Sciweavers

1490 search results - page 47 / 298
» The Logic of Authentication Protocols
Sort
View
113
Voted
SACRYPT
2009
Springer
146views Cryptology» more  SACRYPT 2009»
15 years 10 months ago
More on the Security of Linear RFID Authentication Protocols
Matthias Krause, Dirk Stegemann
102
Voted
AFRICACRYPT
2008
Springer
15 years 10 months ago
An Authentication Protocol with Encrypted Biometric Data
Julien Bringer, Hervé Chabanne
90
Voted
IEEEARES
2007
IEEE
15 years 9 months ago
A Human-Verifiable Authentication Protocol Using Visible Laser Light
Rene Mayrhofer, Martyn Welch
101
Voted
WETICE
2005
IEEE
15 years 9 months ago
A Strong User Authentication Protocol for GSM
Ozer Aydemir, Ali Aydyn Selcuk
MSWIM
2005
ACM
15 years 9 months ago
Authentication protocols for ad hoc networks: taxonomy and research issues
Nidal Aboudagga, M. Tamer Refaei, Mohamed Eltoweis...