Sciweavers

1490 search results - page 51 / 298
» The Logic of Authentication Protocols
Sort
View
CORR
2010
Springer
125views Education» more  CORR 2010»
13 years 9 months ago
Comments on Five Smart Card Based Password Authentication Protocols
Yalin Chen, Jue-Sam Chou, Chun-Hui Huang
IJSN
2006
56views more  IJSN 2006»
13 years 8 months ago
A self-encryption authentication protocol for teleconference services
Yixin Jiang, Chuang Lin, Minghui Shi, Xuemin Shen
JISE
2006
37views more  JISE 2006»
13 years 8 months ago
Secure Authentication Protocols Resistant to Guessing Attacks
Jia-Ning Luo, Shiuh-Pyng Shieh, Ji-Chiang Shen
NETWORKS
2006
13 years 8 months ago
An improved deniable authentication protocol
Jun Shao, Zhenfu Cao, Rongxing Lu
SCN
2008
Springer
107views Communications» more  SCN 2008»
13 years 8 months ago
AuthoCast - a mobility-compliant protocol framework for multicast sender authentication
Thomas C. Schmidt, Matthias Wählisch, Olaf Ch...