Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Authentification")

Filter

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Origin

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 5024

  • Page / 201
Export

Selection :

  • and

Broadcast authentication for group communicationSAFAVI-NAINI, Rei; HUAXIONG WANG.Theoretical computer science. 2001, Vol 269, Num 1-2, pp 1-21, issn 0304-3975Article

Progressive verification: The case of message authenticationFISCHLIN, Marc.Lecture notes in computer science. 2003, pp 416-429, issn 0302-9743, isbn 3-540-20609-4, 14 p.Conference Paper

A block-cipher mode of operation for parallelizable message authenticationBLACK, John; ROGAWAY, Phillip.Lecture notes in computer science. 2002, pp 384-397, issn 0302-9743, isbn 3-540-43553-0Conference Paper

CRYPTOPOSTTM : a cryptographic application to mail processingPASTOR, J.Journal of cryptology. 1991, Vol 3, Num 2, pp 137-146, issn 0933-2790, 10 p.Article

From a pile of IP addresses to a clear authentication and authorization with ShibbolethOBERKNAPP, Bernd; RUPPERT, Ato; BOREL, Franck et al.Serials (United Kingdom Serials Group). 2009, Vol 22, Num 1, pp 28-32, issn 0953-0460, 5 p.Article

Is a picture really worth a thousand words? Exploring the feasibility of graphical authentication systemsDE ANGELI, Antonella; COVENTRY, Lynne; JOHNSON, Graham et al.International journal of human-computer studies. 2005, Vol 63, Num 1-2, pp 128-152, issn 1071-5819, 25 p.Article

Primitives for authentication in process algebrasBODEI, Chiara; DEGANO, Pierpaolo; FOCARDI, Riccardo et al.Theoretical computer science. 2002, Vol 283, Num 2, pp 271-304, issn 0304-3975Article

From secrecy to authenticity in security protocolsBLANCHET, Bruno.Lecture notes in computer science. 2002, pp 342-359, issn 0302-9743, isbn 3-540-44235-9, 18 p.Conference Paper

On the Matsumoto and Imai human identification schemeWANG, C.-H; HWANG, T; TSAI, J.-J et al.IEE proceedings. Computers and digital techniques. 1995, Vol 142, Num 5, pp 313-317, issn 1350-2387Article

Risks with raw-key masking: The security evaluation of 2-key XCBCFURUYA, Soichi; SAKURAI, Kouichi.Lecture notes in computer science. 2002, pp 327-341, issn 0302-9743, isbn 3-540-00164-6, 15 p.Conference Paper

Two attacks on a user friendly remote authentication scheme with smart cardsHWANG, Kuo-Feng; LIAO, I-En.Operating systems review. 2005, Vol 39, Num 2, pp 94-96, issn 0163-5980, 3 p.Article

Weaknesses of Lee-Li-Hwang's hash-based password authentication schemeKU, Wei-Chi; CHEN, Chien-Ming; LEE, Hui-Lung et al.Operating systems review. 2003, Vol 37, Num 4, pp 19-25, issn 0163-5980, 7 p.Article

Matching secrets in the absence of a continuously available trusted authorityMEADOWS, C; MUTCHLER, D.IEEE transactions on software engineering. 1987, Vol 13, Num 2, pp 289-292, issn 0098-5589Article

Efficient object-based stream authenticationYONGDONG WU; DI MA; CHANGSHENG XU et al.Lecture notes in computer science. 2002, pp 354-367, issn 0302-9743, isbn 3-540-00263-4, 14 p.Conference Paper

Cryptanalysis of the modified authenticated key agreement schemeLEE, Keon-Jik; LEE, Byeong-Jik.Applied mathematics and computation. 2005, Vol 170, Num 1, pp 280-284, issn 0096-3003, 5 p.Article

A secure and efficient strong-password authentication protocolCHANG, Ya-Fen; CHANG, Chin-Chen.Operating systems review. 2004, Vol 38, Num 3, pp 79-90, issn 0163-5980, 12 p.Article

A key authentication scheme with non-repudiationHWANG, Min-Shiang; LI, Li-Hua; LEE, Cheng-Chi et al.Operating systems review. 2004, Vol 38, Num 3, pp 75-78, issn 0163-5980, 4 p.Article

Two simple attacks on Lin-Shen-Hwang's strong-password authentication protocolKU, Wei-Chi; TSAI, Hao-Chuan; CHEN, Shuai-Min et al.Operating systems review. 2003, Vol 37, Num 4, pp 26-31, issn 0163-5980, 6 p.Article

LE SAVOIR-PRENDRE: Enquête sur l'estimation des objets = The know-how of appraising. Research on the valuation of objectsBESSY, Christian; CHATEAURAYNAUD, Francis.Techniques & culture (Paris). 2010, Num 54-55, pp 687-711, issn 0248-6016, 25 p., 2Article

Basic mathematical properties of Multiparty Joint authentication in gridsHUI LIU; MINGLU LI.Lecture notes in computer science. 2004, pp 172-181, issn 0302-9743, isbn 3-540-24127-2, 10 p.Conference Paper

Attacks on port knocking authentication mechanismIZQUIERDO MANZANARES, Antonio; MARQUEZ, Joaquin Torres; ESTEVEZ-TAPIADOR, Juan M et al.Lecture notes in computer science. 2005, issn 0302-9743, isbn 3-540-25860-4, 4Vol, part IV, 1292-1300Conference Paper

Identity escrowKILIAN, J; PETRANK, E.Lecture notes in computer science. 1998, pp 169-185, issn 0302-9743, isbn 3-540-64892-5Conference Paper

Methodical use of cryptographic transformations in authentication protocolsMAO, W; BOYD, C.IEE proceedings. Computers and digital techniques. 1995, Vol 142, Num 4, pp 272-278, issn 1350-2387Article

New (two-track-)MAC based on the two trails of RIPEMD: Efficient, especially on short messages and for frequent key-changesDEN BOER, Bert; VAN ROMPAY, Bart; PRENEEL, Bart et al.Lecture notes in computer science. 2001, pp 314-324, issn 0302-9743, isbn 3-540-43066-0Conference Paper

From unpredictability to indistinguishability : A simple construction of pseudo-random functions from MACsNAOR, M; REINGOLD, O.Lecture notes in computer science. 1998, pp 267-282, issn 0302-9743, isbn 3-540-64892-5Conference Paper

  • Page / 201