Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
Sci2ools
International Keyboard
Graphical Social Symbols
CSS3 Style Generator
OCR
Web Page to Image
Web Page to PDF
Merge PDF
Split PDF
Latex Equation Editor
Extract Images from PDF
Convert JPEG to PS
Convert Latex to Word
Convert Word to PDF
Image Converter
PDF Converter
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
1490
search results - page 51 / 298
»
The Logic of Authentication Protocols
Sort
relevance
views
votes
recent
update
View
thumb
title
21
click to vote
CORR
2010
Springer
125
views
Education
»
more
CORR 2010
»
Comments on Five Smart Card Based Password Authentication Protocols
13 years 9 months ago
Download
eprint.iacr.org
Yalin Chen, Jue-Sam Chou, Chun-Hui Huang
claim paper
Read More »
19
click to vote
IJSN
2006
56
views
more
IJSN 2006
»
A self-encryption authentication protocol for teleconference services
13 years 8 months ago
Download
bbcr.uwaterloo.ca
Yixin Jiang, Chuang Lin, Minghui Shi, Xuemin Shen
claim paper
Read More »
12
click to vote
JISE
2006
37
views
more
JISE 2006
»
Secure Authentication Protocols Resistant to Guessing Attacks
13 years 8 months ago
Download
www.iis.sinica.edu.tw
Jia-Ning Luo, Shiuh-Pyng Shieh, Ji-Chiang Shen
claim paper
Read More »
21
click to vote
NETWORKS
2006
73
views
Computer Networks
»
more
NETWORKS 2006
»
An improved deniable authentication protocol
13 years 8 months ago
Download
paper.ijcsns.org
Jun Shao, Zhenfu Cao, Rongxing Lu
claim paper
Read More »
19
click to vote
SCN
2008
Springer
107
views
Communications
»
more
SCN 2008
»
AuthoCast - a mobility-compliant protocol framework for multicast sender authentication
13 years 8 months ago
Download
home.fhtw-berlin.de
Thomas C. Schmidt, Matthias Wählisch, Olaf Ch...
claim paper
Read More »
« Prev
« First
page 51 / 298
Last »
Next »