Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Authentication")

Filter

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Origin

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 6626

  • Page / 266
Export

Selection :

  • and

Probability to meet in the middleNISHIMURA, K; SIBUYA, M.Journal of cryptology. 1990, Vol 2, Num 1, pp 13-22, issn 0933-2790, 10 p.Article

Authentication and revocation in SPM extended abstractCALVELLI, C; VIJAY VARADHARAJAN.Operating systems review. 1993, Vol 27, Num 4, pp 42-57, issn 0163-5980Article

Cryptanalysis of the modified authenticated key agreement schemeLEE, Keon-Jik; LEE, Byeong-Jik.Applied mathematics and computation. 2005, Vol 170, Num 1, pp 280-284, issn 0096-3003, 5 p.Article

Cryptanalysis of a suite of deniable authentication protocolsZHU, Robert W; WONG, Duncan S; LEE, Chan H et al.IEEE communications letters. 2006, Vol 10, Num 6, pp 504-506, issn 1089-7798, 3 p.Article

An analysis of the 3gpp-MAC schemeKNUDSEN, Lars R; MITCHELL, Chris J.Journées internationales codage et cryptographie. 2001, pp 319-328, isbn 2-7261-1179-3Conference Paper

Progressive verification: The case of message authenticationFISCHLIN, Marc.Lecture notes in computer science. 2003, pp 416-429, issn 0302-9743, isbn 3-540-20609-4, 14 p.Conference Paper

A simple protocol for deniable authentication based on elgamal cryptographyYINGJIE WANG; JIANHUA LI; LING TIE et al.Networks (New York, NY). 2005, Vol 45, Num 4, pp 193-194, issn 0028-3045, 2 p.Article

Breaking a remote user authentication scheme for multi-server architectureXIANG CAO; SHENG ZHONG.IEEE communications letters. 2006, Vol 10, Num 8, pp 580-581, issn 1089-7798, 2 p.Article

Authentication of meat and meat productsBALLIN, N. Z.Meat science. 2010, Vol 86, Num 3, pp 577-587, issn 0309-1740, 11 p.Article

Applying a formal analysis technique to the CCITT X.509 strong two-way authentication protocolGAARDER, K; SNEKKENES, E.Journal of cryptology. 1991, Vol 3, Num 2, pp 81-98, issn 0933-2790, 18 p.Article

Halal authenticity issues in meat and meat productsNAKYINSIGE, Khadijah; CHE MAN, Yaakob Bin; QURNI SAZILI, Awis et al.Meat science. 2012, Vol 91, Num 3, pp 207-214, issn 0309-1740, 8 p.Article

Information-theoretic bounds for authentification schemesWALKER, M.Journal of cryptology. 1990, Vol 2, Num 3, pp 131-143, issn 0933-2790, 13 p.Article

A Cartesian product construction for unconditionally secure authentication codes that permit arbitrationSIMMONS, G. J.Journal of cryptology. 1990, Vol 2, Num 2, pp 77-104, issn 0933-2790, 28 p.Article

An Enhanced User Authentication Scheme for Wireless CommunicationsCUI, Xinchun; QIN, Xiaolin.IEICE transactions on information and systems. 2011, Vol 94, Num 1, pp 155-157, issn 0916-8532, 3 p.Article

A block-cipher mode of operation for parallelizable message authenticationBLACK, John; ROGAWAY, Phillip.Lecture notes in computer science. 2002, pp 384-397, issn 0302-9743, isbn 3-540-43553-0Conference Paper

Playing House : Participants' experiences of Big Brother FinlandASLAMA, Minna.International journal of cultural studies (Print). 2009, Vol 12, Num 1, pp 81-96, issn 1367-8779, 16 p.Article

Authenticathed quantum key distribution without classical communicationNAGY, Naya; AKL, Selim G.Parallel processing letters. 2007, Vol 17, Num 3, pp 323-335, issn 0129-6264, 13 p.Conference Paper

Security Analysis of an Unlinkable Secret Handshakes SchemeYOUN, Taek-Young; PARK, Young-Ho.IEEE communications letters. 2010, Vol 14, Num 1, pp 4-5, issn 1089-7798, 2 p.Article

AN AUTHENTICITY RATING SCALE FOR REPORTS OF SPONTANEOUS CASES.STEVENSON I; PALMER J; STANFORD RG et al.1977; J. AMER. SOC. PSYCH. RES.; U.S.A.; DA. 1977; VOL. 71; NO 3; PP. 273-288; BIBL. 5 REF.Article

Detection of porcine DNA in gelatine and gelatine-containing processed food products-Halal/Kosher authenticationDEMIRHAN, Yasemin; ULCA, Pelin; SENYUVA, Hamide Z et al.Meat science. 2012, Vol 90, Num 3, pp 686-689, issn 0309-1740, 4 p.Article

Managing Consortium Resource Access Using Athens AuthenticationSEWELL, Robin R.Journal of electronic resources in medical libraries. 2008, Vol 5, Num 2, pp 109-122, issn 1542-4065, 14 p.Article

Multireceiver authentication codes : Models, bounds, constructions, and extensionsSAFAVI-NAINI, R; WANG, H.Information and computation (Print). 1999, Vol 151, Num 1-2, pp 148-172, issn 0890-5401Article

Design of Fully Deniable Authentication Service for E-mail ApplicationsHAM, Lein; JIAN REN.IEEE communications letters. 2008, Vol 12, Num 3, pp 219-221, issn 1089-7798, 3 p.Article

Characterization of optimal authentication codes with arbitrationDINGYI PEI; YUQIANG LI; YEJING WANG et al.Lecture notes in computer science. 1999, pp 303-313, issn 0302-9743, isbn 3-540-65756-8Conference Paper

MAC based lightweight protocols for strong authentication and key exchangeTRCEK, Denis.Journal of information science and engineering. 2005, Vol 21, Num 4, pp 753-765, issn 1016-2364, 13 p.Article

  • Page / 266