-
1
-
-
78649322624
-
A survey on security issues in service delivery models of cloud computing
-
Jan.
-
S. Subashini and V. Kavitha, "A survey on security issues in service delivery models of cloud computing", Journal of Network and Computer Applications, Vol.34, No.1, Jan. 2011, pp.1-11.
-
(2011)
Journal of Network and Computer Applications
, vol.34
, Issue.1
, pp. 1-11
-
-
Subashini, S.1
Kavitha, V.2
-
2
-
-
84880192224
-
Security and Privacy in Cloud Computing: A Survey
-
M. Zhou, Z. Rong, W. Xie, W. Qian, and A. Zhou, "Security and Privacy in Cloud Computing: A Survey", Proc. of the Sixth International Conference Semantics Knowledge and Grid (SKG'10), Beijing, China, Nov. 2010, pp.105-112.
-
Proc. of the Sixth International Conference Semantics Knowledge and Grid (SKG'10), Beijing, China, Nov. 2010
, pp. 105-112
-
-
Zhou, M.1
Rong, Z.2
Xie, W.3
Qian, W.4
Zhou, A.5
-
3
-
-
77950803004
-
A Secure Construction for Threshold Anonymous Password-Authenticated Key Exchange
-
S. Shin, K. Kobara, and H. Imai, "A Secure Construction for Threshold Anonymous Password-Authenticated Key Exchange", IEICE Transactions on Fundamentals, Vol.E91-A, No.11, 2008, pp.3312-3323.
-
(2008)
IEICE Transactions on Fundamentals
, vol.E91-A
, Issue.11
, pp. 3312-3323
-
-
Shin, S.1
Kobara, K.2
Imai, H.3
-
4
-
-
78649321231
-
A fingerprint based biocryptographic security protocol designed for client/server authentication in mobile computing environment
-
May
-
K. Xi, T. Ahmad, F. Han, and J. Hu, "A fingerprint based biocryptographic security protocol designed for client/server authentication in mobile computing environment", Security and Communication Networks, Vol.4, No.5, May 2011, pp.487-499.
-
(2011)
Security and Communication Networks
, vol.4
, Issue.5
, pp. 487-499
-
-
Xi, K.1
Ahmad, T.2
Han, F.3
Hu, J.4
-
5
-
-
0031122443
-
On-line fingerprint verification
-
A. Jain and L. Hong, "On-line fingerprint verification", IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 19, 1997, pp. 302-314. (Pubitemid 127762887)
-
(1997)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.19
, Issue.4
, pp. 302-314
-
-
Jain, A.1
Hong, L.2
Bolle, R.3
-
6
-
-
58449088433
-
Anonymous and Transparent Gateway-Based Password-Authenticated Key Exchange
-
M. Abdalla, M. Izabachene, and D. Pointcheval, "Anonymous and Transparent Gateway-Based Password-Authenticated Key Exchange", Proc. International Conference on Cryptology and Network Security (CANS'08), Hong Kong, China, Dec. 2008, pp.133-148.
-
Proc. International Conference on Cryptology and Network Security (CANS'08), Hong Kong, China, Dec. 2008
, pp. 133-148
-
-
Abdalla, M.1
Izabachene, M.2
Pointcheval, D.3
-
7
-
-
84867406219
-
A Practical Privacy-preserving Password authentication Scheme for Cloud Computing
-
A. A. Yassin, H. Jin, A. Ibrahim, W. Qiang, D. Zou, "A Practical Privacy-preserving Password authentication Scheme for Cloud Computing", Proc. of the IEEE 26th International Parallel and Distributed Processing Symposium Workshops & PhD Forum (IPDPSW'12), May 2012, Shanghai, China, pp.1204-1211.
-
Proc. of the IEEE 26th International Parallel and Distributed Processing Symposium Workshops & PhD Forum (IPDPSW'12), May 2012, Shanghai, China
, pp. 1204-1211
-
-
Yassin, A.A.1
Jin, H.2
Ibrahim, A.3
Qiang, W.4
Zou, D.5
-
9
-
-
33947268946
-
Extraction of Level 2 and Level 3-features for fragmentary fingerprints
-
K. M. Kryszczuk, A. Drygajlo, and P. Morier, "Extraction of Level 2 and Level 3-features for fragmentary fingerprints", Proc. of the 2nd COST275 Workshop, Vigo, Spain, 2004, pp.83-88.
-
Proc. of the 2nd COST275 Workshop, Vigo, Spain, 2004
, pp. 83-88
-
-
Kryszczuk, K.M.1
Drygajlo, A.2
Morier, P.3
-
10
-
-
33646095185
-
An analysis of biohashing and its variants
-
July
-
A. Kong, K.-H. Cheung, D. Zhang, M. Kamel, and J. You, "An analysis of biohashing and its variants", Pattern Recognition, Vol. 39, No.7, July 2006, pp.1359-1368.
-
(2006)
Pattern Recognition
, vol.39
, Issue.7
, pp. 1359-1368
-
-
Kong, A.1
Cheung, K.-H.2
Zhang, D.3
Kamel, M.4
You, J.5
-
11
-
-
33646844820
-
Anonymous Password-Based Authenticated Key Exchange
-
D. Q. Viet, A. Yamamura, and T. Hidema, "Anonymous Password-Based Authenticated Key Exchange", Proc. of 6th International Conference on Cryptology in India (Indocryp'05), Bangalore, India, Dec. 2005, pp.233-257.
-
Proc. of 6th International Conference on Cryptology in India (Indocryp'05), Bangalore, India, Dec. 2005
, pp. 233-257
-
-
Viet, D.Q.1
Yamamura, A.2
Hidema, T.3
-
12
-
-
56649111147
-
One-Time Password Access to Any Server Without Changing the Server
-
D. Florencio and C. Herley, "One-Time Password Access to Any Server Without Changing the Server", Proc. of the International Supercomputing Conference(ISC'08), Taipei, Taiwan, 2008, pp.401-420.
-
Proc. of the International Supercomputing Conference(ISC'08), Taipei, Taiwan, 2008
, pp. 401-420
-
-
Florencio, D.1
Herley, C.2
-
13
-
-
85084162119
-
Hand-held computers can be better smart cards
-
D. Balfanz and E. W. Felten, "Hand-held computers can be better smart cards", Proc. of the 8th Conference on USENIX Security Symposium, Washington, D.C, USA, 1999, pp.3-11.
-
Proc. of the 8th Conference on USENIX Security Symposium, Washington, D.C, USA, 1999
, pp. 3-11
-
-
Balfanz, D.1
Felten, E.W.2
-
14
-
-
84864770378
-
Enhanced Biometrics-based Remote User Authentication Scheme Using Smart Cards
-
Apr.
-
S. Jeon, H. S. Kim, and M. S. Kim, "Enhanced Biometrics-based Remote User Authentication Scheme Using Smart Cards", J. of Security Engineering, Vol.8, No.2, Apr. 2011, pp.237-254.
-
(2011)
J. of Security Engineering
, vol.8
, Issue.2
, pp. 237-254
-
-
Jeon, S.1
Kim, H.S.2
Kim, M.S.3
-
15
-
-
1542335451
-
Efficient password authenticated key agreement using smart cards
-
W. S. Juang, "Efficient password authenticated key agreement using smart cards", J. of Computers and Security, Vol. 23, No.2, pp.167-173, 2004.
-
(2004)
J. of Computers and Security
, vol.23
, Issue.2
, pp. 167-173
-
-
Juang, W.S.1
-
16
-
-
4043122631
-
A dynamic ID-based remote user authentication scheme
-
M. L. Das, A.Saxena, and V. P. Gulati, "A dynamic ID-based remote user authentication scheme", IEEE Transactions on Consumer Electronics, Vol.50, No. 2, pp.629-631, 2004.
-
(2004)
IEEE Transactions on Consumer Electronics
, vol.50
, Issue.2
, pp. 629-631
-
-
Das, M.L.1
Saxena, A.2
Gulati, V.P.3
-
17
-
-
0036302680
-
An efficient and practical solution to remote authentication: Smart card
-
H. Y. Chien, J. K. Jan, and Y. M Tseng, "An efficient and practical solution to remote authentication: smart card", J. of Computers and Security, Vol.21, No. 4, pp.372-375, 2002.
-
(2002)
J. of Computers and Security
, vol.21
, Issue.4
, pp. 372-375
-
-
Chien, H.Y.1
Jan, J.K.2
Tseng, Y.M.3
-
18
-
-
36049049404
-
An Introduction to Biometric Authentication Systems
-
Springer, London
-
J. Wayman, A. Jain, D. Maltoni, and D. Maio, "An Introduction to Biometric Authentication Systems", Biometric systems Technology, Design and Performance Evaluation, Springer, London, 2005, pp.1-20.
-
(2005)
Biometric Systems Technology, Design and Performance Evaluation
, pp. 1-20
-
-
Wayman, J.1
Jain, A.2
Maltoni, D.3
Maio, D.4
-
19
-
-
84875360292
-
Everything you need to know about biometric identification
-
Warfel & Miller Inc, Washington DC, Jan.
-
B. Millerr, "Everything you need to know about biometric identification", Personal Identification News 1988 Biometric Industry Directory, Warfel & Miller Inc, Washington DC, Jan. 1988.
-
(1988)
Personal Identification News 1988 Biometric Industry Directory
-
-
Millerr, B.1
-
20
-
-
70349792182
-
An efficient biometrics-based remote user authentication scheme using smart cards
-
Jan.
-
C.-T. Li and M.-S. Hwang, "An efficient biometrics-based remote user authentication scheme using smart cards", Journal of Network and Computer Applications, Vol.33, No.1, Jan. 2010, pp.1-5.
-
(2010)
Journal of Network and Computer Applications
, vol.33
, Issue.1
, pp. 1-5
-
-
Li, C.-T.1
Hwang, M.-S.2
-
21
-
-
0026154828
-
SPX: Global Authentication Using Public Key Certificate
-
J. Tardo and K. Alagappan, "SPX: Global Authentication Using Public Key Certificate", Proc. of the IEEE Symposium on Research in Security and Privacy (SRSP'92), Oakland, CA, USA, May 1991, pp.232-244.
-
Proc. of the IEEE Symposium on Research in Security and Privacy (SRSP'92), Oakland, CA, USA, May 1991
, pp. 232-244
-
-
Tardo, J.1
Alagappan, K.2
|