Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Authentication")

Filter

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Origin

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 4389

  • Page / 176
Export

Selection :

  • and

Probability to meet in the middleNISHIMURA, K; SIBUYA, M.Journal of cryptology. 1990, Vol 2, Num 1, pp 13-22, issn 0933-2790, 10 p.Article

Cryptanalysis of the modified authenticated key agreement schemeLEE, Keon-Jik; LEE, Byeong-Jik.Applied mathematics and computation. 2005, Vol 170, Num 1, pp 280-284, issn 0096-3003, 5 p.Article

Cryptanalysis of a suite of deniable authentication protocolsZHU, Robert W; WONG, Duncan S; LEE, Chan H et al.IEEE communications letters. 2006, Vol 10, Num 6, pp 504-506, issn 1089-7798, 3 p.Article

An analysis of the 3gpp-MAC schemeKNUDSEN, Lars R; MITCHELL, Chris J.Journées internationales codage et cryptographie. 2001, pp 319-328, isbn 2-7261-1179-3Conference Paper

Progressive verification: The case of message authenticationFISCHLIN, Marc.Lecture notes in computer science. 2003, pp 416-429, issn 0302-9743, isbn 3-540-20609-4, 14 p.Conference Paper

A simple protocol for deniable authentication based on elgamal cryptographyYINGJIE WANG; JIANHUA LI; LING TIE et al.Networks (New York, NY). 2005, Vol 45, Num 4, pp 193-194, issn 0028-3045, 2 p.Article

Breaking a remote user authentication scheme for multi-server architectureXIANG CAO; SHENG ZHONG.IEEE communications letters. 2006, Vol 10, Num 8, pp 580-581, issn 1089-7798, 2 p.Article

Authentication of meat and meat productsBALLIN, N. Z.Meat science. 2010, Vol 86, Num 3, pp 577-587, issn 0309-1740, 11 p.Article

Applying a formal analysis technique to the CCITT X.509 strong two-way authentication protocolGAARDER, K; SNEKKENES, E.Journal of cryptology. 1991, Vol 3, Num 2, pp 81-98, issn 0933-2790, 18 p.Article

Information-theoretic bounds for authentification schemesWALKER, M.Journal of cryptology. 1990, Vol 2, Num 3, pp 131-143, issn 0933-2790, 13 p.Article

An Enhanced User Authentication Scheme for Wireless CommunicationsCUI, Xinchun; QIN, Xiaolin.IEICE transactions on information and systems. 2011, Vol 94, Num 1, pp 155-157, issn 0916-8532, 3 p.Article

Playing House : Participants' experiences of Big Brother FinlandASLAMA, Minna.International journal of cultural studies (Print). 2009, Vol 12, Num 1, pp 81-96, issn 1367-8779, 16 p.Article

Authenticathed quantum key distribution without classical communicationNAGY, Naya; AKL, Selim G.Parallel processing letters. 2007, Vol 17, Num 3, pp 323-335, issn 0129-6264, 13 p.Conference Paper

Security Analysis of an Unlinkable Secret Handshakes SchemeYOUN, Taek-Young; PARK, Young-Ho.IEEE communications letters. 2010, Vol 14, Num 1, pp 4-5, issn 1089-7798, 2 p.Article

AN AUTHENTICITY RATING SCALE FOR REPORTS OF SPONTANEOUS CASES.STEVENSON I; PALMER J; STANFORD RG et al.1977; J. AMER. SOC. PSYCH. RES.; U.S.A.; DA. 1977; VOL. 71; NO 3; PP. 273-288; BIBL. 5 REF.Article

Detection of porcine DNA in gelatine and gelatine-containing processed food products-Halal/Kosher authenticationDEMIRHAN, Yasemin; ULCA, Pelin; SENYUVA, Hamide Z et al.Meat science. 2012, Vol 90, Num 3, pp 686-689, issn 0309-1740, 4 p.Article

Managing Consortium Resource Access Using Athens AuthenticationSEWELL, Robin R.Journal of electronic resources in medical libraries. 2008, Vol 5, Num 2, pp 109-122, issn 1542-4065, 14 p.Article

Multireceiver authentication codes : Models, bounds, constructions, and extensionsSAFAVI-NAINI, R; WANG, H.Information and computation (Print). 1999, Vol 151, Num 1-2, pp 148-172, issn 0890-5401Article

MAC based lightweight protocols for strong authentication and key exchangeTRCEK, Denis.Journal of information science and engineering. 2005, Vol 21, Num 4, pp 753-765, issn 1016-2364, 13 p.Article

On selecting Gabor features for biometric authentication : Automated identification technologyNANNI, Loris; LUMINI, Alessandra.International journal of computer applications in technology. 2009, Vol 35, Num 1, pp 23-28, issn 0952-8091, 6 p.Article

Authenticity and Authentication: Mike Seeger, the New Lost City Ramblers, and the Old-Time Music Revival = Authenticité et authentification : Mike Seeger, les nouveaux randonneurs perdus de la ville et le renouveau de la musique du temps jadisTITON, Jeff Todd.Journal of folklore research. 2012, Vol 49, Num 2, pp 227-245, issn 0737-7037, 19 p.Article

Authenticating Pollock paintings using fractal geometryTAYLOR, R. P; GUZMAN, R; MARTIN, T. P et al.Pattern recognition letters. 2007, Vol 28, Num 6, pp 695-702, issn 0167-8655, 8 p.Article

The combinatorics of authentication and secrecy codesSTINSON, D. R.Journal of cryptology. 1990, Vol 2, Num 1, pp 23-49, issn 0933-2790, 27 p.Article

Cryptanalysis of the end-to-end security protocol for mobile communications with end-user identification/authenticationYONGBIN ZHOU; ZHENFENG ZHANG; DENGGUO FENG et al.IEEE communications letters. 2005, Vol 9, Num 4, pp 372-374, issn 1089-7798, 3 p.Article

Authenticated Encryption : Relations among Notions and Analysis of the Generic Composition ParadigmBELLARE, Mihir; NAMPREMPRE, Chanathip.Journal of cryptology. 2008, Vol 21, Num 4, pp 469-491, issn 0933-2790, 23 p.Article

  • Page / 176