„Authentication“
Suchergebnisse
3.280 Treffer
-
Trapdoor Hard-to-Invert Group Isomorphisms and Their Application to Password-Based Authentication
-
On a Fallacious Bound for Authentication Codes
-
Bucket Hashing and Its Application to Fast Message Authentication
-
Zero-Knowledge Authentication Scheme with Secret Key Exchange
-
Information-theoretic bounds for authentication codes and block designs
-
A lower bound on authentication after having observed a sequence of messages
-
New bounds and constructions for authentication/secrecy codes with splitting
-
Information-theoretic bounds for authentication schemes
-
A cartesian product construction for unconditionally secure authentication codes that permit arbitration
-
The combinatorics of authentication and secrecy codes
-
A construction for authentication/secrecy codes from certain combinatorial designs
-
Some constructions and bounds for authentication codes
-
Secure Computation Without Authentication
-
New Approaches for Deniable Authentication
-
An authentication protocol based on chaos and zero knowledge proof
-
An efficient key authentication procedure for IND-CCA2 secure Paillier-based cryptosystem
-
Authentication of splicing manipulation by exposing inconsistency in color shift
-
Enhancing RESTful Web Service Security – With A Multi-Factor Authentication Mechanism
-
Public Auditing Technique for Securing Privacy in Cloud Storage – Cloud Server Security
-
Protocols for Authentication and Key Establishment