Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
68 | Maurizio Adriano Strangio |
On the Resilience of Key Agreement Protocols to Key Compromise Impersonation. |
EuroPKI |
2006 |
DBLP DOI BibTeX RDF |
key agreement protocols, key compromise impersonation |
68 | Mark F. Vilardo |
Online Impersonation in Securities Scams. |
IEEE Secur. Priv. |
2004 |
DBLP DOI BibTeX RDF |
SEC, Securities and Exchange Commission, digital identity, fraud, impersonation |
58 | Ronald Cramer, Ivan Damgård |
Fast and Secure Immunization Against Adaptive Man-in-the-Middle Impersonation. |
EUROCRYPT |
1997 |
DBLP DOI BibTeX RDF |
|
55 | M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto |
Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols. |
Public Key Cryptography |
2009 |
DBLP DOI BibTeX RDF |
Group Key Exchange, Insider Attacks, Key Compromise Impersonation |
55 | Reiner Dojen, Vladimir Pasca, Tom Coffey |
Impersonation Attacks on a Mobile Security Protocol for End-to-End Communications. |
MobiSec |
2009 |
DBLP DOI BibTeX RDF |
Mobile end-to-end communication, analysis of security protocols, authentication and secrecy protocol, impersonation attack |
50 | Wei-Min Shi |
ID-Based Non-interactive Deniable Authentication Protocol. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
47 | Kevser Karaca, Albert Levi |
Towards a framework for security analysis of multiple password schemes. |
EUROSEC |
2008 |
DBLP DOI BibTeX RDF |
multiple passwords, security analysis, password based authentication, impersonation |
47 | Youngsook Lee, Junghyun Nam, Dongho Won |
Vulnerabilities in a Remote Agent Authentication Scheme Using Smart Cards. |
KES-AMSTA |
2008 |
DBLP DOI BibTeX RDF |
distributed system, smart card, impersonation attack, authentication scheme |
47 | Eun-Jun Yoon, Kee-Young Yoo |
Improvement of an Efficient User Identification Scheme Based on ID-Based Cryptosystem. |
EUC Workshops |
2005 |
DBLP DOI BibTeX RDF |
Security, Mobile network, Impersonation attack, Identity-based cryptosystem, User identification |
47 | Claus-Peter Schnorr |
Security of 2^t-Root Identification and Signatures. |
CRYPTO |
1996 |
DBLP DOI BibTeX RDF |
Fiat-Shamir scheme, active/passive impersonation attacks, adaptive chosen-message attack, factoring of integers, Identification, signature, random oracle model |
46 | Michael Okun |
On the Power of Impersonation Attacks. |
DISC |
2007 |
DBLP DOI BibTeX RDF |
|
46 | Michel Barbeau, Jeyanthi Hall, Evangelos Kranakis |
Detecting Impersonation Attacks in Future Wireless and Mobile Networks. |
MADNES |
2005 |
DBLP DOI BibTeX RDF |
|
46 | Mihir Bellare, Adriana Palacio |
GQ and Schnorr Identification Schemes: Proofs of Security against Impersonation under Active and Concurrent Attacks. |
CRYPTO |
2002 |
DBLP DOI BibTeX RDF |
|
42 | Michele Campobasso, Luca Allodi |
Impersonation-as-a-Service: Characterizing the Emerging Criminal Infrastructure for User Impersonation at Scale. |
CoRR |
2020 |
DBLP BibTeX RDF |
|
42 | Michele Campobasso, Luca Allodi |
Impersonation-as-a-Service: Characterizing the Emerging Criminal Infrastructure for User Impersonation at Scale. |
CCS |
2020 |
DBLP DOI BibTeX RDF |
|
37 | Boris Danev, Heinrich Luecken, Srdjan Capkun, Karim M. El Defrawy |
Attacks on physical-layer identification. |
WISEC |
2010 |
DBLP DOI BibTeX RDF |
identification, attacks, wireless security, physical layer |
37 | Giovanni Di Crescenzo |
On the Security of Beth's Identification Schemes against Active and Concurrent Adversaries. |
MMICS |
2008 |
DBLP DOI BibTeX RDF |
|
37 | Soohyun Oh, Jin Kwak, Seungwoo Lee, Dongho Won |
Security Analysis and Applications of Standard Key Agreement Protocols. |
ICCSA (2) |
2003 |
DBLP DOI BibTeX RDF |
|
35 | Youngsook Lee, Dongho Won |
Enhancing of a Password-Based Authentication Scheme Using Smart Cards. |
OTM Conferences (2) |
2009 |
DBLP DOI BibTeX RDF |
two-factor security, smart card, dictionary attack, impersonation attack, Authentication scheme |
35 | Youngsook Lee, Dongho Won |
Security Vulnerabilities of a Remote User Authentication Scheme Using Smart Cards Suited for a Multi-server Environment. |
ICCSA (2) |
2009 |
DBLP DOI BibTeX RDF |
multi-server environments, remote user authentication scheme, smart card, impersonation attack, password security, password guessing attack |
35 | Ivan Martinovic, Frank A. Zdarsky, Matthias Wilhelm 0001, Christian Wegmann, Jens B. Schmitt |
Wireless client puzzles in IEEE 802.11 networks: security by wireless. |
WISEC |
2008 |
DBLP DOI BibTeX RDF |
denial-of-service (DoS), wireless security, impersonation attacks, client puzzles |
35 | Konstantinos Chalkias, Spyros T. Halkidis, Dimitrios Hristu-Varsakelis, George Stephanides, Anastasios Alexiadis |
A Provably Secure One-Pass Two-Party Key Establishment Protocol. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
One-pass protocols, two-party key agreement, loss of information, key-compromise impersonation |
35 | Eun-Jun Yoon, Kee-Young Yoo |
Improving the ID-Based Key Exchange Protocol in Wireless Mobile Ad Hoc Networks. |
ADHOC-NOW |
2006 |
DBLP DOI BibTeX RDF |
Wireless mobile, Ad hoc networks, Cryptography, Network security, Key exchange, ID-based, Impersonation attack |
35 | Ik Rae Jeong, Jeong Ok Kwon, Dong Hoon Lee 0001 |
A Diffie-Hellman Key Exchange Protocol Without Random Oracles. |
CANS |
2006 |
DBLP DOI BibTeX RDF |
Diffie-Hellman protocol, Strong forward secrecy, Unknown key share, Key exchange, Key compromise impersonation |
33 | Mete Akgün, M. Ufuk Çaglayan, Emin Anarim |
A new RFID authentication protocol with resistance to server impersonation. |
IPDPS |
2009 |
DBLP DOI BibTeX RDF |
|
33 | Xavier Boyen |
HPAKE : Password Authentication Secure against Cross-Site User Impersonation. |
CANS |
2009 |
DBLP DOI BibTeX RDF |
|
33 | Bartlomiej Sieka |
Using Radio Device Fingerprinting for the Detection of Impersonation and Sybil Attacks in Wireless Networks. |
ESAS |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Dimitris Glynos, Panayiotis Kotzanikolaou, Christos Douligeris |
Preventing Impersonation Attacks in MANET with Multi-Factor Authentication. |
WiOpt |
2005 |
DBLP DOI BibTeX RDF |
|
33 | Lihua Wang 0001, Takeshi Okamoto, Tsuyoshi Takagi, Eiji Okamoto |
Insider Impersonation-MIM Attack to Tripartite Key Agreement Scheme and an Efficient Protocol for Multiple Keys. |
CIS (2) |
2005 |
DBLP DOI BibTeX RDF |
|
25 | Yanping Li, Liaojun Pang, Yuming Wang |
Attacks on a Universal Designated Verifier Signature Scheme. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
25 | Wenting Jin, Jing Xu 0002 |
An Efficient and Provably Secure Cross-Realm Client-to-Client Password-Authenticated Key Agreement Protocol with Smart Cards. |
CANS |
2009 |
DBLP DOI BibTeX RDF |
Password-authenticated key agreement, Client-to-client, Smart cards, Provable security, Cross-realm |
25 | Shaoying Cai, Yingjiu Li, Tieyan Li, Robert H. Deng |
Attacks and improvements to an RIFD mutual authentication protocol and its extensions. |
WISEC |
2009 |
DBLP DOI BibTeX RDF |
security, privacy, authentication, rfid |
25 | Alfred Menezes, Berkant Ustaoglu |
Security arguments for the UM key agreement protocol in the NIST SP 800-56A standard. |
AsiaCCS |
2008 |
DBLP DOI BibTeX RDF |
NIST SP 800-56A, provable security, security models, key agreement protocols |
25 | Hyun Seok Kim, Seok Seo, Jin-Young Choi |
Weaknesses Analysis and Countermeasure of a Verifier-Based Key Agreement Protocol. |
HPCC |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Meng-Hui Lim, Sanggon Lee, Hoonjae Lee 0001 |
Cryptanalytic Flaws in Oh et al.'s ID-Based Authenticated Key Agreement Protocol. |
ICCSA (2) |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Davrondzhon Gafurov, Einar Snekkenes, Patrick Bours |
Spoof Attacks on Gait Authentication System. |
IEEE Trans. Inf. Forensics Secur. |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Oleksiy Mazhelis, Seppo Puuronen, Mika Raento |
Evaluating Classifiers for Mobile-Masquerader Detection. |
SEC |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Wenbo Shi, Hyeong Seon Yoo |
Efficient Nonce-Based Authentication Scheme Using Token-Update. |
ICCSA (3) |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Yukio Itakura, Shigeo Tsujii |
Proposal on a multifactor biometric authentication method based on cryptosystem keys containing biometric signatures. |
Int. J. Inf. Sec. |
2005 |
DBLP DOI BibTeX RDF |
Biological information, Authentication security, Biometrics-cryptographic key, Public-key cryptography, Personal identification |
25 | Eun-Jun Yoon, Kee-Young Yoo |
A New Efficient Fingerprint-Based Remote User Authentication Scheme for Multimedia Systems. |
KES (3) |
2005 |
DBLP DOI BibTeX RDF |
Security techniques, Multimedia, Biometrics, Smart card, User authentication, Fingerprint verification |
25 | Kaoru Kurosawa, Swee-Huay Heng |
Identity-Based Identification Without Random Oracles. |
ICCSA (2) |
2005 |
DBLP DOI BibTeX RDF |
ID-based cryptography, identification scheme |
25 | Goce Jakimoski |
Unconditionally Secure Information Authentication in Presence of Erasures. |
IMACC |
2005 |
DBLP DOI BibTeX RDF |
erasure- resilient codes, erasure-tolerant authentication, message authentication, authentication codes |
25 | Shengbao Wang, Zhenfu Cao, Haiyong Bao |
Security of an Efficient ID-Based Authenticated Key Agreement Protocol from Pairings. |
ISPA Workshops |
2005 |
DBLP DOI BibTeX RDF |
|
25 | Eun-Jun Yoon, Kee-Young Yoo |
New Authentication Scheme Based on a One-Way Hash Function and Diffie-Hellman Key Exchange. |
CANS |
2005 |
DBLP DOI BibTeX RDF |
Authentication, Smart card, Password, Guessing attack |
25 | Xinghua Li 0001, Jianfeng Ma 0001, Sang-Jae Moon |
On the Security of the Canetti-Krawczyk Model. |
CIS (2) |
2005 |
DBLP DOI BibTeX RDF |
|
25 | Bi-Hui Chen |
Improvement of authenaticated multiple-key agreement protocol. |
ACM SIGOPS Oper. Syst. Rev. |
2004 |
DBLP DOI BibTeX RDF |
multiple-key, authenticated, key agreement |
25 | Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo |
Robust Remote User Authentication Scheme. |
ICOIN |
2004 |
DBLP DOI BibTeX RDF |
|
25 | Yvo Desmedt, Moti Yung |
Abritrated Unconditionally Secure Authentication Can Be Unconditionally Protected Against Arbiter's Attacks (Extended Abstract). |
CRYPTO |
1990 |
DBLP DOI BibTeX RDF |
|
25 | Andrea Sgarro |
Informational Divergence Bounds for Authentication Codes. |
EUROCRYPT |
1989 |
DBLP DOI BibTeX RDF |
|
22 | Raphael C.-W. Phan, Wei-Chuen Yau, Bok-Min Goi |
Analysis of Two Pairing-Based Three-Party Password Authenticated Key Exchange Protocols. |
NSS |
2009 |
DBLP DOI BibTeX RDF |
three-party, cryptanalysis, provable security, attacks, Weil pairing, Password-authenticated key exchange, key compromise impersonation |
22 | Akiko Orita, Hisakazu Hada |
Is that really you?: an approach to assure identity without revealing real-name online. |
Digital Identity Management |
2009 |
DBLP DOI BibTeX RDF |
anonymity, identity, twitter, identity theft, linkability, impersonation |
22 | Hung-Yu Chien, Tzong-Chen Wu |
Highly Efficient Password-Based Three-Party Key Exchange in Random Oracle Model. |
ISI Workshops |
2008 |
DBLP DOI BibTeX RDF |
authentication, key agreement, random oracle, impersonation attack, guessing attack |
22 | David R. Hill |
Speaker Classification Concepts: Past, Present and Future. |
Speaker Classification (1) |
2007 |
DBLP DOI BibTeX RDF |
voice morphing, socio-phonetics, speech forensics, speech research tools, speech segments, speech prosody, formant sensitivity analysis, dialogue dynamics, gnuspeech, face recognition, rhythm, emotional intelligence, intonation, speaker classification, mimicry, impersonation |
22 | Ivan Martinovic, Frank A. Zdarsky, Jens B. Schmitt |
Regional-based authentication against dos attacks in wireless networks. |
Q2SWinet |
2007 |
DBLP DOI BibTeX RDF |
denial-of-service (DoS) attacks, wireless LAN, impersonation attacks |
22 | Haifeng Qian, Zhenfu Cao, Lichen Wang, Qingshui Xue |
Efficient Non-interactive Deniable Authentication Protocols. |
CIT |
2005 |
DBLP DOI BibTeX RDF |
Tight security, Authentication, Digital signature, MAC, Deniablity, Impersonation attack, Trapdoor permutations |
22 | Kyungah Shim |
The Risks of Compromising Secret Information. |
ICICS |
2002 |
DBLP DOI BibTeX RDF |
Authenticated key agreement protocol, insider, known-key attack, key-compromise impersonation attack |
21 | Fengfan Zhou, Heifei Ling |
PPR: Enhancing Dodging Attacks while Maintaining Impersonation Attacks on Face Recognition Systems. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
21 | Ahmed Elshafee, Walid El-Shafai |
Design and analysis of data link impersonation attack for wired LAN application layer services. |
J. Ambient Intell. Humaniz. Comput. |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Roberto Gallardo-Cava, David Ortega-delCampo, Julio Guillen-Garcia, Daniel Palacios-Alonso, Cristina Conde |
Creating Realistic Presentation Attacks for Facial Impersonation Step-by-Step. |
IEEE Access |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Alok Kumar Shukla |
Detecting impersonation episode using teaching learning-based optimization and support vector machine techniques. |
Expert Syst. J. Knowl. Eng. |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Nmachi Peace Wosah |
A framework for securing email entrances and mitigating phishing impersonation attacks. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Leonard Salewski, Stephan Alaniz, Isabel Rio-Torto, Eric Schulz, Zeynep Akata |
In-Context Impersonation Reveals Large Language Models' Strengths and Biases. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Michele Campobasso, Luca Allodi |
Know Your Cybercriminal: Evaluating Attacker Preferences by Measuring Profile Sales on an Active, Leading Criminal Market for User Impersonation at Scale. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Zhanwen Chen, Kazumasa Omote |
Preventing SNS Impersonation: A Blockchain-Based Approach. |
IEICE Trans. Inf. Syst. |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Rajeev Rajan, Noumida Abdul Kareem, Sreelakshmi S |
Paraconsistent Feature Analysis for the Competency Evaluation of Voice Impersonation. |
ASRU |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Manuel Barbosa, André Cirne, Luís Esquível |
Rogue key and impersonation attacks on FIDO2: From theory to practice. |
ARES |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Giovanni Graziano, Daniele Ucci, Federica Bisio, Luca Oneto |
PhishVision: A Deep Learning Based Visual Brand Impersonation Detector for Identifying Phishing Attacks. |
OL2A (1) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Michele Campobasso, Luca Allodi |
Know Your Cybercriminal: Evaluating Attacker Preferences by Measuring Profile Sales on an Active, Leading Criminal Market for User Impersonation at Scale. |
USENIX Security Symposium |
2023 |
DBLP BibTeX RDF |
|
21 | Rajaa Alqudah, Mohammed Al-Qaisi, Rakan Ammari, Yazan Abu Ta'a |
OSINT-Based Tool for Social Media User Impersonation Detection Through Machine Learning. |
ICIT |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Leonard Salewski, Stephan Alaniz, Isabel Rio-Torto, Eric Schulz, Zeynep Akata |
In-Context Impersonation Reveals Large Language Models' Strengths and Biases. |
NeurIPS |
2023 |
DBLP BibTeX RDF |
|
21 | Victor Adriel de Jesus Oliveira, Gernot Rottermanner, Magdalena Boucher, Stefanie Größbacher, Peter Judmaier, Werner Bailer, Georg Thallinger, Thomas Kurz, Jakob Frank, Christoph Bauer, Gabriele Fröschl, Michael Batlogg |
Taylor - Impersonation of AI for Audiovisual Content Documentation and Search. |
MMM (2) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Zhanwen Chen, Jiageng Chen, Weizhi Meng 0001 |
Threshold identity authentication signature: Impersonation prevention in social network services. |
Concurr. Comput. Pract. Exp. |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Nam Yul Yu |
Performance Analysis of Signature-Based Grant-Free Random Access Under Impersonation Attacks. |
IEEE Access |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Wenbin Huang, Wenjuan Tang, Hongbo Jiang 0001, Jun Luo 0001, Yaoxue Zhang |
Stop Deceiving! An Effective Defense Scheme Against Voice Impersonation Attacks on Smart Devices. |
IEEE Internet Things J. |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Yanrong Lu, Dawei Zhao |
Providing impersonation resistance for biometric-based authentication scheme in mobile cloud computing service. |
Comput. Commun. |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Huimin Ren, Suhyun Kim, Daehee Seo, Imyeong Lee |
A Certificateless-based One-Round Authenticated Group Key Agreement Protocol to Prevent Impersonation Attacks. |
KSII Trans. Internet Inf. Syst. |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Xiaoliang Liu, Furao Shen, Jian Zhao 0013, Changhai Nie |
RSTAM: An Effective Black-Box Impersonation Attack on Face Recognition using a Mobile and Compact Printer. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Xin Na, Xiuzhen Guo, Yuan He 0004, Rui Xi |
Wi-attack: Cross-technology Impersonation Attack against iBeacon Services. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Paul Zanna, Dinesh Kumar, Pj Radcliffe |
Detecting IEEE 802.11 Client Device Impersonation on a Wireless Access Point. |
J. Commun. Inf. Networks |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Gabriel Mariano de Castro SIlva, Jaime Simão Sichman |
Impersonation fraud detection on building access control systems: An approach based on anomalous social and spatio-temporal behaviors. |
Appl. Soft Comput. |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Anne Bumiller, Olivier Barais, Nicolas Aillery, Gaël Le Lan |
Towards a Better Understanding of Impersonation Risks. |
SIN |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Aiming Wu, Shanshan Tu, Junwei Liu, Yihe Zhang, Yongjie Yang 0007, Xuetao Bai |
Detection Scheme of Impersonation Attack Based on Sarsa(Lambda) Algorithm in Fog Computing. |
ICCNS |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Shahroz Tariq, Sowon Jeon, Simon S. Woo |
Am I a Real or Fake Celebrity? Evaluating Face Recognition and Verification APIs under Deepfake Impersonation Attack. |
WWW |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Yuxuan Xu, Ming Liu 0010, Linning Peng, Junqing Zhang, Yawen Zheng |
Colluding RF Fingerprint Impersonation Attack Based on Generative Adversarial Network. |
ICC |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Zhiqiang Ma, Jun He |
Outsider Key Compromise Impersonation Attack on a Multi-factor Authenticated Key Exchange Protocol. |
ACNS Workshops |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Dinh Duc Nha Nguyen, Keshav Sood, Yong Xiang 0001, Longxiang Gao, Lianhua Chi |
Impersonation Attack Detection in IoT Networks. |
GLOBECOM |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Jack Sturgess, Simon Eberz, Ivo Sluganovic, Ivan Martinovic |
Inferring User Height and Improving Impersonation Attacks in Mobile Payments using a Smartwatch. |
PerCom Workshops |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Chatri Chuangulueam, Boonserm Kijsirikul, Nuttakorn Thubthong |
Voice Impersonation for Thai Speech Using CycleGAN over Prosody. |
MSIE |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Felipe Boeira, Mikael Asplund, Marinho P. Barcellos |
No Doppelgänger: Advancing Mobile Networks Against Impersonation in Adversarial Scenarios. |
WISEC |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Shanshan Tu, Muhammad Waqas 0001, Sadaqat ur Rehman, Talha Mir, Ghulam Abbas 0002, Ziaul Haq Abbas, Zahid Halim, Iftekhar Ahmad |
Reinforcement Learning Assisted Impersonation Attack Detection in Device-to-Device Communications. |
IEEE Trans. Veh. Technol. |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Wei Guo, Benedetta Tondi, Mauro Barni |
A Master Key backdoor for universal impersonation attack against DNN-based face verification. |
Pattern Recognit. Lett. |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Inam ul Haq, Jian Wang 0038, Youwen Zhu, Saad Maqbool |
An efficient hash-based authenticated key agreement scheme for multi-server architecture resilient to key compromise impersonation. |
Digit. Commun. Networks |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Ting Chen, Xinghua Li 0001, Qingfeng Cheng |
An enhanced key exchange protocol exhibiting key compromise impersonation attacks resistance in mobile commerce environment. |
Sci. China Inf. Sci. |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Wei Guo, Benedetta Tondi, Mauro Barni |
A Master Key Backdoor for Universal Impersonation Attack against DNN-based Face Verification. |
CoRR |
2021 |
DBLP BibTeX RDF |
|
21 | Shahroz Tariq, Sowon Jeon, Simon S. Woo |
Am I a Real or Fake Celebrity? Measuring Commercial Face Recognition Web APIs under Deepfake Impersonation Attack. |
CoRR |
2021 |
DBLP BibTeX RDF |
|
21 | Hisham A. Kholidy |
Detecting impersonation attacks in cloud computing environments using a centric user profiling approach. |
Future Gener. Comput. Syst. |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Osnat Mokryn, Hagit Ben-Shoshan |
Domain-based Latent Personal Analysis and its use for impersonation detection in social media. |
User Model. User Adapt. Interact. |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Taotao Li, Zhen Hong, Lisong Liu, Zhenyu Wen, Li Yu 0001 |
Meta-WF: Meta-Learning-Based Few-Shot Wireless Impersonation Detection for Wi-Fi Networks. |
IEEE Commun. Lett. |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Md. Morshedul Islam, Reihaneh Safavi-Naini |
Model Inversion for Impersonation in Behavioral Authentication Systems. |
SECRYPT |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Xin Na, Xiuzhen Guo, Yuan He 0004, Rui Xi |
Wi-attack: Cross-technology Impersonation Attack against iBeacon Services. |
SECON |
2021 |
DBLP DOI BibTeX RDF |
|