Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
PDF Tools
Image Tools
Text Tools
OCR Tools
Symbol and Emoji Tools
On-screen Keyboard
Latex Math Equation to Image
Smart IPA Phonetic Keyboard
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
1490
search results - page 47 / 298
»
The Logic of Authentication Protocols
Sort
relevance
views
votes
recent
update
View
thumb
title
113
Voted
SACRYPT
2009
Springer
146
views
Cryptology
»
more
SACRYPT 2009
»
More on the Security of Linear RFID Authentication Protocols
15 years 10 months ago
Download
th.informatik.uni-mannheim.de
Matthias Krause, Dirk Stegemann
claim paper
Read More »
102
Voted
AFRICACRYPT
2008
Springer
109
views
Cryptology
»
more
AFRICACRYPT 2008
»
An Authentication Protocol with Encrypted Biometric Data
15 years 10 months ago
Download
www.math.unicaen.fr
Julien Bringer, Hervé Chabanne
claim paper
Read More »
90
Voted
IEEEARES
2007
IEEE
91
views
Security Privacy
»
more
IEEEARES 2007
»
A Human-Verifiable Authentication Protocol Using Visible Laser Light
15 years 9 months ago
Download
www.mayrhofer.eu.org
Rene Mayrhofer, Martyn Welch
claim paper
Read More »
101
Voted
WETICE
2005
IEEE
126
views
Emerging Technology
»
more
WETICE 2005
»
A Strong User Authentication Protocol for GSM
15 years 9 months ago
Download
nob.cs.ucdavis.edu
Ozer Aydemir, Ali Aydyn Selcuk
claim paper
Read More »
97
click to vote
MSWIM
2005
ACM
119
views
Modeling and Simulation
»
more
MSWIM 2005
»
Authentication protocols for ad hoc networks: taxonomy and research issues
15 years 9 months ago
Download
www.uclouvain.be
Nidal Aboudagga, M. Tamer Refaei, Mohamed Eltoweis...
claim paper
Read More »
« Prev
« First
page 47 / 298
Last »
Next »