Filter your results
- 70
- 1
- 70
- 1
- 71
- 20
- 40
- 2
- 4
- 1
- 4
- 7
- 8
- 8
- 10
- 9
- 14
- 4
- 71
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
Secure Negotiation for Manual Authentication Protocols12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.214-221, ⟨10.1007/978-3-642-24712-5_20⟩
Conference papers
hal-01596202v1
|
||
|
Cryptanalysis of a SIP Authentication Scheme12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.134-143, ⟨10.1007/978-3-642-24712-5_11⟩
Conference papers
hal-01596196v1
|
||
|
A Blockcipher Based Authentication EncryptionInternational Conference on Availability, Reliability, and Security (CD-ARES), Aug 2016, Salzburg, Austria. pp.106-123, ⟨10.1007/978-3-319-45507-5_8⟩
Conference papers
hal-01635006v1
|
||
|
A Survey of Security and Privacy Issues for Biometrics Based Remote Authentication in Cloud13th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Nov 2014, Ho Chi Minh City, Vietnam. pp.112-121, ⟨10.1007/978-3-662-45237-0_12⟩
Conference papers
hal-01405569v1
|
||
|
Study of Cancelable Biometrics in Security Improvement of Biometric Authentication System14th Computer Information Systems and Industrial Management (CISIM), Sep 2015, Warsaw, Poland. pp.547-558, ⟨10.1007/978-3-319-24369-6_46⟩
Conference papers
hal-01444496v1
|
||
|
A Multimodal Biometric User Identification System Based on Keystroke Dynamics and Mouse Movements15th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2016, Vilnius, Lithuania. pp.672-681, ⟨10.1007/978-3-319-45378-1_58⟩
Conference papers
hal-01637458v1
|
||
|
A Robust Remote User Authentication Scheme against Smart Card Security Breach23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.231-238, ⟨10.1007/978-3-642-22348-8_18⟩
Conference papers
hal-01586587v1
|
||
|
Mobile Agent Code Updating and Authentication Protocol for Code-Centric RFID SystemInternational IFIP TC 6 Workshops PE-CRN, NC-Pro, WCNS, and SUNSET 2011 Held at NETWORKING 2011 (NETWORKING), May 2011, Valencia, Spain. pp.243-250, ⟨10.1007/978-3-642-23041-7_23⟩
Conference papers
hal-01587849v1
|
||
|
A Field Study of User Behavior and Perceptions in Smartcard Authentication13th International Conference on Human-Computer Interaction (INTERACT), Sep 2011, Lisbon, Portugal. pp.1-17, ⟨10.1007/978-3-642-23768-3_1⟩
Conference papers
hal-01596949v1
|
||
|
A Novel Hybrid Password Authentication Scheme Based on Text and Image32th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2018, Bergamo, Italy. pp.182-197, ⟨10.1007/978-3-319-95729-6_12⟩
Conference papers
hal-01954408v1
|
||
|
Secure Client Puzzles Based on Random Beacons11th International Networking Conference (NETWORKING), May 2012, Prague, Czech Republic. pp.184-197, ⟨10.1007/978-3-642-30054-7_15⟩
Conference papers
hal-01531977v1
|
||
|
One-Time Biometrics for Online Banking and Electronic Payment AuthenticationInternational Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Sep 2014, Fribourg, Switzerland. pp.179-193, ⟨10.1007/978-3-319-10975-6_14⟩
Conference papers
hal-01076676v1
|
||
|
Security Vulnerabilities of User Authentication Scheme Using Smart Card26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.106-113, ⟨10.1007/978-3-642-31540-4_8⟩
Conference papers
hal-01534770v1
|
||
|
Delegating Biometric Authentication with the Sumcheck Protocol10th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2016, Heraklion, Greece. pp.236-244, ⟨10.1007/978-3-319-45931-8_15⟩
Conference papers
hal-01639622v1
|
||
|
A Multi-factor Biometric Based Remote Authentication Using Fuzzy Commitment and Non-invertible Transformation3rd International Conference on Information and Communication Technology-EurAsia (ICT-EURASIA) and 9th International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS), Oct 2015, Daejon, South Korea. pp.77-88, ⟨10.1007/978-3-319-24315-3_8⟩
Conference papers
hal-01466413v1
|
||
|
Multi-level Authentication Based Single Sign-On for IMS Services13th International Conference on Communications and Multimedia Security (CMS), Sep 2012, Canterbury, United Kingdom. pp.174-187, ⟨10.1007/978-3-642-32805-3_14⟩
Conference papers
hal-01540888v1
|
||
|
A Generic Multimodels-Based Approach for the Analysis of Usability and Security of Authentication MechanismsHCSE 2020 - 8th International Conference on Human-Centered Software Engineering - IFIP WG 13.2 International Working Conference, Nov 2020, Eindhoven/ Online, Netherlands. pp.61-83, ⟨10.1007/978-3-030-64266-2_4⟩
Conference papers
hal-03079818v1
|
||
|
Lightweight Authentication Protocol for Low-Cost RFID Tags7th International Workshop on Information Security THeory and Practice (WISTP), May 2013, Heraklion, Greece. pp.129-144, ⟨10.1007/978-3-642-38530-8_9⟩
Conference papers
hal-01485938v1
|
||
|
Another Fallen Hash-Based RFID Authentication Protocol6th International Workshop on Information Security Theory and Practice (WISTP), Jun 2012, Egham, United Kingdom. pp.29-37, ⟨10.1007/978-3-642-30955-7_4⟩
Conference papers
hal-01534308v1
|
||
|
Biometric Swiping on Touchscreens14th Computer Information Systems and Industrial Management (CISIM), Sep 2015, Warsaw, Poland. pp.193-203, ⟨10.1007/978-3-319-24369-6_16⟩
Conference papers
hal-01444465v1
|
||
|
Self-enhancing GPS-Based Authentication Using Corresponding Address34th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jun 2020, Regensburg, Germany. pp.333-344, ⟨10.1007/978-3-030-49669-2_19⟩
Conference papers
hal-03243648v1
|
||
|
Information Security Theory and PracticeSpringer, LNCS-12024, pp.(X-253), 2020, Lecture Notes in Computer Science, 978-3-030-41701-7. ⟨10.1007/978-3-030-41702-4⟩
Books
hal-03173895v1
|
||
|
A Simplified Privacy Preserving Message Delivery Protocol in VDTNs1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.416-425, ⟨10.1007/978-3-642-36818-9_46⟩
Conference papers
hal-01480200v1
|
||
|
Authentication with Time Features for Keystroke Dynamics on Touchscreens14th International Conference on Communications and Multimedia Security (CMS), Sep 2013, Magdeburg,, Germany. pp.197-199, ⟨10.1007/978-3-642-40779-6_17⟩
Conference papers
hal-01492821v1
|
||
|
An Implementation of a Paper Based Authentication Using HC2D Barcode and Digital Signature13th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Nov 2014, Ho Chi Minh City, Vietnam. pp.592-601, ⟨10.1007/978-3-662-45237-0_54⟩
Conference papers
hal-01405654v1
|
||
|
Advances in the Keystroke Dynamics: The Practical Impact of Database Quality11th International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2012, Venice, Italy. pp.203-214, ⟨10.1007/978-3-642-33260-9_17⟩
Conference papers
hal-01551740v1
|
||
|
Trust Agreement in Wireless Mesh Networks5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.336-350, ⟨10.1007/978-3-642-21040-2_24⟩
Conference papers
hal-01573304v1
|
||
|
A Fault-Tolerant Authenticated Key-Conference Agreement Protocol with Forward Secrecy15th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2016, Vilnius, Lithuania. pp.647-660, ⟨10.1007/978-3-319-45378-1_56⟩
Conference papers
hal-01637470v1
|
||
|
Entropy of Graphical Passwords: Towards an Information-Theoretic Analysis of Face-Recognition Based Authentication11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.166-177, ⟨10.1007/978-3-642-13241-4_16⟩
Conference papers
hal-01056381v1
|
||
|
Cryptanalysis of Goriparthi et al.’s Bilinear Pairing Based Remote User Authentication Scheme9th International Conference on Network and Parallel Computing (NPC), Sep 2012, Gwangju, South Korea. pp.581-588, ⟨10.1007/978-3-642-35606-3_69⟩
Conference papers
hal-01551363v1
|