Sciweavers

1573 search results - page 27 / 315
» Strong User Authentication
Sort
View
IJNSEC
2008
106views more  IJNSEC 2008»
13 years 11 months ago
Comments on "Improved Efficient Remote User Authentication Schemes"
Recently, Tian et al. presented an article, in which they discussed some security weaknesses of Yoon et al.'s scheme and subsequently proposed two "improved" scheme...
Manik Lal Das
IJIIP
2010
83views more  IJIIP 2010»
13 years 8 months ago
An Improved Biometrics-based User Authentication Scheme without Concurrency System
Chin-Chen Chang, Shih-Chang Chang, Yu-Wei Lai
TELSYS
2010
71views more  TELSYS 2010»
13 years 5 months ago
A novel user's authentication scheme for pervasive on-line media services
Neng-Wen Wang, Han-Chieh Chao, Ing-Yi Chen, Yueh-M...