-
1
-
-
0016092372
-
A user authentication scheme not requiring secrecy in the computer
-
A. J. Evans, W. Kantrowiz, and E. Weiss, "A user authentication scheme not requiring secrecy in the computer," Commun. ACM, vol. 17, pp. 437-442, 1974.
-
(1974)
Commun. ACM
, vol.17
, pp. 437-442
-
-
Evans, A.J.1
Kantrowiz, W.2
Weiss, E.3
-
2
-
-
0031194343
-
Informational capacity and recall quality in sparsely encoded Hopfield-like neural network: Analytical approaches and computer simulation
-
A. A. Frolov, D. Husek, and I. P. Muraviev, "Informational capacity and recall quality in sparsely encoded Hopfield-like neural network: Analytical approaches and computer simulation," Neural Netw., vol. 10, no. 5, pp. 845-855, 1997.
-
(1997)
Neural Netw
, vol.10
, Issue.5
, pp. 845-855
-
-
Frolov, A.A.1
Husek, D.2
Muraviev, I.P.3
-
3
-
-
0242302624
-
A secure PLAN
-
Aug
-
M. Hicks, A. D. Keromytis, and J. M. Smith, "A secure PLAN," IEEE Trans. Syst., Man, Cybern. C, Appl. Rev., vol. 33, no. 3, pp. 413-426, Aug. 2003.
-
(2003)
IEEE Trans. Syst., Man, Cybern. C, Appl. Rev
, vol.33
, Issue.3
, pp. 413-426
-
-
Hicks, M.1
Keromytis, A.D.2
Smith, J.M.3
-
5
-
-
0020118274
-
Neural networks and physical systems with emergent collective computational abilities
-
J. J. Hopfield, "Neural networks and physical systems with emergent collective computational abilities," in Proc. Natl. Acad. Sci. USA vol. 79, pp. 2554-2558, 1982.
-
(1982)
Proc. Natl. Acad. Sci. USA
, vol.79
, pp. 2554-2558
-
-
Hopfield, J.J.1
-
6
-
-
0004469897
-
Neurons with graded response have collective computational properties like those of two-state neurons
-
J. J. Hopfield, "Neurons with graded response have collective computational properties like those of two-state neurons," in Proc. Natl. Acad. Sci. USA, vol. 81, pp. 3088-3092, 1984.
-
(1984)
Proc. Natl. Acad. Sci. USA
, vol.81
, pp. 3088-3092
-
-
Hopfield, J.J.1
-
7
-
-
0022504321
-
Computing with neural circuits
-
J. J. Hopfield and D. W. Tank, "Computing with neural circuits," Science, vol. 233, pp. 625-633, 1986.
-
(1986)
Science
, vol.233
, pp. 625-633
-
-
Hopfield, J.J.1
Tank, D.W.2
-
8
-
-
4243096135
-
The domino effect of password reuse
-
Apr
-
B. Ives, K. R. Walsh, and H. Schneider, "The domino effect of password reuse," Commun. ACM, vol. 47, no. 4, pp. 75-79, Apr. 2004.
-
(2004)
Commun. ACM
, vol.47
, Issue.4
, pp. 75-79
-
-
Ives, B.1
Walsh, K.R.2
Schneider, H.3
-
9
-
-
0035506864
-
A remote password authentication scheme for multiserver architecture using neural networks
-
Nov
-
L. H. Li, I. C. Lin, and M. S. Hwang, "A remote password authentication scheme for multiserver architecture using neural networks," IEEE Trans. Neural Netw., vol. 12, no. 6, pp. 1498-1504, Nov. 2001.
-
(2001)
IEEE Trans. Neural Netw
, vol.12
, Issue.6
, pp. 1498-1504
-
-
Li, L.H.1
Lin, I.C.2
Hwang, M.S.3
-
10
-
-
0030085144
-
An automatic indexing and neural network approach to concept retrieval and classification of multilingual (Chinese-English) documents
-
Feb
-
C. H. Lin and H. Chen, "An automatic indexing and neural network approach to concept retrieval and classification of multilingual (Chinese-English) documents," IEEE Trans. Syst., Man, Cybern. B, Cybern., vol. 26, no. 1, pp. 1-14, Feb. 1996.
-
(1996)
IEEE Trans. Syst., Man, Cybern. B, Cybern
, vol.26
, Issue.1
, pp. 1-14
-
-
Lin, C.H.1
Chen, H.2
-
11
-
-
0001174154
-
Polynomial codes over certain finite fields
-
I. S. Reed and G. Solomon, "Polynomial codes over certain finite fields," SIAM J. Appl. Math., vol. 8, no. 2, pp. 200-304, 1960.
-
(1960)
SIAM J. Appl. Math
, vol.8
, Issue.2
, pp. 200-304
-
-
Reed, I.S.1
Solomon, G.2
-
12
-
-
0030086382
-
Role-based access control models
-
Feb
-
R. Sandhu, E. Coyne, H. Feinstein, and C. Youman, "Role-based access control models," IEEE Comput., vol. 29, no. 2, pp. 38-47, Feb. 1996.
-
(1996)
IEEE Comput
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
13
-
-
0023493211
-
Collective computation in neuronlike circuits
-
D. W. Tank and J. J. Hopfield, "Collective computation in neuronlike circuits," Sci. Amer., vol. 257, no. 6, pp. 104-114, 1987.
-
(1987)
Sci. Amer
, vol.257
, Issue.6
, pp. 104-114
-
-
Tank, D.W.1
Hopfield, J.J.2
-
14
-
-
40949152760
-
Password authentication schemes: Current status and key issues
-
C. S. Tsai, C. C. Lee, and M. S. Hwang, "Password authentication schemes: Current status and key issues," Int. J. Netw. Secur., vol. 3, no. 2, pp. 101-115, 2006.
-
(2006)
Int. J. Netw. Secur
, vol.3
, Issue.2
, pp. 101-115
-
-
Tsai, C.S.1
Lee, C.C.2
Hwang, M.S.3
-
15
-
-
0029696153
-
A simple scheme to make passwords based on one-way function much harder to crack
-
M. Udi, "A simple scheme to make passwords based on one-way function much harder to crack," Comput. Secur., vol. 15, no. 2, pp. 171-176, 1996.
-
(1996)
Comput. Secur
, vol.15
, Issue.2
, pp. 171-176
-
-
Udi, M.1
-
16
-
-
0036880613
-
A LP-RR principle based admission control for a mobile network
-
Nov
-
B. P. V. Kumar and P. Venkataram, "A LP-RR principle based admission control for a mobile network," IEEE Trans. Syst., Man, Cybern. C, Appl. Rev., vol. 32, no. 4, pp. 293-306, Nov. 2002.
-
(2002)
IEEE Trans. Syst., Man, Cybern. C, Appl. Rev
, vol.32
, Issue.4
, pp. 293-306
-
-
Kumar, B.P.V.1
Venkataram, P.2
|