Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
PDF Tools
Image Tools
Text Tools
OCR Tools
Symbol and Emoji Tools
On-screen Keyboard
Latex Math Equation to Image
Smart IPA Phonetic Keyboard
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
1490
search results - page 51 / 298
»
The Logic of Authentication Protocols
Sort
relevance
views
votes
recent
update
View
thumb
title
85
Voted
CORR
2010
Springer
125
views
Education
»
more
CORR 2010
»
Comments on Five Smart Card Based Password Authentication Protocols
15 years 3 months ago
Download
eprint.iacr.org
Yalin Chen, Jue-Sam Chou, Chun-Hui Huang
claim paper
Read More »
97
click to vote
IJSN
2006
56
views
more
IJSN 2006
»
A self-encryption authentication protocol for teleconference services
15 years 3 months ago
Download
bbcr.uwaterloo.ca
Yixin Jiang, Chuang Lin, Minghui Shi, Xuemin Shen
claim paper
Read More »
67
click to vote
JISE
2006
37
views
more
JISE 2006
»
Secure Authentication Protocols Resistant to Guessing Attacks
15 years 3 months ago
Download
www.iis.sinica.edu.tw
Jia-Ning Luo, Shiuh-Pyng Shieh, Ji-Chiang Shen
claim paper
Read More »
114
Voted
NETWORKS
2006
73
views
Computer Networks
»
more
NETWORKS 2006
»
An improved deniable authentication protocol
15 years 3 months ago
Download
paper.ijcsns.org
Jun Shao, Zhenfu Cao, Rongxing Lu
claim paper
Read More »
102
Voted
SCN
2008
Springer
107
views
Communications
»
more
SCN 2008
»
AuthoCast - a mobility-compliant protocol framework for multicast sender authentication
15 years 3 months ago
Download
home.fhtw-berlin.de
Thomas C. Schmidt, Matthias Wählisch, Olaf Ch...
claim paper
Read More »
« Prev
« First
page 51 / 298
Last »
Next »