Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
PDF Tools
Image Tools
Text Tools
OCR Tools
Symbol and Emoji Tools
On-screen Keyboard
Latex Math Equation to Image
Smart IPA Phonetic Keyboard
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
1490
search results - page 50 / 298
»
The Logic of Authentication Protocols
Sort
relevance
views
votes
recent
update
View
thumb
title
110
click to vote
CIS
2006
Springer
108
views
Applied Computing
»
more
CIS 2006
»
Security and Privacy on Authentication Protocol for Low-Cost RFID
15 years 7 months ago
Download
caislab.kaist.ac.kr
Yong-Zhen Li, Young-Bok Cho, Nam-Kyoung Um, Sang H...
claim paper
Read More »
96
click to vote
CSREASAM
2007
97
views
Security Privacy
»
more
CSREASAM 2007
»
An Efficient Authentication Protocol for GSM
15 years 5 months ago
Download
jitas.im.cpu.edu.tw
Ashutosh Saxena, Shailaja Gummadidala, Phani Kumar...
claim paper
Read More »
119
click to vote
CMS
2003
119
views
Communications
»
more
CMS 2003
»
AUTHMAC_DH: A New Protocol for Authentication and Key Distribution
15 years 5 months ago
Download
security.polito.it
Heba Kamal Aslan
claim paper
Read More »
110
click to vote
SPRINGSIM
2007
64
views
Modeling And Simulation
»
more
SPRINGSIM 2007
»
HEAP: hop-by-hop efficient authentication protocol for Mobile Ad-hoc Networks
15 years 5 months ago
Download
www.cs.utsa.edu
Rehan Akbani, Turgay Korkmaz, G. V. S. Raju
claim paper
Read More »
81
Voted
CEE
2010
66
views
more
CEE 2010
»
Enhancements of authenticated multiple key exchange protocol based on bilinear pairings
15 years 4 months ago
Download
caislab.kaist.ac.kr
Duc-Liem Vo, Hyunrok Lee, Chan-Yeob Yeun, Kwangjo ...
claim paper
Read More »
« Prev
« First
page 50 / 298
Last »
Next »