Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

71 results
Keywords : Authentication
Image document

Secure Negotiation for Manual Authentication Protocols

Milica Milutinovic , Roel Peeters , Bart De Decker
12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.214-221, ⟨10.1007/978-3-642-24712-5_20⟩
Conference papers hal-01596202v1
Image document

Cryptanalysis of a SIP Authentication Scheme

Fuwen Liu , Hartmut Koenig
12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.134-143, ⟨10.1007/978-3-642-24712-5_11⟩
Conference papers hal-01596196v1
Image document

A Blockcipher Based Authentication Encryption

Rashed Mazumder , Atsuko Miyaji , Chunhua Su
International Conference on Availability, Reliability, and Security (CD-ARES), Aug 2016, Salzburg, Austria. pp.106-123, ⟨10.1007/978-3-319-45507-5_8⟩
Conference papers hal-01635006v1
Image document

A Survey of Security and Privacy Issues for Biometrics Based Remote Authentication in Cloud

Tapalina Bhattasali , Khalid Saeed , Nabendu Chaki , Rituparna Chaki
13th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Nov 2014, Ho Chi Minh City, Vietnam. pp.112-121, ⟨10.1007/978-3-662-45237-0_12⟩
Conference papers hal-01405569v1
Image document

Study of Cancelable Biometrics in Security Improvement of Biometric Authentication System

Sanggyu Shin , Yoichi Seto
14th Computer Information Systems and Industrial Management (CISIM), Sep 2015, Warsaw, Poland. pp.547-558, ⟨10.1007/978-3-319-24369-6_46⟩
Conference papers hal-01444496v1
Image document

A Multimodal Biometric User Identification System Based on Keystroke Dynamics and Mouse Movements

Piotr Panasiuk , Maciej Szymkowski , Marcin Dąbrowski , Khalid Saeed
15th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2016, Vilnius, Lithuania. pp.672-681, ⟨10.1007/978-3-319-45378-1_58⟩
Conference papers hal-01637458v1
Image document

A Robust Remote User Authentication Scheme against Smart Card Security Breach

Chun-Ta Li , Cheng-Chi Lee , Chen-Ju Liu , Chin-Wen Lee
23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.231-238, ⟨10.1007/978-3-642-22348-8_18⟩
Conference papers hal-01586587v1
Image document

Mobile Agent Code Updating and Authentication Protocol for Code-Centric RFID System

Liang Yan , Hongbo Guo , Min Chen , Chunming Rong , Victor Leung
International IFIP TC 6 Workshops PE-CRN, NC-Pro, WCNS, and SUNSET 2011 Held at NETWORKING 2011 (NETWORKING), May 2011, Valencia, Spain. pp.243-250, ⟨10.1007/978-3-642-23041-7_23⟩
Conference papers hal-01587849v1
Image document

A Field Study of User Behavior and Perceptions in Smartcard Authentication

Celeste Lyn Paul , Emile Morse , Aiping Zhang , Yee-Yin Choong , Mary Theofanos
13th International Conference on Human-Computer Interaction (INTERACT), Sep 2011, Lisbon, Portugal. pp.1-17, ⟨10.1007/978-3-642-23768-3_1⟩
Conference papers hal-01596949v1
Image document

A Novel Hybrid Password Authentication Scheme Based on Text and Image

Ian Mackie , Merve Yildirim
32th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2018, Bergamo, Italy. pp.182-197, ⟨10.1007/978-3-319-95729-6_12⟩
Conference papers hal-01954408v1
Image document

Secure Client Puzzles Based on Random Beacons

Yves Igor Jerschow , Martin Mauve
11th International Networking Conference (NETWORKING), May 2012, Prague, Czech Republic. pp.184-197, ⟨10.1007/978-3-642-30054-7_15⟩
Conference papers hal-01531977v1
Image document

One-Time Biometrics for Online Banking and Electronic Payment Authentication

Aude Plateaux , Patrick Lacharme , Christophe Rosenberger , Audun Jøsang
International Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Sep 2014, Fribourg, Switzerland. pp.179-193, ⟨10.1007/978-3-319-10975-6_14⟩
Conference papers hal-01076676v1
Image document

Security Vulnerabilities of User Authentication Scheme Using Smart Card

Ravi Singh Pippal , Jaidhar C.D. , Shashikala Tapaswi
26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.106-113, ⟨10.1007/978-3-642-31540-4_8⟩
Conference papers hal-01534770v1
Image document

Delegating Biometric Authentication with the Sumcheck Protocol

Hervé Chabanne , Julien Keuffer , Roch Lescuyer
10th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2016, Heraklion, Greece. pp.236-244, ⟨10.1007/978-3-319-45931-8_15⟩
Conference papers hal-01639622v1
Image document

A Multi-factor Biometric Based Remote Authentication Using Fuzzy Commitment and Non-invertible Transformation

Thi Thao Nguyen , Dinh Thanh Nguyen , Tran Khanh Dang
3rd International Conference on Information and Communication Technology-EurAsia (ICT-EURASIA) and 9th International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS), Oct 2015, Daejon, South Korea. pp.77-88, ⟨10.1007/978-3-319-24315-3_8⟩
Conference papers hal-01466413v1
Image document

Multi-level Authentication Based Single Sign-On for IMS Services

M. Maachaoui , Anas Abou El Kalam , Christian Fraboul , A. Ait Ouahman
13th International Conference on Communications and Multimedia Security (CMS), Sep 2012, Canterbury, United Kingdom. pp.174-187, ⟨10.1007/978-3-642-32805-3_14⟩
Conference papers hal-01540888v1
Image document

A Generic Multimodels-Based Approach for the Analysis of Usability and Security of Authentication Mechanisms

Nicolas Broders , Célia Martinie , Philippe Palanque , Marco Winckler , Kimmo Halunen
HCSE 2020 - 8th International Conference on Human-Centered Software Engineering - IFIP WG 13.2 International Working Conference, Nov 2020, Eindhoven/ Online, Netherlands. pp.61-83, ⟨10.1007/978-3-030-64266-2_4⟩
Conference papers hal-03079818v1
Image document

Lightweight Authentication Protocol for Low-Cost RFID Tags

Pierre Dusart , Sinaly Traoré
7th International Workshop on Information Security THeory and Practice (WISTP), May 2013, Heraklion, Greece. pp.129-144, ⟨10.1007/978-3-642-38530-8_9⟩
Conference papers hal-01485938v1
Image document

Another Fallen Hash-Based RFID Authentication Protocol

Julio Cesar Hernandez-Castro , Pedro Peris-Lopez , Masoumeh Safkhani , Nasour Bagheri , Majid Naderi
6th International Workshop on Information Security Theory and Practice (WISTP), Jun 2012, Egham, United Kingdom. pp.29-37, ⟨10.1007/978-3-642-30955-7_4⟩
Conference papers hal-01534308v1
Image document

Biometric Swiping on Touchscreens

Orcan Alpar , Ondrej Krejcar
14th Computer Information Systems and Industrial Management (CISIM), Sep 2015, Warsaw, Poland. pp.193-203, ⟨10.1007/978-3-319-24369-6_16⟩
Conference papers hal-01444465v1
Image document

Self-enhancing GPS-Based Authentication Using Corresponding Address

Tran Phuong Thao , Mhd Irvan , Ryosuke Kobayashi , Rie Shigetomi Yamaguchi , Toshiyuki Nakata
34th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jun 2020, Regensburg, Germany. pp.333-344, ⟨10.1007/978-3-030-49669-2_19⟩
Conference papers hal-03243648v1
Image document

Information Security Theory and Practice

Maryline Laurent , Thanassis Giannetsos
Springer, LNCS-12024, pp.(X-253), 2020, Lecture Notes in Computer Science, 978-3-030-41701-7. ⟨10.1007/978-3-030-41702-4⟩
Books hal-03173895v1
Image document

A Simplified Privacy Preserving Message Delivery Protocol in VDTNs

Youngho Park , Chul Sur , Kyung-Hyune Rhee
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.416-425, ⟨10.1007/978-3-642-36818-9_46⟩
Conference papers hal-01480200v1
Image document

Authentication with Time Features for Keystroke Dynamics on Touchscreens

Matthias Trojahn , Florian Arndt , Frank Ortmeier
14th International Conference on Communications and Multimedia Security (CMS), Sep 2013, Magdeburg,, Germany. pp.197-199, ⟨10.1007/978-3-642-40779-6_17⟩
Conference papers hal-01492821v1
Image document

An Implementation of a Paper Based Authentication Using HC2D Barcode and Digital Signature

Puchong Subpratatsavee , Pramote Kuacharoen
13th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Nov 2014, Ho Chi Minh City, Vietnam. pp.592-601, ⟨10.1007/978-3-662-45237-0_54⟩
Conference papers hal-01405654v1
Image document

Advances in the Keystroke Dynamics: The Practical Impact of Database Quality

Mariusz Rybnik , Piotr Panasiuk , Khalid Saeed , Marcin Rogowski
11th International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2012, Venice, Italy. pp.203-214, ⟨10.1007/978-3-642-33260-9_17⟩
Conference papers hal-01551740v1
Image document

Trust Agreement in Wireless Mesh Networks

Andreas Noack
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.336-350, ⟨10.1007/978-3-642-21040-2_24⟩
Conference papers hal-01573304v1
Image document

A Fault-Tolerant Authenticated Key-Conference Agreement Protocol with Forward Secrecy

Tomasz Hyla , Jerzy Pejaś
15th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2016, Vilnius, Lithuania. pp.647-660, ⟨10.1007/978-3-319-45378-1_56⟩
Conference papers hal-01637470v1
Image document

Entropy of Graphical Passwords: Towards an Information-Theoretic Analysis of Face-Recognition Based Authentication

Stefan Rass , David Schuller , Christian Kollmitzer
11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.166-177, ⟨10.1007/978-3-642-13241-4_16⟩
Conference papers hal-01056381v1
Image document

Cryptanalysis of Goriparthi et al.’s Bilinear Pairing Based Remote User Authentication Scheme

Hae-Jung Kim , Eun-Jun Yoon
9th International Conference on Network and Parallel Computing (NPC), Sep 2012, Gwangju, South Korea. pp.581-588, ⟨10.1007/978-3-642-35606-3_69⟩
Conference papers hal-01551363v1