-
2
-
-
62749159291
-
Biometric authentication and authorization infrastructure
-
Dawson, Ed., Lopez, J., Montenegro, J.A., Okamoto, E.: 'Biometric authentication and authorization infrastructure'. Proc. 3rd Information Technology Research and Education Conf., 2004, pp. 274-278
-
(2004)
Proc. 3rd Information Technology Research and Education Conf.
, pp. 274-278
-
-
Dawson, Ed.1
Lopez, J.2
Montenegro, J.A.3
Okamoto, E.4
-
3
-
-
84880670868
-
Endpoint security: managing USB-based removable devices with the advent of portable applications
-
Fabian, M.: 'Endpoint security: managing USB-based removable devices with the advent of portable applications'. Proc. 4th Annual Conf. Information Security Curriculum Development, 2007, pp. 28-32
-
(2007)
Proc. 4th Annual Conf. Information Security Curriculum Development
, pp. 28-32
-
-
Fabian, M.1
-
5
-
-
57649098365
-
ID-based authentication scheme combined with identity based encryption with fingerprint hashing
-
Jiang, W.Q., Huang, Z.Q., Yang, Y.X., Tian, J., Li, L.: 'ID-based authentication scheme combined with identity based encryption with fingerprint hashing', J. China Univ. Posts and Telecommun., 2008, 15, (4), pp. 75-80
-
(2008)
J. China Univ. Posts and Telecommun.
, vol.15
, Issue.4
, pp. 75-80
-
-
Jiang, W.Q.1
Huang, Z.Q.2
Yang, Y.X.3
Tian, J.4
Li, L.5
-
6
-
-
1542335451
-
Efficient password authenticated key agreement using smart cards
-
Juang, W.S.: 'Efficient password authenticated key agreement using smart cards', Comput. Secur., 2004, 23, (1), pp. 167-173
-
(2004)
Comput. Secur.
, vol.23
, Issue.1
, pp. 167-173
-
-
Juang, W.S.1
-
7
-
-
4043139259
-
A flexible biometrics remote user authentication scheme
-
Lin, C.H., Lai, Y.Y.: 'A flexible biometrics remote user authentication scheme', Comput. Stand. Interf., 2004, 27, (1), pp. 19-23
-
(2004)
Comput. Stand. Interf.
, vol.27
, Issue.1
, pp. 19-23
-
-
Lin, C.H.1
Lai, Y.Y.2
-
8
-
-
26844511307
-
An enhanced user authentication scheme for multi-server internet services
-
Tsaur, W.J., Wu, C.C., Lee, W.B.: 'An enhanced user authentication scheme for multi-server internet services', Math. Comput., 2005, 170, (1), pp. 258-266
-
(2005)
Math. Comput.
, vol.170
, Issue.1
, pp. 258-266
-
-
Tsaur, W.J.1
Wu, C.C.2
Lee, W.B.3
-
9
-
-
78651401376
-
A secure control protocol for USB mass storage devices
-
Yang, F.Y., Wu, T.D., Chiu, S.H.: 'A secure control protocol for USB mass storage devices', IEEE Trans. Consum. Electron., 2010, 56, (4), pp. 2339-2343
-
(2010)
IEEE Trans. Consum. Electron.
, vol.56
, Issue.4
, pp. 2339-2343
-
-
Yang, F.Y.1
Wu, T.D.2
Chiu, S.H.3
-
10
-
-
52949137008
-
Two-factor mutual authentication based on smart cards and passwords
-
Yang, G., Wong, D.S., Wang, H., Deng, X.: 'Two-factor mutual authentication based on smart cards and passwords', J. Comput. Syst. Sci., 2008, 74, (7), pp. 1160-1172
-
(2008)
J. Comput. Syst. Sci.
, vol.74
, Issue.7
, pp. 1160-1172
-
-
Yang, G.1
Wong, D.S.2
Wang, H.3
Deng, X.4
-
11
-
-
79955378910
-
Remote mutual authentication and key agreement scheme based on elliptic curve cryptosystem
-
Yoon, E.J.: 'Remote mutual authentication and key agreement scheme based on elliptic curve cryptosystem', Turk. J. Electr. Engng. Comput. Sci., 2011, 19, (3), pp. 335-347
-
(2011)
Turk. J. Electr. Engng. Comput. Sci.
, vol.19
, Issue.3
, pp. 335-347
-
-
Yoon, E.J.1
-
12
-
-
64249125305
-
An improved smart card based password authentication scheme with provable security
-
Jing, X., Zhu, W.T., Feng, D.G.: 'An improved smart card based password authentication scheme with provable security', Comput. Stand. Interf., 2009, 31, (4), pp. 723-728
-
(2009)
Comput. Stand. Interf.
, vol.31
, Issue.4
, pp. 723-728
-
-
Jing, X.1
Zhu, W.T.2
Feng, D.G.3
-
13
-
-
63749125084
-
A new secure communication framework for smart cards
-
Lu, H.K., Ali, A.M., Durand, S., Castillo, L.: 'A new secure communication framework for smart cards'. Proc. IEEE Consumer Communications and Networking Conf., 2009, pp. 1-5
-
(2009)
Proc. IEEE Consumer Communications and Networking Conf.
, pp. 1-5
-
-
Lu, H.K.1
Ali, A.M.2
Durand, S.3
Castillo, L.4
-
14
-
-
70350569787
-
Biometric keys: suitable use cases and achievable information content
-
Plaga, R.: 'Biometric keys: suitable use cases and achievable information content', Int. J. Inf. Secur., 2009, 8, (6), pp. 447-454
-
(2009)
Int. J. Inf. Secur.
, vol.8
, Issue.6
, pp. 447-454
-
-
Plaga, R.1
-
15
-
-
51349085440
-
Improvement of a fingerprint-based remote user authentication scheme
-
Jing, X., Zhu, W.T., Feng, D.G.: 'Improvement of a fingerprint-based remote user authentication scheme', Int. J. Secur., 2008, 2, (3), pp. 87-92
-
(2008)
Int. J. Secur.
, vol.2
, Issue.3
, pp. 87-92
-
-
Jing, X.1
Zhu, W.T.2
Feng, D.G.3
-
16
-
-
79959364857
-
A note on type II error under random effects misspecification in generalized linear mixed models
-
Neuhaus, J.M., McCulloch, C.E., Boylan, R.: 'A note on type II error under random effects misspecification in generalized linear mixed models', Biometrics, 2011, 67, (2), pp. 654-656
-
(2011)
Biometrics
, vol.67
, Issue.2
, pp. 654-656
-
-
Neuhaus, J.M.1
McCulloch, C.E.2
Boylan, R.3
-
17
-
-
0742302033
-
Fundamentals of biometric authentication technologies
-
Wayman, J.L.: 'Fundamentals of biometric authentication technologies', Int. J. Image Graph., 2001, 1, (1), pp. 93-113
-
(2001)
Int. J. Image Graph.
, vol.1
, Issue.1
, pp. 93-113
-
-
Wayman, J.L.1
-
19
-
-
0003851399
-
-
Wiley, 2nd edn
-
Schneier, B.: 'Applied cryptography, protocols, algorithms, and source code' (Wiley, 1996, 2nd edn.)
-
(1996)
Applied cryptography, protocols, algorithms, and source code
-
-
Schneier, B.1
-
20
-
-
85070661605
-
The advantages of elliptic curve cryptography for wireless security
-
Lauter, K.: 'The advantages of elliptic curve cryptography for wireless security', IEEE Wirel. Commun. Mag., 2004, 4, (20), pp. 1536-1284
-
(2004)
IEEE Wirel. Commun. Mag.
, vol.4
, Issue.20
, pp. 1536-1284
-
-
Lauter, K.1
-
21
-
-
35048861214
-
Automatic analysis of the security of XOR-based key management schemes
-
Cortier, V., Keighren, G., Steel, G.: 'Automatic analysis of the security of XOR-based key management schemes'. Proc. Held as Part of the Joint European Conf. Theory and Practice of Software, 2007, pp. 538-552
-
(2007)
Proc. Held as Part of the Joint European Conf. Theory and Practice of Software
, pp. 538-552
-
-
Cortier, V.1
Keighren, G.2
Steel, G.3
-
22
-
-
84863382720
-
On the security of the 'Free-XOR' technique
-
Choi, S.G., Katz, J., Kumaresan, R., Zhou, H.S.: 'On the security of the 'Free-XOR' technique'. Proc. 9th Theory of Cryptography Conf., 2012, pp. 39-53
-
(2012)
Proc. 9th Theory of Cryptography Conf.
, pp. 39-53
-
-
Choi, S.G.1
Katz, J.2
Kumaresan, R.3
Zhou, H.S.4
-
23
-
-
0017018484
-
New directions in cryptography
-
Diffie, W., Hellman, M.E.: 'New directions in cryptography', IEEE Trans. Inf. Theor., 1976, 22, (6), pp. 644-654
-
(1976)
IEEE Trans. Inf. Theor.
, vol.22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.E.2
-
24
-
-
84968503742
-
Elliptic curve cryptosystems
-
Koblitz, K.: 'Elliptic curve cryptosystems', Math. Comput., 1987, 48, (177), pp. 203-209
-
(1987)
Math. Comput.
, vol.48
, Issue.177
, pp. 203-209
-
-
Koblitz, K.1
-
25
-
-
0037030525
-
Fingerprint-based remote user authentication scheme using smart cards
-
Lee, J.K., Ryu, S.R., Yoo, K.Y.: 'Fingerprint-based remote user authentication scheme using smart cards', Electr. Lett., 2002, 38, (12), pp. 554-555
-
(2002)
Electr. Lett.
, vol.38
, Issue.12
, pp. 554-555
-
-
Lee, J.K.1
Ryu, S.R.2
Yoo, K.Y.3
-
26
-
-
23344449693
-
ID-based password authentication scheme using smart cards and fingerprints
-
Kim, H.S., Lee, J.K., Yoo, K.Y.: 'ID-based password authentication scheme using smart cards and fingerprints', ACM Oper. Syst. Rev., 2003, 37, (4), pp. 32-41
-
(2003)
ACM Oper. Syst. Rev.
, vol.37
, Issue.4
, pp. 32-41
-
-
Kim, H.S.1
Lee, J.K.2
Yoo, K.Y.3
-
27
-
-
33645758252
-
Cryptanalysis of an id-based password authentication scheme using smart cards and fingerprints
-
Scott, M.: 'Cryptanalysis of an id-based password authentication scheme using smart cards and fingerprints', ACM Oper. Syst. Rev., 2004, 38, (2), pp. 73-75
-
(2004)
ACM Oper. Syst. Rev.
, vol.38
, Issue.2
, pp. 73-75
-
-
Scott, M.1
-
28
-
-
34547519982
-
Privacy preserving multi-factor authentication with biometrics
-
Spantzel, A.B., Squicciarini, A.C., Bertino, E., Modi, S., Young, M., Elliott, S.J.: 'Privacy preserving multi-factor authentication with biometrics', J. Comput. Secur., 2007, 15, (5), pp. 529-560
-
(2007)
J. Comput. Secur.
, vol.15
, Issue.5
, pp. 529-560
-
-
Spantzel, A.B.1
Squicciarini, A.C.2
Bertino, E.3
Modi, S.4
Young, M.5
Elliott, S.J.6
-
29
-
-
50949129086
-
Remote password authentication scheme with smart cards and biometrics
-
Fan, C.I., Lin, Y.H., Hsu, R.H.: 'Remote password authentication scheme with smart cards and biometrics'. Proc. IEEE Global Telecommunications Conf., 2006, pp. 1-5
-
(2006)
Proc. IEEE Global Telecommunications Conf.
, pp. 1-5
-
-
Fan, C.I.1
Lin, Y.H.2
Hsu, R.H.3
-
30
-
-
70450285606
-
Provably secure remote truly three-factor authentication scheme with privacy protection on biometrics
-
Fan, C.I., Lin, Y.H.: 'Provably secure remote truly three-factor authentication scheme with privacy protection on biometrics', IEEE Trans. Inf. Foren. Secur., 2009, 4, (4), pp. 933-945
-
(2009)
IEEE Trans. Inf. Foren. Secur.
, vol.4
, Issue.4
, pp. 933-945
-
-
Fan, C.I.1
Lin, Y.H.2
-
31
-
-
34248188686
-
Access control system with high level security using fingerprints
-
Gil, Y., Ahn, D., Pan, S., Chung, Y.: 'Access control system with high level security using fingerprints'. Proc. 32nd Applied Imagery Pattern Recognition Workshop, 2003, pp. 238-243
-
(2003)
Proc. 32nd Applied Imagery Pattern Recognition Workshop
, pp. 238-243
-
-
Gil, Y.1
Ahn, D.2
Pan, S.3
Chung, Y.4
|