Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
Sci2ools
International Keyboard
Graphical Social Symbols
CSS3 Style Generator
OCR
Web Page to Image
Web Page to PDF
Merge PDF
Split PDF
Latex Equation Editor
Extract Images from PDF
Convert JPEG to PS
Convert Latex to Word
Convert Word to PDF
Image Converter
PDF Converter
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
632
search results - page 11 / 127
»
Two Facets of Authentication
Sort
relevance
views
votes
recent
update
View
thumb
title
30
click to vote
FSE
2005
Springer
68
views
Cryptology
»
more
FSE 2005
»
Two-Pass Authenticated Encryption Faster Than Generic Composition
14 years 3 months ago
Download
th.informatik.uni-mannheim.de
Stefan Lucks
claim paper
Read More »
26
click to vote
ASIAN
2006
Springer
126
views
Algorithms
»
more
ASIAN 2006
»
Certificateless Authenticated Two-Party Key Agreement Protocols
14 years 1 months ago
Download
www.mista.nu
Tarjei K. Mandt, Chik How Tan
claim paper
Read More »
16
click to vote
ETS
2002
IEEE
104
views
Hardware
»
more
ETS 2002
»
Two Kinds of Scaffolding: The Dialectical Process within the Authenticity-Generalizibility (A-G) Continuum
13 years 9 months ago
Download
www.ifets.info
Chen Der-Thanq, Hung W. L. David
claim paper
Read More »
19
click to vote
CISC
2009
Springer
134
views
Cryptology
»
more
CISC 2009
»
Weaknesses in Two Recent Lightweight RFID Authentication Protocols
13 years 7 months ago
Download
www.cosic.esat.kuleuven.be
Pedro Peris-Lopez, Julio C. Hernandez-Castro, Juan...
claim paper
Read More »
19
click to vote
JSS
2006
65
views
more
JSS 2006
»
Cryptanalysis of a hybrid authentication protocol for large mobile networks
13 years 9 months ago
Download
www.isg.rhul.ac.uk
In this paper we analyse a hybrid authentication protocol due to Chien and Jan, designed for use in large mobile networks. The proposed protocol consists of two sub-protocols, nam...
Qiang Tang, Chris J. Mitchell
claim paper
Read More »
« Prev
« First
page 11 / 127
Last »
Next »