Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

71 results
Keywords : authentication
Image document

Free Typed Text Using Keystroke Dynamics for Continuous Authentication

Paulo Pinto , Bernardo Patrão , Henrique Santos
15th IFIP International Conference on Communications and Multimedia Security (CMS), Sep 2014, Aveiro, Portugal. pp.33-45, ⟨10.1007/978-3-662-44885-4_3⟩
Conference papers hal-01404183v1
Image document

A Forward Privacy Model for RFID Authentication Protocols

Daisuke Moriyama , Miyako Ohkubo , Shin’ichiro Matsuo
7th International Workshop on Information Security THeory and Practice (WISTP), May 2013, Heraklion, Greece. pp.98-111, ⟨10.1007/978-3-642-38530-8_7⟩
Conference papers hal-01485936v1
Image document

Verification of Mutual Authentication Protocol for MobInfoSec System

Olga Siedlecka-Lamch , Imed El Fray , Mirosław Kurkowski , Jerzy Pejaś
14th Computer Information Systems and Industrial Management (CISIM), Sep 2015, Warsaw, Poland. pp.461-474, ⟨10.1007/978-3-319-24369-6_38⟩
Conference papers hal-01444488v1
Image document

Active Linguistic Authentication Using Real-Time Stylometric Evaluation for Multi-Modal Decision Fusion

Ariel Stolerman , Alex Fridman , Rachel Greenstadt , Patrick Brennan , Patrick Juola
10th IFIP International Conference on Digital Forensics (DF), Jan 2014, Vienna, Austria. pp.165-183, ⟨10.1007/978-3-662-44952-3_12⟩
Conference papers hal-01393770v1
Image document

A Secure Key Management Framework for Heterogeneous Wireless Sensor Networks

Mahdi R. Alagheband , Mohammad Reza Aref
12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.18-31, ⟨10.1007/978-3-642-24712-5_2⟩
Conference papers hal-01596197v1
Image document

Identification in E-Participation: Between Quality of Identification Data and Participation Threshold

Peter Parycek , Judith Schossböck , Bettina Rinnerbauer
7th International Conference on Electronic Participation (ePart), Aug 2015, Thessaloniki, Greece. pp.108-119, ⟨10.1007/978-3-319-22500-5_9⟩
Conference papers hal-01587632v1
Image document

A Fault-Tolerant Authenticated Key-Conference Agreement Protocol with Forward Secrecy

Tomasz Hyla , Jerzy Pejaś
15th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2016, Vilnius, Lithuania. pp.647-660, ⟨10.1007/978-3-319-45378-1_56⟩
Conference papers hal-01637470v1
Image document

Entropy of Graphical Passwords: Towards an Information-Theoretic Analysis of Face-Recognition Based Authentication

Stefan Rass , David Schuller , Christian Kollmitzer
11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.166-177, ⟨10.1007/978-3-642-13241-4_16⟩
Conference papers hal-01056381v1
Image document

Cryptanalysis of Goriparthi et al.’s Bilinear Pairing Based Remote User Authentication Scheme

Hae-Jung Kim , Eun-Jun Yoon
9th International Conference on Network and Parallel Computing (NPC), Sep 2012, Gwangju, South Korea. pp.581-588, ⟨10.1007/978-3-642-35606-3_69⟩
Conference papers hal-01551363v1
Image document

Risk Analysis of Physically Unclonable Functions

Andrea Kolberger , Ingrid Schaumüller-Bichl , Martin Deutschmann
15th IFIP International Conference on Communications and Multimedia Security (CMS), Sep 2014, Aveiro, Portugal. pp.136-139, ⟨10.1007/978-3-662-44885-4_12⟩
Conference papers hal-01404204v1
Image document

Combating Misinformation Online: Identification of Variables and Proof-of-Concept Study

Milan Dordevic , Fadi Safieddine , Wassim Masri , Pardis Pourghomi
15th Conference on e-Business, e-Services and e-Society (I3E), Sep 2016, Swansea, United Kingdom. pp.442-454, ⟨10.1007/978-3-319-45234-0_40⟩
Conference papers hal-01702212v1
Image document

Security for Diversity: Studying the Effects of Verbal and Imagery Processes on User Authentication Mechanisms

Marios Belk , Christos Fidas , Panagiotis Germanakos , George Samaras
14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.442-459, ⟨10.1007/978-3-642-40477-1_27⟩
Conference papers hal-01504900v1
Image document

A Secure One-Way Authentication Protocol in IMS Context

Mohamed Maachaoui , Anas Abou El Kalam , Christian Fraboul
12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.222-231, ⟨10.1007/978-3-642-24712-5_21⟩
Conference papers hal-01596208v1
Image document

User Authentication for Mobile Devices

Marcin Rogowski , Khalid Saeed , Mariusz Rybnik , Marek Tabedzki , Marcin Adamski
12th International Conference on Information Systems and Industrial Management (CISIM), Sep 2013, Krakow, Poland. pp.47-58, ⟨10.1007/978-3-642-40925-7_5⟩
Conference papers hal-01496111v1
Image document

A Comprehensive Study of the Usability of Multiple Graphical Passwords

Soumyadeb Chowdhury , Ron Poet , Lewis Mackenzie
14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.424-441, ⟨10.1007/978-3-642-40477-1_26⟩
Conference papers hal-01504899v1
Image document

Using IMUs to Identify Supervisors on Touch Devices

Ahmed Kharrufa , James Nicholson , Paul Dunphy , Steve Hodges , Pam Briggs , et al.
15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.565-583, ⟨10.1007/978-3-319-22668-2_44⟩
Conference papers hal-01599873v1
Image document

A Robust Remote User Authentication Scheme against Smart Card Security Breach

Chun-Ta Li , Cheng-Chi Lee , Chen-Ju Liu , Chin-Wen Lee
23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.231-238, ⟨10.1007/978-3-642-22348-8_18⟩
Conference papers hal-01586587v1
Image document

Mobile Agent Code Updating and Authentication Protocol for Code-Centric RFID System

Liang Yan , Hongbo Guo , Min Chen , Chunming Rong , Victor Leung
International IFIP TC 6 Workshops PE-CRN, NC-Pro, WCNS, and SUNSET 2011 Held at NETWORKING 2011 (NETWORKING), May 2011, Valencia, Spain. pp.243-250, ⟨10.1007/978-3-642-23041-7_23⟩
Conference papers hal-01587849v1
Image document

A Field Study of User Behavior and Perceptions in Smartcard Authentication

Celeste Lyn Paul , Emile Morse , Aiping Zhang , Yee-Yin Choong , Mary Theofanos
13th International Conference on Human-Computer Interaction (INTERACT), Sep 2011, Lisbon, Portugal. pp.1-17, ⟨10.1007/978-3-642-23768-3_1⟩
Conference papers hal-01596949v1
Image document

A Novel Hybrid Password Authentication Scheme Based on Text and Image

Ian Mackie , Merve Yildirim
32th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2018, Bergamo, Italy. pp.182-197, ⟨10.1007/978-3-319-95729-6_12⟩
Conference papers hal-01954408v1
Image document

Secure Client Puzzles Based on Random Beacons

Yves Igor Jerschow , Martin Mauve
11th International Networking Conference (NETWORKING), May 2012, Prague, Czech Republic. pp.184-197, ⟨10.1007/978-3-642-30054-7_15⟩
Conference papers hal-01531977v1
Image document

One-Time Biometrics for Online Banking and Electronic Payment Authentication

Aude Plateaux , Patrick Lacharme , Christophe Rosenberger , Audun Jøsang
International Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Sep 2014, Fribourg, Switzerland. pp.179-193, ⟨10.1007/978-3-319-10975-6_14⟩
Conference papers hal-01076676v1
Image document

Security Vulnerabilities of User Authentication Scheme Using Smart Card

Ravi Singh Pippal , Jaidhar C.D. , Shashikala Tapaswi
26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.106-113, ⟨10.1007/978-3-642-31540-4_8⟩
Conference papers hal-01534770v1
Image document

Delegating Biometric Authentication with the Sumcheck Protocol

Hervé Chabanne , Julien Keuffer , Roch Lescuyer
10th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2016, Heraklion, Greece. pp.236-244, ⟨10.1007/978-3-319-45931-8_15⟩
Conference papers hal-01639622v1
Image document

A Multi-factor Biometric Based Remote Authentication Using Fuzzy Commitment and Non-invertible Transformation

Thi Thao Nguyen , Dinh Thanh Nguyen , Tran Khanh Dang
3rd International Conference on Information and Communication Technology-EurAsia (ICT-EURASIA) and 9th International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS), Oct 2015, Daejon, South Korea. pp.77-88, ⟨10.1007/978-3-319-24315-3_8⟩
Conference papers hal-01466413v1
Image document

Multi-level Authentication Based Single Sign-On for IMS Services

M. Maachaoui , Anas Abou El Kalam , Christian Fraboul , A. Ait Ouahman
13th International Conference on Communications and Multimedia Security (CMS), Sep 2012, Canterbury, United Kingdom. pp.174-187, ⟨10.1007/978-3-642-32805-3_14⟩
Conference papers hal-01540888v1
Image document

A Generic Multimodels-Based Approach for the Analysis of Usability and Security of Authentication Mechanisms

Nicolas Broders , Célia Martinie , Philippe Palanque , Marco Winckler , Kimmo Halunen
HCSE 2020 - 8th International Conference on Human-Centered Software Engineering - IFIP WG 13.2 International Working Conference, Nov 2020, Eindhoven/ Online, Netherlands. pp.61-83, ⟨10.1007/978-3-030-64266-2_4⟩
Conference papers hal-03079818v1
Image document

Lightweight Authentication Protocol for Low-Cost RFID Tags

Pierre Dusart , Sinaly Traoré
7th International Workshop on Information Security THeory and Practice (WISTP), May 2013, Heraklion, Greece. pp.129-144, ⟨10.1007/978-3-642-38530-8_9⟩
Conference papers hal-01485938v1
Image document

Another Fallen Hash-Based RFID Authentication Protocol

Julio Cesar Hernandez-Castro , Pedro Peris-Lopez , Masoumeh Safkhani , Nasour Bagheri , Majid Naderi
6th International Workshop on Information Security Theory and Practice (WISTP), Jun 2012, Egham, United Kingdom. pp.29-37, ⟨10.1007/978-3-642-30955-7_4⟩
Conference papers hal-01534308v1
Image document

Biometric Swiping on Touchscreens

Orcan Alpar , Ondrej Krejcar
14th Computer Information Systems and Industrial Management (CISIM), Sep 2015, Warsaw, Poland. pp.193-203, ⟨10.1007/978-3-319-24369-6_16⟩
Conference papers hal-01444465v1