Printer Friendly

Browse Authentication (Identity) topic


1-267 out of 267 article(s)
Title Author Type Date Words
A Lightweight and Privacy-Preserving Answer Collection Scheme for Mobile Crowdsourcing. Dai, Yingling; Weng, Jian; Yang, Anjia; Yu, Shui; Deng, Robert H. Report Aug 1, 2021 9944
On the Application of Channel Characteristic-Based Physical Layer Authentication in Industrial Wireless Networks. Wang, Qiuhua; Kang, Mingyang; Yuan, Lifeng; Wang, Yunlu; Miao, Gongxun; Choo, Kim-Kwang Raymond Report Jun 1, 2021 9600
A Strong Mutual Authentication Protocol for SHIELD. Ozcanhan, Mehmet Hilal; Turksonmez, Halit Report Nov 1, 2020 6572
Majority of Pinoys prefer digital IDs - survey. Oct 28, 2020 747
A Heterogeneous IoT Node Authentication Scheme Based on Hybrid Blockchain and Trust Value. Zhang, Shiqiang; Cao, Yang; Ning, Zhenhu; Xue, Fei; Cao, Dongzhi; Yang, Yongli Sep 1, 2020 9817
Stymie hackers with these 6 steps. Patrick, Byron Sep 1, 2020 1223
An Image Hashing Algorithm for Authentication with Multi-Attack Reference Generation and Adaptive Thresholding. Du, Ling; He, Zehong; Wang, Yijing; Wang, Xiaochao; Ho, Anthony T.S. Report Sep 1, 2020 9100
Touchless Authentication System Using Visual Fingertip Trajectories. Akman, Vefak Murat; Vural, Revna Acar; Koc, Kemal Talha Report Jul 14, 2020 6082
Social Media: A Good Alternative, for Alternative Service of Process. Davis, Emily Mar 22, 2020 9454
Cybersecurity of Online Proctoring Systems. Slusky, Ludwig Report Jan 1, 2020 8362
Securing Electronics with Sweat Analysis. Jun 1, 2019 332
Pairing Free Certificate Based Signcryption Schemes Using ECQV Implicit Certificates. Braeken, A. Report Mar 1, 2019 9107
Apple publishes patent to unlock vehicles using FaceID. Brief article Feb 12, 2019 314
A Relay-assisted Secure Handover Mechanism for High-speed Trains. Zhao, Yue; Tian, Bo; Chen, Zhouguo; Yang, Jin; Li, Saifei Report Feb 1, 2019 6364
An Improved Lightweight Two-Factor Authentication and Key Agreement Protocol with Dynamic Identity Based on Elliptic Curve Cryptography. Qiu, Shuming; Xu, Guosheng; Ahmad, Haseeb; Xu, Guoai; Qiu, Xinping; Xu, Hong Report Feb 1, 2019 11720
Enhanced Knock Code Authentication with High Security and Improved Convenience. Jang, Yun-Hwan; Park, Yongsu Technical report Sep 1, 2018 6395
An Approach to Authenticate Magnetic Stripe Bank Card Transactions at POS terminals. Nair, Kishor Krishnan; Helberg, Albert; van der Merwe, Johannes Report Sep 1, 2018 6090
Secure Timing Advance Based Context-Aware Handover Protocol for Vehicular Ad-Hoc Heterogeneous Networks. Nyangaresi, Vincent Omollo; Abeka, Silvance O.; Rodgrigues, Anthony Report Sep 1, 2018 8017
Comparison of Attribute Based Access Control (ABAC) Model and Rule Based Access (RBAC) to Digital Evidence Storage (DES). Panende, Moh Fadly; Prayudi, Yudi; Riadi, Imam Report Sep 1, 2018 3882
Proposed Simulator Based on Developed Lightweight Authentication and Key Management Protocol for Wireless Sensor Network. Naser, Shaymaa Mahmood; Croock, Muayad Sadik Report Jul 1, 2018 3383
Performance Analysis of SAP-NFC Protocol. Al-Fayoumi, Mustafa; Nashwan, Shadi Report Apr 1, 2018 4676
Securing One Time Password (OTP) for Multi-Factor Out-of-Band Authentication through a 128-bit Blowfish Algorithm. Reyes, Ariel Roy L.; Festijo, Enrique D.; Medina, Ruji P. Report Apr 1, 2018 4568
Improving Vehicular Authentication in VANET using Cryptography. Al-Mutiri, Rasha; Al-Rodhaan, Mznah; Tian, Yuan Report Apr 1, 2018 5562
A Biometric-based User Authentication and Key Agreement Scheme for Heterogeneous Wireless Sensor Networks. Chen, Ying; Ge, Yangming; Wang, Wenyuan; Yang, Fengyu Report Apr 1, 2018 9052
Auto-configurable Security Mechanism for NFV. Kim, HyunJin; Park, PyungKoo; Ryou, Jaecheol Report Feb 1, 2018 3904
A Study on KSI-based Authentication Management and Communication for Secure Smart Home Environments. Ra, Gyeong-Jin; Lee, Im-Yeong Report Feb 1, 2018 5047
A Mathematical Model for Resolving Minimum Password Length Controversy. Agholor, S.; Sodiya, A.S.; Aborisade, D.O. Report Jan 1, 2018 4268
Fraudsters Employ Credit Card Testing. Jan 1, 2018 419
Combining Cryptography with EEG Biometrics. Damasevicius, Robertas; Maskeliunas, Rytis; Kazanavicius, Egidijus; Wozniak, Marcin Report Jan 1, 2018 7811
Energy-Efficient Biometrics-Based Remote User Authentication for Mobile Multimedia IoT Application. Lee, Sungju; Sa, Jaewon; Cho, Hyeonjoong; Park, Daihee Report Dec 1, 2017 5757
An Enhanced Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services. Xiong, Ling; Peng, Daiyuan; Peng, Tu; Liang, Hongbin Report Dec 1, 2017 9891
A Novel Two-party Scheme against Off-line Password Guessing Attacks using New Theorem of Chaotic maps. Zhu, Hongfeng Report Dec 1, 2017 7088
State of the Art in Biometric Key Binding and Key Generation Schemes. Jegede, Abayomi; Udzir, Nur Izura; Abdullah, Azizol; Mahmod, Ramlan Report Dec 1, 2017 10433
SE-H: Secure and Efficient Hash Protocol for RFID System. Nashwan, Shadi Report Dec 1, 2017 6418
An Improved Two-Factor Mutual Authentication Scheme with Key Agreement in Wireless Sensor Networks. Li, Jiping; Ding, Yaoming; Xiong, Zenggang; Liu, Shouyin Report Nov 1, 2017 8792
A Novel Secure and Robust Image Watermarking Method Based on Decorrelation of Channels, Singular Vectors, and Values. Imran, Muhammad; Harvey, Bruce A. Report Nov 1, 2017 6292
Certifiable Trust in Autonomous Systems: Making the Intractable Tangible. Lyons, Joseph B.; Clark, Matthew A.; Wagner, Alan R.; Schuelke, Matthew J. Report Sep 22, 2017 10530
Design and Implementation of a Mechanism to Secure the Access in Cloud Computing. Sulaiman, Adeeb Hamdoon; Bayati, Hilal Al; Bayounilor, Ahmed Report Sep 1, 2017 6103
Location authentication based on wireless access point information to prevent wormhole attack in Samsung pay. Ryu, Gwonsang; Seo, Changho; Choi, Daeseon Report Aug 1, 2017 4347
An Improved Authentication and Key Agreement Scheme for Session Initial Protocol. Wu, Libing; Fan, Jing; Xie, Yong; Wang, Jing Report Aug 1, 2017 8680
Robust biometric-based anonymous user authenticated key agreement scheme for Telecare Medicine Information Systems. Jung, Jaewook; Moon, Jongho; Won, Dongho Report Jul 1, 2017 16049
AKA-PLA: Enhanced AKA based on physical layer authentication. Yang, Jing; Ji, Xinsheng; Huang, Kaizhi; Yi, Ming; Chen, Yajun Report Jul 1, 2017 6883
A self-authentication and deniable efficient group key agreement protocol for VANET. Han, Mu; Hua, Lei; Ma, Shidian Report Jul 1, 2017 8045
The single factor of most concern in the cloud: with vendors inconsistently offering multifactor authentication, the JofAs annual technology roundtable identifies single sign-on as a possible solution. Drew, Jeff Jun 1, 2017 2590
A secure pattern based near field authentication for P2P systems. Dhanalakshmi, G.; Akshaya, M.; Chetana, V.; Jayanthi, P. Report May 1, 2017 2467
Machine testimony. Roth, Andrea May 1, 2017 35494
An improved cancelable fingerprint template encryption system research. Wang, Feng; Han, Bo; Niu, Lei; Wang, Ya Report Apr 1, 2017 5732
An untraceable ECC-based remote user authentication scheme. Mehmood, Zahid; Chen, Gongliang; Li, Jianhua; Albeshri, Aiiad Report Mar 1, 2017 8402
Identity-based signcryption groupkey agreement protocol using bilinear pairing. Reddi, Sivaranjani; Borra, Surekha Report Mar 1, 2017 5253
Malicious node identification in MANETs based on false information. Afrose, S.; Babu, S. Venkatesh Report Mar 1, 2017 3616
A lightweight pseudonym authentication and key agreement protocol for multi-medical server architecture in TMIS. Liu, Xiaoxue; Li, Yanping; Qu, Juan; Ding, Yong Report Feb 1, 2017 9438
Enhanced mutual authentication scheme based on chaotic map for PCM in NFC service environment. Park, Sung-Wook; Lee, Im-Yeong Report Feb 1, 2017 9113
Internet banking login with multi-factor authentication. Boonkrong, Sirapat Report Jan 1, 2017 11966
Survey shows more than half of companies use biometric authentication. Brief article Jan 1, 2017 183
Privacy-Preserving Biometric Authentication: Challenges and Directions. Pagnin, Elena; Mitrokotsa, Aikaterini Report Jan 1, 2017 6478
Deniable Key Establishment Resistance against eKCI Attacks. (Research Article). Krzywiecki, Aukasz; Wlislocki, Tomasz Report Jan 1, 2017 9556
A Novel Design of Membership Authentication and Group Key Establishment Protocol. Ham, Lein; Hsu, Ching-Fang Report Jan 1, 2017 5429
A Chaos-Based Authenticated Cipher with Associated Data. The, Je Sen; Samsudin, Azman Report Jan 1, 2017 10248
PBF: A New Privacy-Aware Billing Framework for Online Electric Vehicles with Bidirectional Auditability. Hussain, Rasheed; Son, Junggab; Kim, Donghyun; Nogueira, Michele; Oh, Heekuck; Tokuta, Alade O.; Seo Report Jan 1, 2017 12448
Physical Layer Authentication Enhancement Using Maximum SNR Ratio Based Cooperative AF Relaying. Liu, Jiazi; Wang, Xianbin; Tang, Helen Report Jan 1, 2017 7761
A Low-Complexity Region-Based Authentication Algorithm for 3D Polygonal Models. Tsai, Yuan-Yu; Cheng, Tsung-Chieh; Huang, Yao-Hsien Report Jan 1, 2017 6094
Improving an Anonymous and Provably Secure Authentication Protocol for a Mobile User. Moon, Jongho; Lee, Youngsook; Kim, Jiye; Won, Dongho Report Jan 1, 2017 10303
Cryptanalysis of Three Password-Based Remote User Authentication Schemes with Non-Tamper-Resistant Smart Card. Wang, Chenyu; Xu, Guoai Report Jan 1, 2017 12161
Hierarchical Group Based Mutual Authentication and Key Agreement for Machine Type Communication in LTE and Future 5G Networks. Roychoudhury, Probidita; Roychoudhury, Basav; Saikia, Dilip Kumar Report Jan 1, 2017 14465
Group Authentication with Multiple Trials and Multiple Authentications. Chien, Hung-Yu Report Jan 1, 2017 5364
Authenticated Location-Aware Publish/Subscribe Services in Untrusted Outsourced Environments. Yan, Han; Cheng, Xiang; Su, Sen; Zhang, Siyao Report Jan 1, 2017 11237
CLAS: A Novel Communications Latency Based Authentication Scheme. Dou, Zuochao; Khalil, Issa; Khreishah, Abdallah Report Jan 1, 2017 12908
An SDN-Based Authentication Mechanism for Securing Neighbor Discovery Protocol in IPv6. Lu, Yiqin; Wang, Meng; Huang, Pengsen Report Jan 1, 2017 6381
A Two-Factor RSA-Based Robust Authentication System for Multiserver Environments. Amin, Ruhul; Islam, SK Hafizul; Khan, Muhammad Khurram; Karati, Arijit; Giri, Debasis; Kumari, Saru Report Jan 1, 2017 9351
Trust Management for Public Key Infrastructures: Implementing the X.509 Trust Broker. Wazan, Ahmad Samer; Laborde, Romain; Chadwick, David W.; Barrere, Francois; Benzekri, Abdelmalek; Ka Report Jan 1, 2017 16951
BAS: The Biphase Authentication Scheme for Wireless Sensor Networks. Riaz, Rabia; Chung, Tae-Sun; Rizvi, Sanam Shahla; Yaqub, Nazish Report Jan 1, 2017 6729
An improved multi-server authentication scheme for distributed mobile cloud computing services. Irshad, Azeem; Sher, Muhammad; Ahmad, Hafiz Farooq; Alzahrani, Bander A.; Chaudhry, Shehzad Ashraf; Report Dec 1, 2016 11628
An efficient and anonymous chaotic map based authenticated key agreement for multi-server architecture. Irshad, Azeem; Ahmad, Hafiz Farooq; Alzahrani, Bander A.; Sher, Muhammad; Chaudhry, Shehzad Ashraf Report Dec 1, 2016 9834
Dynamic session key based Pairwise Key management scheme for Wireless Sensor Networks. B., Premamayudu; Rao, K. Venkata; Varma, P. Suresh Report Dec 1, 2016 7897
Security and privacy issues in IoT. -ur-Rehman, Aqeel; Ur Rehman, Sadiq; Khan, Iqbal Uddin; Moiz, Muzaffar; Hasan, Sarmad Report Dec 1, 2016 8394
DPCA: Dual Phase Cloud infrastructure Authentication. Thandeeswaran, R.; Durai, M.A. Saleem Report Dec 1, 2016 4033
One-round secure key exchange protocol with strong forward secrecy. Li, Xiaowei; Yang, Dengqi; Chen, Benhui; Zhang, Yuqing Report Nov 1, 2016 8804
A simple fingerprint Fuzzy Vault for FIDO. Cho, Dongil Report Nov 1, 2016 6362
A user anonymous mutual authentication protocol. Kumari, Saru; Li, Xiong; Wu, Fan; Das, Ashok Kumar; Odelu, Vanga; Khan, Muhammad Khurram Report Sep 1, 2016 11903
An anonymous authentication with key-agreement protocol for multi-server architecture based on biometrics and smartcards. Reddy, Alavalapati Goutham; Das, Ashok Kumar; Yoon, Eun-Jun; Yoo, Kee-Young Report Jul 1, 2016 12470
A novel Taxonomy for mobile applications data. Alotaibi, Saud; Furnell, Steven; Clarke, Nathan Report Jul 1, 2016 3868
Global survey: only 1 in 5 organizations securely manages user identities. May 1, 2016 480
Performance measures for evaluating the dynamic authentication techniques. Liou, Jing-Chiou Report Apr 1, 2016 5734
Cryptographically-generated virtual credit card number for secure Card-Not-Present transactions. Park, Chan-Ho; Park, Chang-Seop Report Apr 1, 2016 6463
When is a tweet not an admissible tweet? Closing the authentication gap in the Federal Rules of Evidence. Carlson, Siri Mar 1, 2016 16516
Authentication and key agreement protocol for ad hoc networks based on the internet of things paradigm. Turkanovic, Muhamed Report Mar 1, 2016 1102
A novel authenticated group key distribution scheme. Shi, Run-hua; Zhong, Hong; Zhang, Shun Report Feb 1, 2016 6528
Biometric based multiserver authentication system. Devi, P. Keerthana; Chitra, T. Report Feb 1, 2016 1552
A high-quality reversible image authentication scheme based on adaptive PEE for digital images. Nguyen, Thai-Son; Chang, Chin-Chen; Shih, Tso-Hsien Report Jan 1, 2016 7168
Pitfalls in ultralightweight RFID authentication protocol. Mujahid, Umar; Najam-ul-islam, Muhammad Report Dec 1, 2015 7237
Multi-party Password-Authenticated Key exchange scheme with privacy preservation for mobile environment. Lu, Chung-Fu Report Dec 1, 2015 7265
Remote login authentication scheme based on bilinear pairing and fingerprint. Kumari, Shipra; Om, Hari Report Dec 1, 2015 12578
Towards smart card based mutual authentication schemes in cloud computing. Li, Haoxing; Li, Fenghua; Song, Chenggen; Yan, Yalong Report Jul 1, 2015 8698
Development of anti-counterfeit consumer product authentication system. Narimanova, O.V. Report Jul 1, 2015 1540
Iris identification based on appearance based approaches--a survey. Subban, Ravi; Susitha, N. Report Jun 1, 2015 4360
Multimodal biometric analysis against spoofing attacks using image quality assessment. Nandhini, N.; Kathirvel, N. Report Jun 1, 2015 2315
Efficient verifiable top-k queries in two-tiered wireless sensor networks. Dai, Hua; Yang, Geng; Huang, Haiping; Xiao, Fu Report Jun 1, 2015 8979
An efficient identity-based deniable authenticated encryption scheme. Wu, Weifeng; Li, Fagen Report May 1, 2015 7453
Attribute set based signature secure in the standard model. Li, Baohong; Zhao, Yinliang; Zhao, Hongping Report Apr 1, 2015 6588
On Security Analysis of Recent Password Authentication and Key Agreement Schemes Based on Elliptic Curve Cryptography. Kaur, Prabhdeep; Kalra, Sheetal Report Apr 1, 2015 5579
A provable one-way authentication key agreement scheme with user anonymity for multi-server environment. Zhu, Hongfeng Report Feb 1, 2015 8368
Online handwritten signature recognition by length normalization using Up-Sampling and Down-Sampling. Malallah, Fahad Layth; Ahmad, Sharifah Mumtazah Syed; Adnan, Wan Azizun Wan; Arigbabu, Olasimbo Ayod Report Jan 1, 2015 5805
Ultralightweight cryptography for passive RFID systems. Mujahid, Umar; Najam-ul-Islam, M. Report Dec 1, 2014 7460
Semi-fragile watermarking scheme for H.264/AVC video content authentication based on manifold feature. Ling, Chen; Ur-Rehman, Obaid; Zhang, Wenjun Report Dec 1, 2014 8173
A high-quality image authentication scheme for AMBTC-compressed images. Lin, Chia-Chen; Huang, Yuehong; Tai, Wei-Liang Report Dec 1, 2014 5990
Analysing the combined Kerberos timed authentication protocol and frequent key renewal using CSP and rank functions. Kirsal-Ever, Yoney; Eneh, Agozie; Gemikonakli, Orhan; Mostarda, Leonardo Report Dec 1, 2014 8785
A lightweight integrity authentication scheme based on reversible watermark for Wireless Body Area Networks. Liu, Xiyao; Ge, Yu; Zhu, Yuesheng; Wu, Dajun Report Dec 1, 2014 7953
Trust based authentication and key establishment for secure routing in WMN. Akilarasu, G.; Shalinie, S. Mercy Report Dec 1, 2014 4913
A privacy preserving vertical handover authentication scheme for WiMAX-WiFi networks. Fu, Anmin; Zhang, Gongxuan; Yu, Yan; Zhu, Zhenchao Report Sep 1, 2014 6372
A secure and efficient remote user authentication scheme for multi-server environments using ECC. Zhang, Junsong; Ma, Jian; Li, Xiong; Wang, Wendong Report Aug 1, 2014 10652
Fighting phishing attacks using mutual authentication technique with basic information. Dadkhah, Mehdi; Jazi, Mohammad Davarpanah Report Jul 23, 2014 2433
Enhanced mobile authentication techniques. Hassan, Zakaria Zakaria; Elgarf, Talaat A.; Zekry, Abdelhalim Report Jul 1, 2014 5425
Security framework for hybrid wireless mesh protocol in wireless mesh networks. Avula, Mallikarjun; Lee, Sang-Gon; Yoo, Seong-Moo Report Jun 1, 2014 9740
A tamper-detection scheme for BTC-compressed images with high-quality images. Nguyen, Thai-Son; Chang, Chin-Chen; Chung, Ting-Feng Report Jun 1, 2014 6655
Analysis of authentication methods for smartphone banking service using ANP. Park, Keon Chul; Shin, Jae Woo; Lee, Bong Gyou Report Jun 1, 2014 6065
Self-updating one-time password mutual authentication protocol for Ad hoc network. Xu, Feng; Lv, Xin; Zhou, Qi; Liu, Xuan Report May 1, 2014 3622
A semi-fragile image watermarking scheme exploiting BTC quantization data. Zhao, Dongning; Xie, Weixin Report Apr 1, 2014 7012
Group key management based on (2, 2) secret sharing. Wuu, Lih-Chyau; Hung, Chi-Hsiang; Kuo, Wen-Chung Report Mar 1, 2014 5289
A password pill? Brief article Jan 13, 2014 152
PRIAM: privacy preserving identity and access management scheme in cloud. Jinbo Xiong; Zhiqiang Yao; Jianfeng Ma; Ximeng Liu; Qi Li; Jun Ma Report Jan 1, 2014 10713
Authentication method for privacy protection in smart grid environment. Cho, Do-Eun; Yeo, Sang-Soo; Kim, Si-Jung Report Jan 1, 2014 5725
Secure OpenID authentication model by using trusted computing. Ghazizadeh, E.; Dolatabadi, Z.S. Shams; Khaleghparast, R.; Zamani, M.; Manaf, A.A.; Abdullah, M.S. Report Jan 1, 2014 11225
Spyware resistant smartphone user authentication scheme. Kim, Taejin; Yi, Jeong Hyun; Seo, Changho Report Jan 1, 2014 5107
An improved user authentication protocol for healthcare services via wireless medical sensor networks. Khan, Muhammad Khurram; Kumari, Saru Report Jan 1, 2014 10029
PAuthKey: a pervasive authentication protocol and key establishment scheme for wireless sensor networks in distributed IoT applications. Porambage, Pawani; Schmitt, Corinna; Kumar, Pardeep; Gurtov, Andrei; Ylianttila, Mika Report Jan 1, 2014 8940
Analysis and improvement of a robust user authentication framework for ubiquitous sensor networks. Chi, Ling; Hu, Liang; Li, Hongtu; Chu, Jianfeng Report Jan 1, 2014 4573
Online authentication and key establishment scheme for heterogeneous sensor networks. Khan, Sarmad Ullah; Lavagno, Luciano; Pastrone, Claudio; Spirito, Maurizio A. Report Jan 1, 2014 7380
Secure and efficient user authentication scheme in ubiquitous wireless sensor networks. Kim, Jun-Sub; Kwak, Jin Report Jan 1, 2014 5263
A novel authentication scheme for V2I communication based on WAVE unicast services. Suwannasa, Atthapol; Puangpronpitag, Somnuk; Phongsiri, Wirat Report Jan 1, 2014 7259
Secure authentication system for hybrid cloud service in mobile communication environments. Kim, Jin-Mook; Moon, Jeong-Kyung Report Jan 1, 2014 4274
Secure and efficient authentication scheme for mobile sink in WSNS based on bilinear pairings. Zhang, Junsong; Li, Xiong; Ma, Jian; Wang, Wendong Report Jan 1, 2014 8533
A secure online key establishment scheme for mobile heterogeneous sensor networks. Khan, Sarmad Ullah; Pastrone, Claudio; Lavagno, Luciano; Spirito, Maurizio A. Report Jan 1, 2014 8616
A routing path construction method for key dissemination messages in sensor networks. Moon, Soo Young; Cho, Tae Ho Report Jan 1, 2014 7435
Secure and privacy enhanced gait authentication on smart phone. Hoang, Thang; Choi, Deokjai Report Jan 1, 2014 4819
A hybrid digital-signature and zero-watermarking approach for authentication and protection of sensitive electronic documents. Tayan, Omar; Kabir, Muhammad N.; Alginahi, Yasser M. Report Jan 1, 2014 7934
Minutiae matching with privacy protection based on the combination of garbled circuit and homomorphic encryption. Li, Mengxing; Feng, Quan; Zhao, Jian; Yang, Mei; Kang, Lijun; Wu, Lili Report Jan 1, 2014 10819
The potential of using brain images for authentication. Chen, Fanglin; Zhou, Zongtan; Shen, Hui; Hu, Dewen Report Jan 1, 2014 5734
A rhythm-based authentication scheme for smart media devices. Lee, Jae Dong; Jeong, Young-Sik; Park, Jong Hyuk Report Jan 1, 2014 4285
A user authentication scheme using physiological and behavioral biometrics for multitouch devices. Koong, Chorng-Shiuh; Yang, Tzu-I; Tseng, Chien-Chao Report Jan 1, 2014 7489
Password-only authenticated three-party key exchange proven secure against insider dictionary attacks. Nam, Junghyun; Choo, Kim-Kwang Raymond; Paik, Juryon; Won, Dongho Report Jan 1, 2014 12914
Secure digital certificate design based on the RSA algorithm. Zhong, Yunsheng Report Dec 1, 2013 3443
A novel RFID authentication protocol with ownership transfer. Sun, Dong; Liu, Dan Author abstract Dec 1, 2013 3940
Dictionary attacks against password-based authenticated three-party key exchange protocols. Nam, Junghyun; Choo, Kim-Kwang Raymond; Kim, Moonseong; Paik, Juryon; Won, Dongho Report Dec 1, 2013 5211
Secure and energy-efficient join-leave operations in ZigBee network. Kim, Bong-Whan; Park, Chang-Seop Report Nov 1, 2013 8515
Effective fragile watermarking for image authentication with high-quality recovery capability. Qin, Chuan; Chang, Chin-Chen; Hsu, Tai-Jung Report Nov 1, 2013 6838
An efficient broadcast authentication scheme with batch verification for ADS-B messages. Yang, Haomiao; Kim, Hyunsung; Li, Hongwei; Yoon, Eunjun; Wang, Xiaofen; Ding, Xuefeng Report Oct 1, 2013 6450
A new roaming authentication framework for wireless communication. Li, Xiaowei; Zhang, Yuqing; Liu, Xuefeng; Cao, Jin; Zhao, Qianqian Report Aug 1, 2013 6768
A secure method for authenticity verification of handwritten signatures through digital image processing and artificial neural networks. Franco, Deivison Pinheiro; Barboza, Felipe Dantas; Cardoso, Nagila Magalhaes Report Aug 1, 2013 5050
Federal circuit v. ninth circuit: a split over the conflicting approaches to DMCA section 1201. Arthur, Robert Jun 22, 2013 7786
Enhanced time-bound ticket-based mutual authentication scheme for cloud computing. Pippal, Ravi Singh; Jaidhar, C.D.; Tapaswi, Shashikala Report Jun 1, 2013 5689
An improved dynamic password-based user authentication scheme for hierarchical wireless sensor networks. Turkanovic, M.; Holbl, M. Report Jun 1, 2013 8070
Cryptanalysis of an 'Efficient-Strong Authentication Protocol (E-SAP) for healthcare applications using wireless medical sensor networks'. Khan, Muhammad Khurram; Kumari, Saru; Singh, Pitam Report May 1, 2013 5460
A lightweight three-party privacy-preserving authentication key exchange protocol using smart card. Li, Xiaowei; Zhang, Yuqing; Liu, Xuefeng; Cao, Jin Report May 1, 2013 8043
A device authentication mechanism reducing performance cost in mobile P2P networks. Jeong, Yoon-Su; Kim, Yong-Tae; Shin, Seung-Soo; Lee, Sang-Ho Report Apr 1, 2013 11621
Increased bank liability for online fraud: the effect of Patco Construction Co. v. People's United Bank. Burrow, Robert K. Mar 1, 2013 8246
Genetic algorithm based palm recognition method for biometric authentication systems. Cenys, A.; Gibavicius, D.; Goranin, N.; Marozas, L. Report Feb 1, 2013 4048
Design and performance analysis of Queue-based Group Diffie-Hellman protocol (QGDH). Hong, Sunghyuck; Lee, Sungjin Report Jan 1, 2013 7289
An extended multi-server-based user authentication and key agreement scheme with user anonymity. Li, Chun-Ta; Lee, Cheng-Chi; Weng, Chi-Yao; Fan, Chun-I Report Jan 1, 2013 6142
Challenges in implementation of automated identification technology. Stankovski, S.; Ostojic, G. Report Jan 1, 2013 7958
Proposal and its evaluation of a shoulder-surfing attack resistant authentication method: secret tap with double shift. Kita, Yoshihiro; Sugai, Fumio; Park, MiRang; Okazaki, Naonobu Report Jan 1, 2013 3639
Secure and efficient anonymous authentication scheme in global mobility networks. Kim, Jun-Sub; Kwak, Jin Report Jan 1, 2013 7460
An anonymous user authentication with key agreement scheme without pairings for multiserver architecture using SCPKS. Jiang, Peng; Wen, Qiaoyan; Li, Wenmin; Jin, Zhengping; Zhang, Hua Report Jan 1, 2013 6490
Analysis of Attacks in Authentication Protocol of IEEE 802.16e. Sameni, Kamran; Yazdani, Nasser; Payandeh, Ali Report Jan 1, 2013 5280
Products authentication and traceability using RFID technology and OPC UA servers. Gaitan, A.M.; Popa, V.; Gaitan, V.G.; Petrariu, A.I.; Ungurean, I. Report Dec 1, 2012 2383
Priority based tag authentication and routing algorithm for intermodal containers RFID sensor network. Andziulis, Arunas; Plestys, Rimantas; Jakovlev, Sergej; Adomaitis, Danielius; Gerasimov, Konstantin; Report Dec 1, 2012 7530
Group key agreement from signcryption. Lv, Xixiang; Li, Hui Technical report Dec 1, 2012 6869
Efficient certificateless authenticated asymmetric group key agreement protocol. Wei, Guiyi; Yang, Xianbo; Shao, Jun Technical report Dec 1, 2012 6691
Ross: low-cost self-securing VoIP communication framework. Syafalni, Alfin; Samsudin, Azman; Jaafar, Yazid; Omar, Mohd. Adib Technical report Dec 1, 2012 8161
Histogram-based reversible data hiding based on pixel differences with prediction and sorting. Chang, Ya-Fen; Tai, Wei-Liang Technical report Dec 1, 2012 6041
Data security in unattended wireless sensor networks through aggregate signcryption. Babamir, Faezeh Sadat; Eslami, Ziba Report Nov 1, 2012 9036
MODELING AUTHENTICATION AND AUTHORIZATION SECURITY SERVICE FOR WS-SECURITY ARCHITECTURE. Memon, Mukhtiar; Menghwar, Gordhan D.; Jalbani, Akhtar A.; Depar, Mansoor H.; Rahu, Ghulam Ali Report Sep 30, 2012 2434
True: a trust evaluation service for Mobile Ad Hoc Networks resistant to malicious attacks. da Silva, Eduardo; Misaghi, Mehran; Albini, Luiz Carlos P. Report Aug 1, 2012 6155
Mitigating man-in-the-browser attacks with hardware-based authentication scheme. Nor, Fazli Bin Mat; Jalil, Kamarularifin Abd; Manan, Jamalul-lail Ab Report Jul 1, 2012 4957
Detection and countermeasure scheme for call-disruption attacks on SIP-based VoIP services. Ryu, Jea Tek; Roh, Byeong-hee; Ryu, Ki Yeol; Yoon, Myungchul Report Jul 1, 2012 6611
Study of finger vein authentication algorithms for physical access control/Pirstu kraujagysliu tapatumo nustatymo algoritmu taikymo fizines apsaugos sistemose tyrimas. Venckauskas, A.; Morkevicius, N.; Kulikauskas, K. Report May 1, 2012 2447
Security model for tree-based routing in wireless sensor networks: structure and evaluation. Almomani, Iman; Saadeh, Maha Report Apr 1, 2012 8338
Authenticating devices in ubiquitous computing environment. Jalil, Kamarularifin Abd; Rahman, Qatrunnada Binti Abdul Report Apr 1, 2012 4415
Image tamper detection and recovery based on dual watermarks sharing strategy. Chen, Yi-Hui; Chang, Chin-Chen Report Feb 1, 2012 6455
Security issues on machine to machine communications. Lai, Chengzhe; Li, Hui; Zhang, Yueyu; Cao, Jin Report Feb 1, 2012 5855
The classic security application in M2M: the authentication scheme of mobile payment. Hu, Liang; Chi, Ling; Li, Hong-tu; Yuan, Wei; Sun, Yuyu; Chu, Jian-feng Report Jan 1, 2012 6636
Security-effective local-lighted authentication mechanism in NEMO-based fast Proxy Mobile IPv6 Networks. Im, Illkyun; Jeong, Jongpil Report Jan 1, 2012 9130
Feature fusion approach on keystroke dynamics efficiency enhancement. Teh, Pin Shen; Yue, Shigang; Teoh, Andrew B.J. Report Jan 1, 2012 6920
The design and challenges of online reprogramming system for wireless sensor networks. Xie, Mande; Zhang, Guoping Report Dec 1, 2011 3688
Provisional access control model for mobile ad-hoc environments: application to mobile electronic commerce. Shin, Heechang; Moscato, Donald Report Dec 1, 2011 4711
Fingerprint template protection using one-time fuzzy vault. Choi, Woo Yong; Chung, Yongwha; Park, Jin-Won; Hong, Dowon Report Nov 1, 2011 6157
A new kind of 'fingerprint'. Brief article Sep 22, 2011 110
Attacks on and countermeasures for an RFID mutual authentication scheme in pervasive computing environment. Mohaisen, Abedelaziz; Chang, Ku-Young; Hong, Dowon Report Sep 1, 2011 7157
Improving productivity via simplified self-service authentication. Jun 1, 2011 645
A secure and efficient authentication protocol for mobile RFID systems. Sandhya, M.; Rangaswamy, T.R. Report Jun 1, 2011 5867
Fast remote user authentication scheme with smart card based on quadratic residue. Wu, Tzong-Sun; Lin, Han-Yu; Lee, Ming-Lun; Chen, Won-Yi Report Apr 1, 2011 2755
Password based anonymous authentication with private information retrieval. Nakamura, Toru; Inenaga, Shunsuke; Ikeda, Daisuke; Baba, Kensuke; Yasuura, Hiroto Report Apr 1, 2011 5689
Death knell sounds for traditional tokens. Kemshall, Andrew Apr 1, 2011 1050
Physical layer technique to assist authentication based on PKI for vehicular communication networks. Wen, Hong; Ho, Pin-Han Report Feb 1, 2011 5643
Coalesce techniques to secure web applications and databases against SQL injection attacks. Ahmad, Khaleel; Shekhar, Jayant; Yadav, K.P. Report Jan 1, 2011 2970
Parallel processing of the fuzzy fingerprint vault based on geometric hashing. Chae, Seung-Hoon; Lim, Sung Jin; Bae, Sang-Hyun; Chung, Yongwha; Pan, Sung Bum Report Dec 1, 2010 6441
A revocable fingerprint template for security and privacy preserving. Jin, Zhe; Teoh, Andrew Beng Jin; Ong, Thian Song; Tee, Connie Report Dec 1, 2010 5295
Mitigating CAPTCHA relay attacks using multiple challenge-response mechanism. Longe, Olumide B. Report Oct 1, 2010 3425
PKI and its applications in e-commerce in China. Bai, Qing-hai Report Jun 30, 2010 2977
Authentication and authorization: security issues for institutional digital repositories. Shoeb, Zahid Hossain; Sobhan, M. Abdus Report Jun 1, 2010 2945
Super-resolution iris image restoration using single image for iris recognition. Shin, Kwang Yong; Kang, Byung Jun; Park, Kang Ryoung Report Apr 1, 2010 6834
Multi-dimensional query authentication for on-line stream analytics. Chen, Xiangrui; Kim, Gyoung-Bae; Bae, Hae-Young Report Apr 1, 2010 9523
Biometric features in person recognition systems/Biometriniai pozymiai asmens atpazinimo sistemose. Ivanovas, Edgaras Jan 1, 2010 2010
Biometric techniques in identity management systems/Tapatybes tikrinimo sistemose naudojami biometriniai metodai. Volner, R.; Bores, P. Report Sep 1, 2009 2559
A new authentication scheme for session initiation protocol. Cheng-Chi, Lee; Chu-Chi, Yang; Shiow-Yuan, Huang Report Jun 1, 2009 3016
An exquisite mutual authentication scheme with key agreement using smart card. Liao, Chiu-Hsiung; Chen, Hon-Chan; Wang, Ching-Te Report May 1, 2009 5363
Assessing the risks of appraising and authenticating art. Kaufman, Joshua Apr 1, 2009 1425
Design and development of the dynamic DRBAC model using PMI and XACML-based authorization. Fugkeaw, Somchart; Manpanpanich, Piyawit; Juntapremjitt, Sekpon Report Apr 1, 2009 7757
Biorthogonal matrix dirty paper Coding for information hiding in still images. Xu, Xin; Tomlinson, Martin; Ambroze, Marcel; Ahmed, Mohammed Report Apr 1, 2009 7984
Swift and precise reversible watermarking scheme for medical image authentication. Thanuja, T.C.; Kumari, Uttara Report Jan 1, 2009 3058
Logging in and getting off: login, labor, literature, and the subject of the net. Baldwin, Sandy Essay Jan 1, 2009 9472
Practical password-authenticated three-party key exchange. Kwon, Jeong Ok; Jeong, Ik Rae; Lee, Dong Hoon Report Dec 1, 2008 9967
Lyris Inc makes DomainKeys Identified Mail technology available. Brief article Oct 22, 2008 145
CRYPTOCard launches 'Password Amnesty' with free limited trial of CRYPTO-MAS managed authentication service. Brief article Oct 8, 2008 152
Content-based watermarking for image authentication using independent component analysis. Parameswaran, Latha; Anbumani, K. Report Oct 1, 2008 4227
HealthVault selects two OpenID providers. Brief article Sep 1, 2008 108
Using automated identity and access management controls: protecting a network against insider attacks. Aldhizer, George R., III; Juras, Paul E.; Martin, Dale R. Sep 1, 2008 3533
A smart card based remote user authentication scheme. Misbahuddin, Mohammed; Premchand, P.; Govardhan, A. Jun 1, 2008 4135
Why do we have fingerprints? Brief article May 12, 2008 112
Authentic digital records: laying the foundation for evidence: a foundation for proving that records submitted as evidence are reliable, usable, and have integrity is built with policies and procedures based on standards and best practices--and documentation that shows they have been followed. Mason, Stephen Sep 1, 2007 2915
Two-factor authentication for online banking: here are some key things to consider when trying to satisfy new federal banking guidelines to protect online account access. Schmidt, Randy Aug 1, 2007 2576
PayPal Security Key introduced for eBay and PayPal users. Brief article Jun 18, 2007 177
Voice-verified payment processing system Voice Pay launches. Brief article May 1, 2007 165
iMagic Software receives US patent for password technology. Brief article Apr 20, 2007 133
A turner reclaimed: Eric Shanes re-examines a watercolour in the National Museum of Wales and concludes that its much-doubted attribution to Turner is correct. This remarkably beautiful image of a church and rainbow probably reflects anxiety in the 1830s about the fate of the Church of England in a period of parliamentary reform. Shanes, Eric Author abstract Mar 1, 2007 2355
Monet's Boulevard des Capucines: Kansas City or Moscow? At the first Impressionist exhibition in 1874, Monet's Boulevard des Capucines was both praised and reviled as an exemplar of the new style. However, it has never been clear which of his two 1873-74 views of the street--one now in Moscow, the other in Kansas City--was shown. Ian Kennedy reveals the answer. Kennedy, Ian Mar 1, 2007 1531
Citizens Bank adopts multi-factor authentication for online banking. Brief article Jan 11, 2007 130
Managed Authentication Service introduced by CRYPTOCard. Brief article Dec 6, 2006 202
Monitise introduces ACCODE two factor identification service. Brief article Oct 31, 2006 201
The emergence of biometrics and its effect on consumers. Langenderfer, Jeff; Linnhoff, Stefan Dec 22, 2005 9934
Artificial neural networks based fingerprint authentication with clusters algorithm. Allah, Mohamed Mostafa Abd Oct 1, 2005 3390
Intervoice fighting identity theft. Jul 1, 2005 349
New ID authentication tool uses nontraditional data sources. Brief Article Jul 1, 2005 140
Strong authentication can be effective. Jun 10, 2005 528
The failure of two-factor authentication. Jun 10, 2005 580
Who are you? Authentication technologies ensure users are who they claim to be. Cieslak, David May 1, 2005 1088
e-ID in mobile phones soon available in Sweden. Brief Article Mar 23, 2005 146
Authentication schemes lift the e-mail veil. Piazza, Peter Jan 1, 2005 792
The keys to identity: as healthcare organizations strive for greater security, some are using a very personal approach in the form of biometrics. Reynolds, Phil Cover Story Dec 1, 2004 2701
CipherTrust publishes study on Sender ID Framework adoption. Brief Article Nov 12, 2004 137
Thales product certified for BICS in the Swedish BankID network. Brief Article Sep 22, 2004 121
Blacklisted. Brief Article Apr 1, 2004 228
It's all in the palm. Brief Article Feb 2, 2004 159
Who's who? Brief Article Oct 1, 2003 125
Fingerprints: not a gold standard: a few judges are showing signs of skepticism, and it's about time. Mnookin, Jennifer L. Sep 22, 2003 5391
New technology could enable online signatures via the mouse. Brief Article Sep 2, 2003 121
Anthentication vs. privacy. (Tech Talk). Piazza, Peter Jun 1, 2003 386
Typical Briton has identity checked seven times per day. (Security). Brief Article May 1, 2003 223
BT launches URU identity verification scheme. Brief Article Mar 7, 2003 142
BT launches URU identity verification scheme. Brief Article Mar 7, 2003 152
Positive identification in a wireless world. (Software Intelligence). Ardoin, Paul Industry Overview Feb 1, 2003 914
Precise Biometrics AB and I/O Software Inc to join forces within authentication. Brief Article Nov 7, 2002 114
Charter teachers fingerprinted. (Notebook: education information from schools, business, research and professional organizations). Silverman, Fran Brief Article Oct 1, 2002 259
Gartner Group finds consumers wary of online authentication. Brief Article Apr 29, 2002 127
iShopSecure Inc. Brief Article Jun 1, 2001 133
Authentication & Counterfeiting Protection Prague. Brief Article Nov 1, 2000 222
Privacy, Anonymity and the Attack on Authentication Technologies. Baker, Stewart A. Aug 1, 2000 1191
Future Vision: Threat or Opportunity? Brief Article Jul 1, 2000 464
Web Authentication Card Attracts Credit Card Interest. Brief Article Jul 1, 2000 384
A survey of password mechanisms. Jobusch, David L.; Oldhoeft, Arthur E. Jan 1, 1992 3878
Practice problems involving documentary evidence. Carmichael, Douglas R. Dec 1, 1990 1504

Terms of use | Privacy policy | Copyright © 2021 Farlex, Inc. | Feedback | For webmasters |