„authentication protocols“
Suchergebnisse
1.000+ Treffer
-
VQR: vulnerability analysis in quadratic residues-based authentication protocols
-
Transactions on Large-Scale Data- and Knowledge-Centered Systems LII
-
Transactions on Large-Scale Data- and Knowledge-Centered Systems LVI – Special Issue on Data Management - Principles, Technologies, and Applications
-
Conditional Privacy-Preserving Authentication Protocols for Vehicular Ad Hoc Networks
-
Public Key Cryptography – PKC 2011 – 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedings
-
Leveraging New Paradigms for Enhanced Mobile Network Security
-
Security Protocols XVIII – 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers
-
Security in Computing and Communications – Second International Symposium, SSCC 2014, Delhi, India, September 24-27, 2014. Proceedings
-
Principles of Security and Trust – Third International Conference, POST 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014, Proceedings
-
Data Privacy Management and Autonomous Spontaneous Security – 8th International Workshop, DPM 2013, and 6th International Workshop, SETOP 2013, Egham, UK, September 12-13, 2013, Revised Selected Papers
-
Security Protocols XXI – 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers
-
Radio Frequency Identification – Security and Privacy Issues 9th International Workshop, RFIDsec 2013, Graz, Austria, July 9-11, 2013, Revised Selected Papers
-
Applied Cryptography and Network Security – 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings
-
Information Security and Cryptology – 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papers
-
Security Protocols XVII – 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers
-
Network and System Security – 6th International Conference, NSS 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings
-
Security and Privacy in Communication Networks – 7th International ICST Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers
-
Trusted Systems – Third International Conference, INTRUST 2011, Beijing, China, November 27-29, 2011, Revised Selected Papers
-
Formal Aspects of Security and Trust – 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers
-
Applied Cryptography and Network Security – 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012. Proceedings