Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Authentification")

Filter

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 3326

  • Page / 134
Export

Selection :

  • and

Broadcast authentication for group communicationSAFAVI-NAINI, Rei; HUAXIONG WANG.Theoretical computer science. 2001, Vol 269, Num 1-2, pp 1-21, issn 0304-3975Article

Progressive verification: The case of message authenticationFISCHLIN, Marc.Lecture notes in computer science. 2003, pp 416-429, issn 0302-9743, isbn 3-540-20609-4, 14 p.Conference Paper

CRYPTOPOSTTM : a cryptographic application to mail processingPASTOR, J.Journal of cryptology. 1991, Vol 3, Num 2, pp 137-146, issn 0933-2790, 10 p.Article

Is a picture really worth a thousand words? Exploring the feasibility of graphical authentication systemsDE ANGELI, Antonella; COVENTRY, Lynne; JOHNSON, Graham et al.International journal of human-computer studies. 2005, Vol 63, Num 1-2, pp 128-152, issn 1071-5819, 25 p.Article

Primitives for authentication in process algebrasBODEI, Chiara; DEGANO, Pierpaolo; FOCARDI, Riccardo et al.Theoretical computer science. 2002, Vol 283, Num 2, pp 271-304, issn 0304-3975Article

From secrecy to authenticity in security protocolsBLANCHET, Bruno.Lecture notes in computer science. 2002, pp 342-359, issn 0302-9743, isbn 3-540-44235-9, 18 p.Conference Paper

On the Matsumoto and Imai human identification schemeWANG, C.-H; HWANG, T; TSAI, J.-J et al.IEE proceedings. Computers and digital techniques. 1995, Vol 142, Num 5, pp 313-317, issn 1350-2387Article

Risks with raw-key masking: The security evaluation of 2-key XCBCFURUYA, Soichi; SAKURAI, Kouichi.Lecture notes in computer science. 2002, pp 327-341, issn 0302-9743, isbn 3-540-00164-6, 15 p.Conference Paper

Cryptanalysis of the modified authenticated key agreement schemeLEE, Keon-Jik; LEE, Byeong-Jik.Applied mathematics and computation. 2005, Vol 170, Num 1, pp 280-284, issn 0096-3003, 5 p.Article

A secure and efficient strong-password authentication protocolCHANG, Ya-Fen; CHANG, Chin-Chen.Operating systems review. 2004, Vol 38, Num 3, pp 79-90, issn 0163-5980, 12 p.Article

Two simple attacks on Lin-Shen-Hwang's strong-password authentication protocolKU, Wei-Chi; TSAI, Hao-Chuan; CHEN, Shuai-Min et al.Operating systems review. 2003, Vol 37, Num 4, pp 26-31, issn 0163-5980, 6 p.Article

Attacks on port knocking authentication mechanismIZQUIERDO MANZANARES, Antonio; MARQUEZ, Joaquin Torres; ESTEVEZ-TAPIADOR, Juan M et al.Lecture notes in computer science. 2005, issn 0302-9743, isbn 3-540-25860-4, 4Vol, part IV, 1292-1300Conference Paper

Identity escrowKILIAN, J; PETRANK, E.Lecture notes in computer science. 1998, pp 169-185, issn 0302-9743, isbn 3-540-64892-5Conference Paper

Methodical use of cryptographic transformations in authentication protocolsMAO, W; BOYD, C.IEE proceedings. Computers and digital techniques. 1995, Vol 142, Num 4, pp 272-278, issn 1350-2387Article

Roman Methods of Authentication in the First Two Centuries ADHAIGHTON, Angela.Journal of the Society of Archivists. 2010, Vol 31, Num 1, pp 29-49, issn 0037-9816, 21 p.Article

Constructing VIL-MACs from FIL-MACs : Message authentication under weakened assumptionsJEE HE AAN; BELLARE, M.Lecture notes in computer science. 1999, pp 252-269, issn 0302-9743, isbn 3-540-66347-9Conference Paper

An Improved Efficient Secret Handshakes Scheme with UnlinkabilityJIE GU; ZHI XUE.IEEE communications letters. 2011, Vol 15, Num 2, pp 259-261, issn 1089-7798, 3 p.Article

A unified authentication framework for JPEG2000ZHISHOU ZHANG; GANG QIU; QIBIN SUN et al.IEEE International Conference on multimedia. 2004, isbn 0-7803-8603-5, 3Vol, vol2, 915-918Conference Paper

Bounds on the probability of deception in multiple authenticationSMEETS, B.IEEE transactions on information theory. 1994, Vol 40, Num 5, pp 1586-1591, issn 0018-9448Article

Probability to meet in the middleNISHIMURA, K; SIBUYA, M.Journal of cryptology. 1990, Vol 2, Num 1, pp 13-22, issn 0933-2790, 10 p.Article

Authentication tests and the structure of bundlesGUTTMAN, Joshua D; THAYER, F. Javier.Theoretical computer science. 2002, Vol 283, Num 2, pp 333-380, issn 0304-3975Article

Signatures numériques et preuves à divulgation nulle, cryptanalyse, défense et outils algorithmiques = On the design, cryptanalysis and implementation of digital signatures, zero-knowledge proofs and related algorithmic toolsNaccache, David; Cohen, G.1995, 146 p.Thesis

Current and future privacy enhancing technologies for the internet : Network and information systems securityDESWARTE, Yves; AGUILAR MELCHOR, Carlos.Annales des télécommunications. 2006, Vol 61, Num 3-4, pp 399-417, issn 0003-4347, 19 p.Article

An improvement of security enhancement for the timestamp-based password authentication scheme using smart cardsYANG, Chou-Chen; WANG, Ren-Chiun.Operating systems review. 2004, Vol 38, Num 3, pp 91-96, issn 0163-5980, 6 p.Article

Provably secure threshold password-authenticated key exchangeDI RAIMONDO, Mario; GENNARO, Rosario.Lecture notes in computer science. 2003, pp 507-523, issn 0302-9743, isbn 3-540-14039-5, 17 p.Conference Paper

  • Page / 134