Filter your results
- 70
- 1
- 70
- 1
- 71
- 20
- 40
- 2
- 4
- 1
- 4
- 7
- 8
- 8
- 10
- 9
- 14
- 4
- 71
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
Free Typed Text Using Keystroke Dynamics for Continuous Authentication15th IFIP International Conference on Communications and Multimedia Security (CMS), Sep 2014, Aveiro, Portugal. pp.33-45, ⟨10.1007/978-3-662-44885-4_3⟩
Conference papers
hal-01404183v1
|
||
|
A Forward Privacy Model for RFID Authentication Protocols7th International Workshop on Information Security THeory and Practice (WISTP), May 2013, Heraklion, Greece. pp.98-111, ⟨10.1007/978-3-642-38530-8_7⟩
Conference papers
hal-01485936v1
|
||
|
Verification of Mutual Authentication Protocol for MobInfoSec System14th Computer Information Systems and Industrial Management (CISIM), Sep 2015, Warsaw, Poland. pp.461-474, ⟨10.1007/978-3-319-24369-6_38⟩
Conference papers
hal-01444488v1
|
||
|
Active Linguistic Authentication Using Real-Time Stylometric Evaluation for Multi-Modal Decision Fusion10th IFIP International Conference on Digital Forensics (DF), Jan 2014, Vienna, Austria. pp.165-183, ⟨10.1007/978-3-662-44952-3_12⟩
Conference papers
hal-01393770v1
|
||
|
A Secure Key Management Framework for Heterogeneous Wireless Sensor Networks12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.18-31, ⟨10.1007/978-3-642-24712-5_2⟩
Conference papers
hal-01596197v1
|
||
|
Identification in E-Participation: Between Quality of Identification Data and Participation Threshold7th International Conference on Electronic Participation (ePart), Aug 2015, Thessaloniki, Greece. pp.108-119, ⟨10.1007/978-3-319-22500-5_9⟩
Conference papers
hal-01587632v1
|
||
|
A Fault-Tolerant Authenticated Key-Conference Agreement Protocol with Forward Secrecy15th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2016, Vilnius, Lithuania. pp.647-660, ⟨10.1007/978-3-319-45378-1_56⟩
Conference papers
hal-01637470v1
|
||
|
Entropy of Graphical Passwords: Towards an Information-Theoretic Analysis of Face-Recognition Based Authentication11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.166-177, ⟨10.1007/978-3-642-13241-4_16⟩
Conference papers
hal-01056381v1
|
||
|
Cryptanalysis of Goriparthi et al.’s Bilinear Pairing Based Remote User Authentication Scheme9th International Conference on Network and Parallel Computing (NPC), Sep 2012, Gwangju, South Korea. pp.581-588, ⟨10.1007/978-3-642-35606-3_69⟩
Conference papers
hal-01551363v1
|
||
|
Risk Analysis of Physically Unclonable Functions15th IFIP International Conference on Communications and Multimedia Security (CMS), Sep 2014, Aveiro, Portugal. pp.136-139, ⟨10.1007/978-3-662-44885-4_12⟩
Conference papers
hal-01404204v1
|
||
|
Combating Misinformation Online: Identification of Variables and Proof-of-Concept Study15th Conference on e-Business, e-Services and e-Society (I3E), Sep 2016, Swansea, United Kingdom. pp.442-454, ⟨10.1007/978-3-319-45234-0_40⟩
Conference papers
hal-01702212v1
|
||
|
Security for Diversity: Studying the Effects of Verbal and Imagery Processes on User Authentication Mechanisms14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.442-459, ⟨10.1007/978-3-642-40477-1_27⟩
Conference papers
hal-01504900v1
|
||
|
A Secure One-Way Authentication Protocol in IMS Context12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.222-231, ⟨10.1007/978-3-642-24712-5_21⟩
Conference papers
hal-01596208v1
|
||
|
User Authentication for Mobile Devices12th International Conference on Information Systems and Industrial Management (CISIM), Sep 2013, Krakow, Poland. pp.47-58, ⟨10.1007/978-3-642-40925-7_5⟩
Conference papers
hal-01496111v1
|
||
|
A Comprehensive Study of the Usability of Multiple Graphical Passwords14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.424-441, ⟨10.1007/978-3-642-40477-1_26⟩
Conference papers
hal-01504899v1
|
||
|
Using IMUs to Identify Supervisors on Touch Devices15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.565-583, ⟨10.1007/978-3-319-22668-2_44⟩
Conference papers
hal-01599873v1
|
||
|
A Robust Remote User Authentication Scheme against Smart Card Security Breach23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.231-238, ⟨10.1007/978-3-642-22348-8_18⟩
Conference papers
hal-01586587v1
|
||
|
Mobile Agent Code Updating and Authentication Protocol for Code-Centric RFID SystemInternational IFIP TC 6 Workshops PE-CRN, NC-Pro, WCNS, and SUNSET 2011 Held at NETWORKING 2011 (NETWORKING), May 2011, Valencia, Spain. pp.243-250, ⟨10.1007/978-3-642-23041-7_23⟩
Conference papers
hal-01587849v1
|
||
|
A Field Study of User Behavior and Perceptions in Smartcard Authentication13th International Conference on Human-Computer Interaction (INTERACT), Sep 2011, Lisbon, Portugal. pp.1-17, ⟨10.1007/978-3-642-23768-3_1⟩
Conference papers
hal-01596949v1
|
||
|
A Novel Hybrid Password Authentication Scheme Based on Text and Image32th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2018, Bergamo, Italy. pp.182-197, ⟨10.1007/978-3-319-95729-6_12⟩
Conference papers
hal-01954408v1
|
||
|
Secure Client Puzzles Based on Random Beacons11th International Networking Conference (NETWORKING), May 2012, Prague, Czech Republic. pp.184-197, ⟨10.1007/978-3-642-30054-7_15⟩
Conference papers
hal-01531977v1
|
||
|
One-Time Biometrics for Online Banking and Electronic Payment AuthenticationInternational Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Sep 2014, Fribourg, Switzerland. pp.179-193, ⟨10.1007/978-3-319-10975-6_14⟩
Conference papers
hal-01076676v1
|
||
|
Security Vulnerabilities of User Authentication Scheme Using Smart Card26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.106-113, ⟨10.1007/978-3-642-31540-4_8⟩
Conference papers
hal-01534770v1
|
||
|
Delegating Biometric Authentication with the Sumcheck Protocol10th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2016, Heraklion, Greece. pp.236-244, ⟨10.1007/978-3-319-45931-8_15⟩
Conference papers
hal-01639622v1
|
||
|
A Multi-factor Biometric Based Remote Authentication Using Fuzzy Commitment and Non-invertible Transformation3rd International Conference on Information and Communication Technology-EurAsia (ICT-EURASIA) and 9th International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS), Oct 2015, Daejon, South Korea. pp.77-88, ⟨10.1007/978-3-319-24315-3_8⟩
Conference papers
hal-01466413v1
|
||
|
Multi-level Authentication Based Single Sign-On for IMS Services13th International Conference on Communications and Multimedia Security (CMS), Sep 2012, Canterbury, United Kingdom. pp.174-187, ⟨10.1007/978-3-642-32805-3_14⟩
Conference papers
hal-01540888v1
|
||
|
A Generic Multimodels-Based Approach for the Analysis of Usability and Security of Authentication MechanismsHCSE 2020 - 8th International Conference on Human-Centered Software Engineering - IFIP WG 13.2 International Working Conference, Nov 2020, Eindhoven/ Online, Netherlands. pp.61-83, ⟨10.1007/978-3-030-64266-2_4⟩
Conference papers
hal-03079818v1
|
||
|
Lightweight Authentication Protocol for Low-Cost RFID Tags7th International Workshop on Information Security THeory and Practice (WISTP), May 2013, Heraklion, Greece. pp.129-144, ⟨10.1007/978-3-642-38530-8_9⟩
Conference papers
hal-01485938v1
|
||
|
Another Fallen Hash-Based RFID Authentication Protocol6th International Workshop on Information Security Theory and Practice (WISTP), Jun 2012, Egham, United Kingdom. pp.29-37, ⟨10.1007/978-3-642-30955-7_4⟩
Conference papers
hal-01534308v1
|
||
|
Biometric Swiping on Touchscreens14th Computer Information Systems and Industrial Management (CISIM), Sep 2015, Warsaw, Poland. pp.193-203, ⟨10.1007/978-3-319-24369-6_16⟩
Conference papers
hal-01444465v1
|