Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("user authentication")

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 29

  • Page / 2
Export

Selection :

  • and

An Enhanced User Authentication Scheme for Wireless CommunicationsCUI, Xinchun; QIN, Xiaolin.IEICE transactions on information and systems. 2011, Vol 94, Num 1, pp 155-157, issn 0916-8532, 3 p.Article

A Smartcard-Based User Authentication Scheme to Ensure the PFS in Multi-Server EnvironmentsLEE, Yun-Seok; KIM, Eun; SEOK, Seung-Joon et al.IEICE transactions on communications. 2012, Vol 95, Num 2, pp 619-622, issn 0916-8516, 4 p.Article

Security Flaw of Authentication Scheme with Anonymity for Wireless CommunicationsLEE, Ji-Seon; JIK HYUN CHANG; DONG HOON LEE et al.IEEE communications letters. 2009, Vol 13, Num 5, pp 292-293, issn 1089-7798, 2 p.Article

Cryptanalysis of the modified authenticated key agreement schemeLEE, Keon-Jik; LEE, Byeong-Jik.Applied mathematics and computation. 2005, Vol 170, Num 1, pp 280-284, issn 0096-3003, 5 p.Article

A novel user authentication and privacy preserving scheme with smart cards for wireless communicationsLI, Chun-Ta; LEE, Cheng-Chi.Mathematical and computer modelling. 2012, Vol 55, Num 1-2, pp 35-44, issn 0895-7177, 10 p.Article

Cryptanalysis of the end-to-end security protocol for mobile communications with end-user identification/authenticationYONGBIN ZHOU; ZHENFENG ZHANG; DENGGUO FENG et al.IEEE communications letters. 2005, Vol 9, Num 4, pp 372-374, issn 1089-7798, 3 p.Article

A Proposal of User Authentication Infrastructure for Next-Generation TelematicsUMEZAWA, Katsuyuki; SUSAKI, Seiichi; KASHIYAMA, Masamori et al.IEEJ transactions on electrical and electronic engineering. 2010, Vol 5, Num 4, pp 439-449, issn 1931-4973, 11 p.Article

Further improvement on the modified authenticated key agreement schemeLEE, Narn-Yih; LEE, Ming-Feng.Applied mathematics and computation. 2004, Vol 157, Num 3, pp 729-733, issn 0096-3003, 5 p.Article

A hybrid novelty score and its use in keystroke dynamics-based user authenticationKANG, Pilsung; CHO, Sungzoon.Pattern recognition. 2009, Vol 42, Num 11, pp 3115-3127, issn 0031-3203, 13 p.Article

A secure remote user mutual authentication scheme using smart cardsKARUPPIAH, Marimuthu; SARAVANAN, R.Journal of information security and applications. 2014, Vol 19, Num 4-5, pp 282-294, 13 p.Article

An Enhanced Secure Authentication Scheme with Anonymity for Wireless EnvironmentsJEON, Woongryul; KIM, Jeeyeon; NAM, Junghyun et al.IEICE transactions on communications. 2012, Vol 95, Num 7, pp 2505-2508, issn 0916-8516, 4 p.Article

User Authentication Based on Representative UsersSCHCLAR, Alon; ROKACH, Lior; ABRAMSON, Adi et al.IEEE transactions on systems, man and cybernetics. Part C, Applications and reviews. 2012, Vol 42, Num 6, pp 1669-1678, issn 1094-6977, 10 p.Article

Efficient password authenticated key agreement using bilinear pairingsJUANG, Wen-Shenq; NIEN, Wei-Ken.Mathematical and computer modelling. 2008, Vol 47, Num 11-12, pp 1238-1245, issn 0895-7177, 8 p.Article

Is a picture really worth a thousand words? Exploring the feasibility of graphical authentication systemsDE ANGELI, Antonella; COVENTRY, Lynne; JOHNSON, Graham et al.International journal of human-computer studies. 2005, Vol 63, Num 1-2, pp 128-152, issn 1071-5819, 25 p.Article

Optimising password security through key-pattern analysisJABBOUR, Ravel; MASRI, Wes; EL-HAJJ, Ali et al.International journal of internet technology and secured transactions (Print). 2011, Vol 3, Num 2, pp 178-193, issn 1748-569X, 16 p.Article

Beyond password protection: Methods for remote patron authenticationBLANSIT, B. Douglas.Journal of electronic resources in medical libraries. 2007, Vol 4, Num 1-2, pp 185-194, issn 1542-4065, 10 p.Article

SSL/TLS session-aware user authentication : Or how to effectively thwart the man-in-the-middleOPPLIGER, Rolf; HAUSER, Ralf; BASIN, David et al.Computer communications. 2006, Vol 29, Num 12, pp 2238-2246, issn 0140-3664, 9 p.Article

Security Notions and Advanced Method for Human Shoulder-Surfing Resistant PIN-EntryLEE, Mun-Kyu.IEEE transactions on information forensics and security. 2014, Vol 9, Num 3-4, pp 695-708, issn 1556-6013, 14 p.Article

Versatile identity-based signatures for authentication in multi-user settingsXI SUN; ZHENGTAO JIANG; MEIRONG ZHOU et al.International journal of grid and utility computing (Print). 2014, Vol 5, Num 3, pp 156-164, issn 1741-847X, 9 p.Article

ECC-based anti-phishing protocol for cloud computing servicesKALRA, Sheetal; SOOD, Sandeep.International journal of security and networks (Print). 2013, Vol 8, Num 3, pp 130-138, issn 1747-8405, 9 p.Article

An efficient biometrics-based remote user authentication scheme using smart cardsLI, Chun-Ta; HWANG, Min-Shiang.Journal of network and computer applications. 2010, Vol 33, Num 1, pp 1-5, issn 1084-8045, 5 p.Article

A hybrid user authentication protocol for mobile IPTV serviceKIM, Soo-Cheol; YEO, Sang-Soo; SUNG KWON KIM et al.Multimedia tools and applications. 2013, Vol 65, Num 2, pp 283-296, issn 1380-7501, 14 p.Article

Extrinsic Channel-Like Fingerprint Embedding for Authenticating MIMO SystemsGOERGEN, Nate; SABRINA LIN, W; LIU, K. J. R et al.IEEE transactions on wireless communications. 2011, Vol 10, Num 12, pp 4270-4281, issn 1536-1276, 12 p.Article

A secure user anonymity-preserving biometric-based multi-server authenticated key agreement scheme using smart cardsMISHRA, Dheerendra; ASHOK KUMAR DAS; MUKHOPADHYAY, Sourav et al.Expert systems with applications. 2014, Vol 41, Num 18, pp 8129-8143, issn 0957-4174, 15 p.Article

Embedded access points for trusted data and resources access in HPC systemsMILITELLO, C; CONTI, V; VITABILE, S et al.Journal of supercomputing. 2011, Vol 55, Num 1, pp 4-27, issn 0920-8542, 24 p.Article

  • Page / 2