Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Autenticación")

Filter

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 4579

  • Page / 184
Export

Selection :

  • and

Attacks on port knocking authentication mechanismIZQUIERDO MANZANARES, Antonio; MARQUEZ, Joaquin Torres; ESTEVEZ-TAPIADOR, Juan M et al.Lecture notes in computer science. 2005, issn 0302-9743, isbn 3-540-25860-4, 4Vol, part IV, 1292-1300Conference Paper

Identity escrowKILIAN, J; PETRANK, E.Lecture notes in computer science. 1998, pp 169-185, issn 0302-9743, isbn 3-540-64892-5Conference Paper

From unpredictability to indistinguishability : A simple construction of pseudo-random functions from MACsNAOR, M; REINGOLD, O.Lecture notes in computer science. 1998, pp 267-282, issn 0302-9743, isbn 3-540-64892-5Conference Paper

Roman Methods of Authentication in the First Two Centuries ADHAIGHTON, Angela.Journal of the Society of Archivists. 2010, Vol 31, Num 1, pp 29-49, issn 0037-9816, 21 p.Article

Constructing VIL-MACs from FIL-MACs : Message authentication under weakened assumptionsJEE HE AAN; BELLARE, M.Lecture notes in computer science. 1999, pp 252-269, issn 0302-9743, isbn 3-540-66347-9Conference Paper

An Improved Efficient Secret Handshakes Scheme with UnlinkabilityJIE GU; ZHI XUE.IEEE communications letters. 2011, Vol 15, Num 2, pp 259-261, issn 1089-7798, 3 p.Article

A unified authentication framework for JPEG2000ZHISHOU ZHANG; GANG QIU; QIBIN SUN et al.IEEE International Conference on multimedia. 2004, isbn 0-7803-8603-5, 3Vol, vol2, 915-918Conference Paper

The right place at the right timeGOODELL, Geoffrey; SYVERSON, Paul.Communications of the ACM. 2007, Vol 50, Num 5, pp 113-117, issn 0001-0782, 5 p.Article

Cryptanalysis and improvement of signcryption schemesPETERSEN, H; MICHELS, M.IEE proceedings. Computers and digital techniques. 1998, Vol 145, Num 2, pp 149-151, issn 1350-2387Article

Cognitive biometrics: a novel approach to person authenticationREVETT, Kenneth.International journal of cognitive biometrics (Print). 2012, Vol 1, Num 1, pp 1-9, issn 2042-6461, 9 p.Article

A novel remote user authentication scheme using interacting neural networkTIEMING CHEN; JIAMEI CAI.Lecture notes in computer science. 2005, issn 0302-9743, isbn 3-540-28323-4, 3Vol, Part 1, 1117-1120Conference Paper

The polyl305-AES message-authentication codeBERNSTEIN, Daniel J.Lecture notes in computer science. 2005, pp 32-49, issn 0302-9743, isbn 3-540-26541-4, 18 p.Conference Paper

Improved authentication key exchange protocol without using one-way hash functionLEE, Narn-Yih; WU, Chien-Nan.Operating systems review. 2004, Vol 38, Num 2, pp 85-92, issn 0163-5980, 8 p.Article

Progressive verification: The case of message authenticationFISCHLIN, Marc.Lecture notes in computer science. 2003, pp 416-429, issn 0302-9743, isbn 3-540-20609-4, 14 p.Conference Paper

Dynamic group Diffie-Hellman key exchange under standard assumptionsBRESSON, Emmanuel; CHEVASSUT, Olivier; POINTCHEVAL, David et al.Lecture notes in computer science. 2002, pp 321-336, issn 0302-9743, isbn 3-540-43553-0Conference Paper

Biometric authentication in infrastructure securityARMINGTON, John; HO, Purdy; KOZNEK, Paul et al.Lecture notes in computer science. 2002, pp 1-18, issn 0302-9743, isbn 3-540-44309-6, 18 p.Conference Paper

An authorization framework for a Grid based component architectureRAMAKRISHNAN, Lavanya; REHN, Helen; HAMPTON, Shawn et al.Lecture notes in computer science. 2002, pp 169-180, issn 0302-9743, isbn 3-540-00133-6, 12 p.Conference Paper

Universally composable notions of key exchange and secure channelsCANETTI, Ran; KRAWCZYK, Hugo.Lecture notes in computer science. 2002, pp 337-351, issn 0302-9743, isbn 3-540-43553-0Conference Paper

Holography : You'll never (again) walk aloneLANCASTER, Ian M; KONTNIK, Lewis T.SPIE proceedings series. 2000, pp 190-195, isbn 0-8194-3591-0Conference Paper

Inter-protocol interleaving attacks on some authentication and key distribution protocolsTZENG, W.-G; HU, C.-M.Information processing letters. 1999, Vol 69, Num 6, pp 297-302, issn 0020-0190Article

Evidence and non-repudiationJIANYING ZHOU; GOLLMANN, D.Journal of network and computer applications. 1997, Vol 20, Num 3, pp 267-281, issn 1084-8045Article

A robust image authentication method surviving JPEG lossy compressionLIN, C.-Y; CHANG, S.-F.SPIE proceedings series. 1997, Vol 3312, pp 296-307, isbn 0-8194-2752-7Conference Paper

A System to Transcribe Documents in European Languages with Human HelpCHITYALA, Ravishankar; PUDIPEDDI, Sridevi.Image processing, computer vision, & pattern recognition. International conferenceWorldComp'2011. 2011, pp 930-933, isbn 1-60132-189-9 1-60132-190-2 1-60132-191-0, 4 p.Conference Paper

Holographic codes and object authenticationFOURNEL, Thierry.Proceedings of SPIE, the International Society for Optical Engineering. 2009, Vol 7329, issn 0277-786X, isbn 978-0-8194-7595-4 0-8194-7595-5, 1Vol, 73290M.1-73290M.7Conference Paper

Use and efficacy of DOVIDs and other optical security devicesLANCASTER, Ian M.Proceedings of SPIE, the International Society for Optical Engineering. 2006, pp 60750O.1-60750O.7, issn 0277-786X, isbn 0-8194-6115-6, 1VolConference Paper

  • Page / 184