The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for impersonation with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1987-1994 (16) 1996-2002 (21) 2003-2004 (20) 2005 (29) 2006 (26) 2007 (25) 2008 (26) 2009 (33) 2010-2013 (18) 2014-2015 (16) 2016-2017 (16) 2018 (16) 2019-2020 (27) 2021-2022 (31) 2023-2024 (15)
Publication types (Num. hits)
article(89) incollection(2) inproceedings(241) phdthesis(3)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 236 occurrences of 133 keywords

Results
Found 335 publication records. Showing 335 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
68Maurizio Adriano Strangio On the Resilience of Key Agreement Protocols to Key Compromise Impersonation. Search on Bibsonomy EuroPKI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF key agreement protocols, key compromise impersonation
68Mark F. Vilardo Online Impersonation in Securities Scams. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF SEC, Securities and Exchange Commission, digital identity, fraud, impersonation
58Ronald Cramer, Ivan Damgård Fast and Secure Immunization Against Adaptive Man-in-the-Middle Impersonation. Search on Bibsonomy EUROCRYPT The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
55M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Group Key Exchange, Insider Attacks, Key Compromise Impersonation
55Reiner Dojen, Vladimir Pasca, Tom Coffey Impersonation Attacks on a Mobile Security Protocol for End-to-End Communications. Search on Bibsonomy MobiSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Mobile end-to-end communication, analysis of security protocols, authentication and secrecy protocol, impersonation attack
50Wei-Min Shi ID-Based Non-interactive Deniable Authentication Protocol. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
47Kevser Karaca, Albert Levi Towards a framework for security analysis of multiple password schemes. Search on Bibsonomy EUROSEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF multiple passwords, security analysis, password based authentication, impersonation
47Youngsook Lee, Junghyun Nam, Dongho Won Vulnerabilities in a Remote Agent Authentication Scheme Using Smart Cards. Search on Bibsonomy KES-AMSTA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF distributed system, smart card, impersonation attack, authentication scheme
47Eun-Jun Yoon, Kee-Young Yoo Improvement of an Efficient User Identification Scheme Based on ID-Based Cryptosystem. Search on Bibsonomy EUC Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Security, Mobile network, Impersonation attack, Identity-based cryptosystem, User identification
47Claus-Peter Schnorr Security of 2^t-Root Identification and Signatures. Search on Bibsonomy CRYPTO The full citation details ... 1996 DBLP  DOI  BibTeX  RDF Fiat-Shamir scheme, active/passive impersonation attacks, adaptive chosen-message attack, factoring of integers, Identification, signature, random oracle model
46Michael Okun On the Power of Impersonation Attacks. Search on Bibsonomy DISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
46Michel Barbeau, Jeyanthi Hall, Evangelos Kranakis Detecting Impersonation Attacks in Future Wireless and Mobile Networks. Search on Bibsonomy MADNES The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
46Mihir Bellare, Adriana Palacio GQ and Schnorr Identification Schemes: Proofs of Security against Impersonation under Active and Concurrent Attacks. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
42Michele Campobasso, Luca Allodi Impersonation-as-a-Service: Characterizing the Emerging Criminal Infrastructure for User Impersonation at Scale. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
42Michele Campobasso, Luca Allodi Impersonation-as-a-Service: Characterizing the Emerging Criminal Infrastructure for User Impersonation at Scale. Search on Bibsonomy CCS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
37Boris Danev, Heinrich Luecken, Srdjan Capkun, Karim M. El Defrawy Attacks on physical-layer identification. Search on Bibsonomy WISEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF identification, attacks, wireless security, physical layer
37Giovanni Di Crescenzo On the Security of Beth's Identification Schemes against Active and Concurrent Adversaries. Search on Bibsonomy MMICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Soohyun Oh, Jin Kwak, Seungwoo Lee, Dongho Won Security Analysis and Applications of Standard Key Agreement Protocols. Search on Bibsonomy ICCSA (2) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
35Youngsook Lee, Dongho Won Enhancing of a Password-Based Authentication Scheme Using Smart Cards. Search on Bibsonomy OTM Conferences (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF two-factor security, smart card, dictionary attack, impersonation attack, Authentication scheme
35Youngsook Lee, Dongho Won Security Vulnerabilities of a Remote User Authentication Scheme Using Smart Cards Suited for a Multi-server Environment. Search on Bibsonomy ICCSA (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF multi-server environments, remote user authentication scheme, smart card, impersonation attack, password security, password guessing attack
35Ivan Martinovic, Frank A. Zdarsky, Matthias Wilhelm 0001, Christian Wegmann, Jens B. Schmitt Wireless client puzzles in IEEE 802.11 networks: security by wireless. Search on Bibsonomy WISEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF denial-of-service (DoS), wireless security, impersonation attacks, client puzzles
35Konstantinos Chalkias, Spyros T. Halkidis, Dimitrios Hristu-Varsakelis, George Stephanides, Anastasios Alexiadis A Provably Secure One-Pass Two-Party Key Establishment Protocol. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF One-pass protocols, two-party key agreement, loss of information, key-compromise impersonation
35Eun-Jun Yoon, Kee-Young Yoo Improving the ID-Based Key Exchange Protocol in Wireless Mobile Ad Hoc Networks. Search on Bibsonomy ADHOC-NOW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Wireless mobile, Ad hoc networks, Cryptography, Network security, Key exchange, ID-based, Impersonation attack
35Ik Rae Jeong, Jeong Ok Kwon, Dong Hoon Lee 0001 A Diffie-Hellman Key Exchange Protocol Without Random Oracles. Search on Bibsonomy CANS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Diffie-Hellman protocol, Strong forward secrecy, Unknown key share, Key exchange, Key compromise impersonation
33Mete Akgün, M. Ufuk Çaglayan, Emin Anarim A new RFID authentication protocol with resistance to server impersonation. Search on Bibsonomy IPDPS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
33Xavier Boyen HPAKE : Password Authentication Secure against Cross-Site User Impersonation. Search on Bibsonomy CANS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
33Bartlomiej Sieka Using Radio Device Fingerprinting for the Detection of Impersonation and Sybil Attacks in Wireless Networks. Search on Bibsonomy ESAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
33Dimitris Glynos, Panayiotis Kotzanikolaou, Christos Douligeris Preventing Impersonation Attacks in MANET with Multi-Factor Authentication. Search on Bibsonomy WiOpt The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
33Lihua Wang 0001, Takeshi Okamoto, Tsuyoshi Takagi, Eiji Okamoto Insider Impersonation-MIM Attack to Tripartite Key Agreement Scheme and an Efficient Protocol for Multiple Keys. Search on Bibsonomy CIS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
25Yanping Li, Liaojun Pang, Yuming Wang Attacks on a Universal Designated Verifier Signature Scheme. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
25Wenting Jin, Jing Xu 0002 An Efficient and Provably Secure Cross-Realm Client-to-Client Password-Authenticated Key Agreement Protocol with Smart Cards. Search on Bibsonomy CANS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Password-authenticated key agreement, Client-to-client, Smart cards, Provable security, Cross-realm
25Shaoying Cai, Yingjiu Li, Tieyan Li, Robert H. Deng Attacks and improvements to an RIFD mutual authentication protocol and its extensions. Search on Bibsonomy WISEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF security, privacy, authentication, rfid
25Alfred Menezes, Berkant Ustaoglu Security arguments for the UM key agreement protocol in the NIST SP 800-56A standard. Search on Bibsonomy AsiaCCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF NIST SP 800-56A, provable security, security models, key agreement protocols
25Hyun Seok Kim, Seok Seo, Jin-Young Choi Weaknesses Analysis and Countermeasure of a Verifier-Based Key Agreement Protocol. Search on Bibsonomy HPCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
25Meng-Hui Lim, Sanggon Lee, Hoonjae Lee 0001 Cryptanalytic Flaws in Oh et al.'s ID-Based Authenticated Key Agreement Protocol. Search on Bibsonomy ICCSA (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
25Davrondzhon Gafurov, Einar Snekkenes, Patrick Bours Spoof Attacks on Gait Authentication System. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
25Oleksiy Mazhelis, Seppo Puuronen, Mika Raento Evaluating Classifiers for Mobile-Masquerader Detection. Search on Bibsonomy SEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
25Wenbo Shi, Hyeong Seon Yoo Efficient Nonce-Based Authentication Scheme Using Token-Update. Search on Bibsonomy ICCSA (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
25Yukio Itakura, Shigeo Tsujii Proposal on a multifactor biometric authentication method based on cryptosystem keys containing biometric signatures. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Biological information, Authentication security, Biometrics-cryptographic key, Public-key cryptography, Personal identification
25Eun-Jun Yoon, Kee-Young Yoo A New Efficient Fingerprint-Based Remote User Authentication Scheme for Multimedia Systems. Search on Bibsonomy KES (3) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Security techniques, Multimedia, Biometrics, Smart card, User authentication, Fingerprint verification
25Kaoru Kurosawa, Swee-Huay Heng Identity-Based Identification Without Random Oracles. Search on Bibsonomy ICCSA (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF ID-based cryptography, identification scheme
25Goce Jakimoski Unconditionally Secure Information Authentication in Presence of Erasures. Search on Bibsonomy IMACC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF erasure- resilient codes, erasure-tolerant authentication, message authentication, authentication codes
25Shengbao Wang, Zhenfu Cao, Haiyong Bao Security of an Efficient ID-Based Authenticated Key Agreement Protocol from Pairings. Search on Bibsonomy ISPA Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
25Eun-Jun Yoon, Kee-Young Yoo New Authentication Scheme Based on a One-Way Hash Function and Diffie-Hellman Key Exchange. Search on Bibsonomy CANS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Authentication, Smart card, Password, Guessing attack
25Xinghua Li 0001, Jianfeng Ma 0001, Sang-Jae Moon On the Security of the Canetti-Krawczyk Model. Search on Bibsonomy CIS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
25Bi-Hui Chen Improvement of authenaticated multiple-key agreement protocol. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF multiple-key, authenticated, key agreement
25Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo Robust Remote User Authentication Scheme. Search on Bibsonomy ICOIN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
25Yvo Desmedt, Moti Yung Abritrated Unconditionally Secure Authentication Can Be Unconditionally Protected Against Arbiter's Attacks (Extended Abstract). Search on Bibsonomy CRYPTO The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
25Andrea Sgarro Informational Divergence Bounds for Authentication Codes. Search on Bibsonomy EUROCRYPT The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
22Raphael C.-W. Phan, Wei-Chuen Yau, Bok-Min Goi Analysis of Two Pairing-Based Three-Party Password Authenticated Key Exchange Protocols. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF three-party, cryptanalysis, provable security, attacks, Weil pairing, Password-authenticated key exchange, key compromise impersonation
22Akiko Orita, Hisakazu Hada Is that really you?: an approach to assure identity without revealing real-name online. Search on Bibsonomy Digital Identity Management The full citation details ... 2009 DBLP  DOI  BibTeX  RDF anonymity, identity, twitter, identity theft, linkability, impersonation
22Hung-Yu Chien, Tzong-Chen Wu Highly Efficient Password-Based Three-Party Key Exchange in Random Oracle Model. Search on Bibsonomy ISI Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF authentication, key agreement, random oracle, impersonation attack, guessing attack
22David R. Hill Speaker Classification Concepts: Past, Present and Future. Search on Bibsonomy Speaker Classification (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF voice morphing, socio-phonetics, speech forensics, speech research tools, speech segments, speech prosody, formant sensitivity analysis, dialogue dynamics, gnuspeech, face recognition, rhythm, emotional intelligence, intonation, speaker classification, mimicry, impersonation
22Ivan Martinovic, Frank A. Zdarsky, Jens B. Schmitt Regional-based authentication against dos attacks in wireless networks. Search on Bibsonomy Q2SWinet The full citation details ... 2007 DBLP  DOI  BibTeX  RDF denial-of-service (DoS) attacks, wireless LAN, impersonation attacks
22Haifeng Qian, Zhenfu Cao, Lichen Wang, Qingshui Xue Efficient Non-interactive Deniable Authentication Protocols. Search on Bibsonomy CIT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Tight security, Authentication, Digital signature, MAC, Deniablity, Impersonation attack, Trapdoor permutations
22Kyungah Shim The Risks of Compromising Secret Information. Search on Bibsonomy ICICS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Authenticated key agreement protocol, insider, known-key attack, key-compromise impersonation attack
21Fengfan Zhou, Heifei Ling PPR: Enhancing Dodging Attacks while Maintaining Impersonation Attacks on Face Recognition Systems. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
21Ahmed Elshafee, Walid El-Shafai Design and analysis of data link impersonation attack for wired LAN application layer services. Search on Bibsonomy J. Ambient Intell. Humaniz. Comput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
21Roberto Gallardo-Cava, David Ortega-delCampo, Julio Guillen-Garcia, Daniel Palacios-Alonso, Cristina Conde Creating Realistic Presentation Attacks for Facial Impersonation Step-by-Step. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
21Alok Kumar Shukla Detecting impersonation episode using teaching learning-based optimization and support vector machine techniques. Search on Bibsonomy Expert Syst. J. Knowl. Eng. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
21Nmachi Peace Wosah A framework for securing email entrances and mitigating phishing impersonation attacks. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
21Leonard Salewski, Stephan Alaniz, Isabel Rio-Torto, Eric Schulz, Zeynep Akata In-Context Impersonation Reveals Large Language Models' Strengths and Biases. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
21Michele Campobasso, Luca Allodi Know Your Cybercriminal: Evaluating Attacker Preferences by Measuring Profile Sales on an Active, Leading Criminal Market for User Impersonation at Scale. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
21Zhanwen Chen, Kazumasa Omote Preventing SNS Impersonation: A Blockchain-Based Approach. Search on Bibsonomy IEICE Trans. Inf. Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
21Rajeev Rajan, Noumida Abdul Kareem, Sreelakshmi S Paraconsistent Feature Analysis for the Competency Evaluation of Voice Impersonation. Search on Bibsonomy ASRU The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
21Manuel Barbosa, André Cirne, Luís Esquível Rogue key and impersonation attacks on FIDO2: From theory to practice. Search on Bibsonomy ARES The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
21Giovanni Graziano, Daniele Ucci, Federica Bisio, Luca Oneto PhishVision: A Deep Learning Based Visual Brand Impersonation Detector for Identifying Phishing Attacks. Search on Bibsonomy OL2A (1) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
21Michele Campobasso, Luca Allodi Know Your Cybercriminal: Evaluating Attacker Preferences by Measuring Profile Sales on an Active, Leading Criminal Market for User Impersonation at Scale. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2023 DBLP  BibTeX  RDF
21Rajaa Alqudah, Mohammed Al-Qaisi, Rakan Ammari, Yazan Abu Ta'a OSINT-Based Tool for Social Media User Impersonation Detection Through Machine Learning. Search on Bibsonomy ICIT The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
21Leonard Salewski, Stephan Alaniz, Isabel Rio-Torto, Eric Schulz, Zeynep Akata In-Context Impersonation Reveals Large Language Models' Strengths and Biases. Search on Bibsonomy NeurIPS The full citation details ... 2023 DBLP  BibTeX  RDF
21Victor Adriel de Jesus Oliveira, Gernot Rottermanner, Magdalena Boucher, Stefanie Größbacher, Peter Judmaier, Werner Bailer, Georg Thallinger, Thomas Kurz, Jakob Frank, Christoph Bauer, Gabriele Fröschl, Michael Batlogg Taylor - Impersonation of AI for Audiovisual Content Documentation and Search. Search on Bibsonomy MMM (2) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
21Zhanwen Chen, Jiageng Chen, Weizhi Meng 0001 Threshold identity authentication signature: Impersonation prevention in social network services. Search on Bibsonomy Concurr. Comput. Pract. Exp. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
21Nam Yul Yu Performance Analysis of Signature-Based Grant-Free Random Access Under Impersonation Attacks. Search on Bibsonomy IEEE Access The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
21Wenbin Huang, Wenjuan Tang, Hongbo Jiang 0001, Jun Luo 0001, Yaoxue Zhang Stop Deceiving! An Effective Defense Scheme Against Voice Impersonation Attacks on Smart Devices. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
21Yanrong Lu, Dawei Zhao Providing impersonation resistance for biometric-based authentication scheme in mobile cloud computing service. Search on Bibsonomy Comput. Commun. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
21Huimin Ren, Suhyun Kim, Daehee Seo, Imyeong Lee A Certificateless-based One-Round Authenticated Group Key Agreement Protocol to Prevent Impersonation Attacks. Search on Bibsonomy KSII Trans. Internet Inf. Syst. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
21Xiaoliang Liu, Furao Shen, Jian Zhao 0013, Changhai Nie RSTAM: An Effective Black-Box Impersonation Attack on Face Recognition using a Mobile and Compact Printer. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
21Xin Na, Xiuzhen Guo, Yuan He 0004, Rui Xi Wi-attack: Cross-technology Impersonation Attack against iBeacon Services. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
21Paul Zanna, Dinesh Kumar, Pj Radcliffe Detecting IEEE 802.11 Client Device Impersonation on a Wireless Access Point. Search on Bibsonomy J. Commun. Inf. Networks The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
21Gabriel Mariano de Castro SIlva, Jaime Simão Sichman Impersonation fraud detection on building access control systems: An approach based on anomalous social and spatio-temporal behaviors. Search on Bibsonomy Appl. Soft Comput. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
21Anne Bumiller, Olivier Barais, Nicolas Aillery, Gaël Le Lan Towards a Better Understanding of Impersonation Risks. Search on Bibsonomy SIN The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
21Aiming Wu, Shanshan Tu, Junwei Liu, Yihe Zhang, Yongjie Yang 0007, Xuetao Bai Detection Scheme of Impersonation Attack Based on Sarsa(Lambda) Algorithm in Fog Computing. Search on Bibsonomy ICCNS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
21Shahroz Tariq, Sowon Jeon, Simon S. Woo Am I a Real or Fake Celebrity? Evaluating Face Recognition and Verification APIs under Deepfake Impersonation Attack. Search on Bibsonomy WWW The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
21Yuxuan Xu, Ming Liu 0010, Linning Peng, Junqing Zhang, Yawen Zheng Colluding RF Fingerprint Impersonation Attack Based on Generative Adversarial Network. Search on Bibsonomy ICC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
21Zhiqiang Ma, Jun He Outsider Key Compromise Impersonation Attack on a Multi-factor Authenticated Key Exchange Protocol. Search on Bibsonomy ACNS Workshops The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
21Dinh Duc Nha Nguyen, Keshav Sood, Yong Xiang 0001, Longxiang Gao, Lianhua Chi Impersonation Attack Detection in IoT Networks. Search on Bibsonomy GLOBECOM The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
21Jack Sturgess, Simon Eberz, Ivo Sluganovic, Ivan Martinovic Inferring User Height and Improving Impersonation Attacks in Mobile Payments using a Smartwatch. Search on Bibsonomy PerCom Workshops The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
21Chatri Chuangulueam, Boonserm Kijsirikul, Nuttakorn Thubthong Voice Impersonation for Thai Speech Using CycleGAN over Prosody. Search on Bibsonomy MSIE The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
21Felipe Boeira, Mikael Asplund, Marinho P. Barcellos No Doppelgänger: Advancing Mobile Networks Against Impersonation in Adversarial Scenarios. Search on Bibsonomy WISEC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
21Shanshan Tu, Muhammad Waqas 0001, Sadaqat ur Rehman, Talha Mir, Ghulam Abbas 0002, Ziaul Haq Abbas, Zahid Halim, Iftekhar Ahmad Reinforcement Learning Assisted Impersonation Attack Detection in Device-to-Device Communications. Search on Bibsonomy IEEE Trans. Veh. Technol. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
21Wei Guo, Benedetta Tondi, Mauro Barni A Master Key backdoor for universal impersonation attack against DNN-based face verification. Search on Bibsonomy Pattern Recognit. Lett. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
21Inam ul Haq, Jian Wang 0038, Youwen Zhu, Saad Maqbool An efficient hash-based authenticated key agreement scheme for multi-server architecture resilient to key compromise impersonation. Search on Bibsonomy Digit. Commun. Networks The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
21Ting Chen, Xinghua Li 0001, Qingfeng Cheng An enhanced key exchange protocol exhibiting key compromise impersonation attacks resistance in mobile commerce environment. Search on Bibsonomy Sci. China Inf. Sci. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
21Wei Guo, Benedetta Tondi, Mauro Barni A Master Key Backdoor for Universal Impersonation Attack against DNN-based Face Verification. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
21Shahroz Tariq, Sowon Jeon, Simon S. Woo Am I a Real or Fake Celebrity? Measuring Commercial Face Recognition Web APIs under Deepfake Impersonation Attack. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
21Hisham A. Kholidy Detecting impersonation attacks in cloud computing environments using a centric user profiling approach. Search on Bibsonomy Future Gener. Comput. Syst. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
21Osnat Mokryn, Hagit Ben-Shoshan Domain-based Latent Personal Analysis and its use for impersonation detection in social media. Search on Bibsonomy User Model. User Adapt. Interact. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
21Taotao Li, Zhen Hong, Lisong Liu, Zhenyu Wen, Li Yu 0001 Meta-WF: Meta-Learning-Based Few-Shot Wireless Impersonation Detection for Wi-Fi Networks. Search on Bibsonomy IEEE Commun. Lett. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
21Md. Morshedul Islam, Reihaneh Safavi-Naini Model Inversion for Impersonation in Behavioral Authentication Systems. Search on Bibsonomy SECRYPT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
21Xin Na, Xiuzhen Guo, Yuan He 0004, Rui Xi Wi-attack: Cross-technology Impersonation Attack against iBeacon Services. Search on Bibsonomy SECON The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 335 (100 per page; Change: )
Pages: [1][2][3][4][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license