBLP DOI BibTeX RDF |
|
27 | Xiang Gao, Jia Yu 0005, Wenting Shen, Yan Chang, Shibin Zhang, Ming Yang 0023, Bin Wu |
Achieving low-entropy secure cloud data auditing with file and authenticator deduplication. |
Inf. Sci. |
2021 |
DBLP DOI BibTeX RDF |
|
27 | Vassilis Papaspirou, Maria Papathanasaki, Leandros A. Maglaras, Ioanna Kantzavelou, Christos Douligeris, Mohamed Amine Ferrag, Helge Janicke |
Cybersecurity Revisited: Honeytokens meet Google Authenticator. |
CoRR |
2021 |
DBLP BibTeX RDF |
|
27 | Chris Culnane, Christopher J. P. Newton, Helen Treharne |
Technical Report on a Virtual CTAP2 WebAuthn Authenticator. |
CoRR |
2021 |
DBLP BibTeX RDF |
|
27 | Yuto Okawa, Shuji Yamaguchi, Hidehito Gomi, Tetsutaro Uehara |
Implementation of an extended FIDO2 authenticator using Attribute-Based Signatures. |
QRS Companion |
2021 |
DBLP DOI BibTeX RDF |
|
27 | Yan Xu 0007, Song Sun, Jie Cui 0004, Hong Zhong 0001 |
Intrusion-resilient public cloud auditing scheme with authenticator update. |
Inf. Sci. |
2020 |
DBLP DOI BibTeX RDF |
|
27 | Bikash Debnath, Jadav Chandra Das, Debashis De, Ferial Ghaemi, Ali Ahmadian, Norazak Senu |
Reversible Palm Vein Authenticator Design With Quantum Dot Cellular Automata for Information Security in Nanocommunication Network. |
IEEE Access |
2020 |
DBLP DOI BibTeX RDF |
|
27 | Hui Li 0070, Xuesong Pan, Xinluo Wang, Haonan Feng, Chengjie Shi |
Authenticator Rebinding Attack of the UAF Protocol on Mobile Devices. |
Wirel. Commun. Mob. Comput. |
2020 |
DBLP DOI BibTeX RDF |
|
27 | Chengqian Guo, Quanwei Cai 0001, Qiongxiao Wang, Jingqiang Lin |
Extending Registration and Authentication Processes of FIDO2 External Authenticator with QR Codes. |
TrustCom |
2020 |
DBLP DOI BibTeX RDF |
|
27 | Jin Wook Byun |
On the Secure Design of Hash-Based Authenticator in the Smartcard Authentication System. |
Wirel. Pers. Commun. |
2019 |
DBLP DOI BibTeX RDF |
|
27 | Yun-Tai Chang, Marc J. Dupuis |
My Voiceprint Is My Authenticator: A Two-Layer Authentication Approach Using Voiceprint for Voice Assistants. |
SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI |
2019 |
DBLP DOI BibTeX RDF |
|
27 | Nikola K. Blanchard, Siargey Kachanovich, Ted Selker, Florentin Waligorski |
Reflexive Memory Authenticator: A Proposal for Effortless Renewable Biometrics. |
ETAA@ESORICS |
2019 |
DBLP DOI BibTeX RDF |
|
27 | Hubert Garavel, Lina Marsso |
Comparative Study of Eight Formal Specifications of the Message Authenticator Algorithm. |
MARS/VPT@ETAPS |
2018 |
DBLP DOI BibTeX RDF |
|
27 | Florian Reimair, Christian Kollmann, Alexander Marsalek |
Emulating U2F authenticator devices. |
CNS |
2016 |
DBLP DOI BibTeX RDF |
|
27 | Roland H. Steinegger, Daniel Deckers, Pascal Giessler, Sebastian Abeck |
Risk-based authenticator for web applications. |
EuroPLoP |
2016 |
DBLP BibTeX RDF |
|
27 | Wenting Shen, Jia Yu 0005, Rong Hao, Xu An Wang 0001 |
A Public Cloud Storage Auditing Scheme with Lightweight Authenticator Generation. |
3PGCIC |
2015 |
DBLP DOI BibTeX RDF |
|
27 | Guangdong Bai, Jun Sun 0001, Jianliang Wu, Quanqi Ye, Li Li 0044, Jin Song Dong, Shanqing Guo |
All Your Sessions Are Belong to Us: Investigating Authenticator Leakage through Backup Channels on Android. |
ICECCS |
2015 |
DBLP DOI BibTeX RDF |
|
27 | Nikolaos Pitropakis, Nikolaos Yfantopoulos, Dimitris Geneiatakis, Costas Lambrinoudakis |
Towards an augmented authenticator in the Cloud. |
ISSPIT |
2014 |
DBLP DOI BibTeX RDF |
|
27 | Andrea Bartoli, Juan Hernández-Serrano, Olga León, Apostolos A. Kountouris, Dominique Barthel |
Energy-efficient physical layer packet authenticator for machine-to-machine networks. |
Trans. Emerg. Telecommun. Technol. |
2013 |
DBLP DOI BibTeX RDF |
|
27 | Klaus John, Stefan Taber, Andreas Ehringfeld |
Proxy Authenticator - Approach of a Signature-based Single Sign On Solution for E-Government Services. |
EGOV/ePart Ongoing Research |
2013 |
DBLP BibTeX RDF |
|
27 | Haibo Tian |
Deniable message transmission authenticator based on weak signature schemes. |
IET Inf. Secur. |
2012 |
DBLP DOI BibTeX RDF |
|
27 | Chien-Yuan Chen, Cheng-Yuan Ku, David C. Yen |
Cryptographic relational algebra for databases using the field authenticator. |
Comput. Math. Appl. |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Hyoungjoo Lee, Sungzoon Cho |
Retraining a keystroke dynamics-based authenticator with impostor patterns. |
Comput. Secur. |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Pilsung Kang 0001, Seongseob Hwang, Sungzoon Cho |
Continual Retraining of Keystroke Dynamics Based Authenticator. |
ICB |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Nicolas Sklavos 0001, Costas Efstathiou |
SecurID Authenticator: On the Hardware Implementation Efficiency. |
ICECS |
2007 |
DBLP DOI BibTeX RDF |
|
27 | John R. Vollbrecht, Pasi Eronen, Nick L. Petroni Jr., Yoshihiro Ohba |
State Machines for Extensible Authentication Protocol (EAP) Peer and Authenticator. |
RFC |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Raymond S. T. Lee |
iJADE Authenticator - An Intelligent Multiagent Based Facial Authentication System. |
Int. J. Pattern Recognit. Artif. Intell. |
2002 |
DBLP DOI BibTeX RDF |
|
27 | Bart Preneel, Vincent Rijmen, Paul C. van Oorschot |
Security analysis of the message authenticator algorithm (MAA). |
Eur. Trans. Telecommun. |
1997 |
DBLP DOI BibTeX RDF |
|
16 | Giuseppe Ateniese, Seny Kamara, Jonathan Katz |
Proofs of Storage from Homomorphic Identification Protocols. |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
|
16 | Jing Liu 0003, Xinming Ye, Jun Zhang 0001, Jun Li 0002 |
Security Verification of 802.11i 4-Way Handshake Protocol. |
ICC |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Hovav Shacham, Brent Waters |
Compact Proofs of Retrievability. |
ASIACRYPT |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Ee-Chien Chang, Jia Xu 0006 |
Remote Integrity Check with Dishonest Storage Server. |
ESORICS |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Huijuan Yang, Alex ChiChung Kot |
Pattern-Based Data Hiding for Binary Image Authentication by Connectivity-Preserving. |
IEEE Trans. Multim. |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Rafael Marín López, Pedro J. Fernández, Antonio Fernandez Gómez-Skarmeta |
3-Party Approach for Fast Handover in EAP-Based Wireless Networks. |
OTM Conferences (2) |
2007 |
DBLP DOI BibTeX RDF |
security, authentication, key distribution, Fast handover |
16 | Matti Pöllä, Timo Honkela |
Probabilistic Text Change Detection Using an Immune Model. |
IJCNN |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Liang Li, Wei-Qiang Jiang, Jie Tian 0001, Yixian Yang, Cai-Ping Jiang, Zhe Wu, Xin Yang 0001 |
A Networking Identity Authentication Scheme Combining Fingerprint Coding and Identity Based Encryption. |
ISI |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Chin-Chen Chang 0001, Chih-Chiang Tsou, Yung-Chen Chou |
A Remediable Image Authentication Scheme Based on Feature Extraction and Clustered VQ. |
PCM |
2007 |
DBLP DOI BibTeX RDF |
quad-tree segmentation, Image authentication, tampering detection |
16 | Zinaida Benenson, Felix C. Freiling, Ernest Hammerschmidt, Stefan Lucks, Lexi Pimenidis |
Authenticated Query Flooding in Sensor Networks. |
SEC |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Seong-Pyo Hong, Jong-An Park, Seung Jo Han, Jae-Young Pyun, Joon Lee |
Design of WLAN Secure System Against Weaknesses of the IEEE 802.1x. |
ICHIT |
2006 |
DBLP DOI BibTeX RDF |
IEEE 802.1x, Privacy, Authentication, Wireless LAN Security |
16 | Ravi Mukkamala, Vijayalakshmi Atluri, Janice Warner, Ranjit Abbadasari |
A Distributed Coalition Service Registry for Ad-Hoc Dynamic Coalitions: A Service-Oriented Approach. (PDF / PS) |
DBSec |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Guomin Yang, Duncan S. Wong, Xiaotie Deng |
Efficient Anonymous Roaming and Its Security Analysis. |
ACNS |
2005 |
DBLP DOI BibTeX RDF |
Anonymous Roaming, Authenticated Key Exchange |
16 | Virgil Griffith, Markus Jakobsson |
Messin' with Texas Deriving Mother's Maiden Names Using Public Records. |
ACNS |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock |
Errors in Computational Complexity Proofs for Protocols. |
ASIACRYPT |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Jun Jiang, Chen He 0001, Ling-ge Jiang |
On the Design of Provably Secure Identity-Based Authentication and Key Exchange Protocol for Heterogeneous Wireless Access. |
ICCNMC |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Daniel J. Bernstein |
The Poly1305-AES Message-Authentication Code. |
FSE |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Shintaro Mizuno, Kohji Yamada, Kenji Takahashi |
Authentication using multiple communication channels. |
Digital Identity Management |
2005 |
DBLP DOI BibTeX RDF |
internet, authentication, mobile phone, multiple channels |
16 | Ying-Han Pang, Andrew Teoh Beng Jin, David Ngo Chek Ling |
Binarized Revocable Biometrics in Face Recognition. |
CIS (2) |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Ying-Han Pang, Andrew Teoh Beng Jin, David Ngo Chek Ling |
A Robust Face Recognition System. |
Australian Conference on Artificial Intelligence |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Tee Connie, Andrew Teoh Beng Jin, Michael Goh Kah Ong, David Ngo Chek Ling |
PalmHashing: a novel approach for dual-factor authentication. |
Pattern Anal. Appl. |
2004 |
DBLP DOI BibTeX RDF |
PalmHash, Security, Biometric, Token, Palmprint recognition, Two-factor authenticators |
16 | Yang Zhao, Patrizio Campisi, Deepa Kundur |
Dual domain watermarking for authentication and compression of cultural heritage image. |
IEEE Trans. Image Process. |
2004 |
DBLP DOI BibTeX RDF |
|
16 | Erik Anderson, Cheryl L. Beaver, Timothy Draelos, Richard Schroeppel, Mark Torgerson |
ManTiCore: Encryption with Joint Cipher-State Authentication. |
ACISP |
2004 |
DBLP DOI BibTeX RDF |
Encryption Mode, Inexpensive Authentication, Luby-Rackoff, Feistel, Middletext, Hash, Cipher |
16 | Mi-Ae Kim, Geun-Sil Song, Won-Hyung Lee |
A Robust Image Authentication Method Surviving Acceptable Modifications. |
ICCSA (1) |
2004 |
DBLP DOI BibTeX RDF |
|
16 | Simson L. Garfinkel |
Email-Based Identification and Authentication: An Alternative to PKI? |
IEEE Secur. Priv. |
2003 |
DBLP DOI BibTeX RDF |
EBIA, Email Security, Social Security Numbers (SSNs), PKI, Identity Theft |
16 | Michelle S. Wangham, Joni da Silva Fraga, Rafael R. Obelheiro, Galeno A. Jung, Elizabeth Fernandes 0001 |
Security Mechanisms for Mobile Agent Platforms Based on SPKI/SDSI Chains of Trust. |
SELMAS |
2003 |
DBLP DOI BibTeX RDF |
|
16 | Michelle S. Wangham, Joni da Silva Fraga, Rafael R. Obelheiro |
A Security Scheme for Mobile Agent Platforms in Large-Scale Systems. |
Communications and Multimedia Security |
2003 |
DBLP DOI BibTeX RDF |
|
16 | Alwyn Goh, Geong Sen Poh, David Ngo Chek Ling |
Loss-Tolerant Stream Authentication via Configurable Integration of One-Time Signatures and Hash-Graphs. |
Communications and Multimedia Security |
2003 |
DBLP DOI BibTeX RDF |
|
16 | Tero Alamäki, Margareta Björksten, Péter Dornbach, Casper Gripenberg, Norbert Gyorbíró, Gábor Márton, Zoltán Németh, Timo Skyttä, Mikko Tarkiainen |
Privacy Enhancing Service Architectures. |
Privacy Enhancing Technologies |
2002 |
DBLP DOI BibTeX RDF |
|
16 | Ching-Yung Lin, Shih-Fu Chang |
SARI: self-authentication-and-recovery image watermarking system. |
ACM Multimedia |
2001 |
DBLP DOI BibTeX RDF |
authentication, watermarking, recovery, information hiding, multimedia security |
16 | Maria Grazia Albanesi, Marco Ferretti, Federico Guerrini |
A Taxonomy for Image Authentication Techniques and its Application to the Current State of the Art. |
ICIAP |
2001 |
DBLP DOI BibTeX RDF |
|
16 | Reihaneh Safavi-Naini, Huaxiong Wang, Chaoping Xing |
Linear Authentication Codes: Bounds and Constructions. |
INDOCRYPT |
2001 |
DBLP DOI BibTeX RDF |
Linear Authentication Codes, Distributed Authentication Codes, Authentication Codes |
16 | Stuart E. Schechter, Todd Parnell, Alexander J. Hartemink |
Anonymous Authentication of Membership in Dynamic Groups. |
Financial Cryptography |
1999 |
DBLP DOI BibTeX RDF |
key replacement, verifiably common secret encoding, authentication, anonymity, identification |
16 | Stefan Wolf 0001 |
Strong Security Against Active Attacks in Information-Theoretic Secret-Key Agreement. |
ASIACRYPT |
1998 |
DBLP DOI BibTeX RDF |
unconditional secrecy, authentication, information theory, privacy amplification, Secret-key agreement |