BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
EDIT!
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
authentication
Google authentication

Tag #authentication

167 papers:

EDMEDM-2018-CookOKD #approach #education #using
An Open Vocabulary Approach for Estimating Teacher Use of Authentic Questions in Classroom Discourse (CC, AO, SK, SD).
DiGRADiGRA-2018-SchottR #game studies #towards
Presence at History: Toward an Expression of Authentic Historical Content as Game Rules and Play (GS, BR).
CIKMCIKM-2018-AminiNPGYK #framework #mobile #named
DeepAuth: A Framework for Continuous User Re-authentication in Mobile Apps (SA, VN, AP, SG, PSY, CK), pp. 2027–2035.
ICPRICPR-2018-ChoiCT #mobile #network #probability #random
One-class Random Maxout Probabilistic Network for Mobile Touchstroke Authentication (SC, IC, ABJT), pp. 3359–3364.
ICPRICPR-2018-KimT
One-factor Cancellable Biometrics based on Indexing-First-Order Hashing for Fingerprint Authentication (JK, ABJT), pp. 3108–3113.
IFM-2017-FerreiraJMB #case study #coq #linux #quality #using
Certified Password Quality - A Case Study Using Coq and Linux Pluggable Authentication Modules (JFF, SAJ, AM, PJB), pp. 407–421.
CASECASE-2017-HaasWTUS #approach #industrial #mobile
A secured offline authentication approach for industrial mobile robots (SH, AW, RT, TU, CS), pp. 308–313.
ICPRICPR-2016-Chun #adaptation #using
Small scale single pulse ECG-based authentication using GLRT that considers T wave shift and adaptive template update with prior information (SYC), pp. 3043–3048.
ICPRICPR-2016-ItoA #using
A score calculation method using positional information of feature points for biometric authentication (KI, TA), pp. 3049–3054.
ICPRICPR-2016-LiuZH #effectiveness #smarttech
An effective voiceprint based identity authentication system for Mandarin smartphone users (JHL, YXZ, YCH), pp. 1077–1082.
SIGMODSIGMOD-2015-ChenHX #integration #online
Authenticated Online Data Integration Services (QC, HH, JX), pp. 167–181.
VLDBVLDB-2015-PapadopoulosPTT #pattern matching #proving
Practical Authenticated Pattern Matching with Optimal Proof Size (DP, CP, RT, NT), pp. 750–761.
ITiCSEITiCSE-2015-MoralesF #case study #student
Keystroke Biometrics for Student Authentication: A Case Study (AM, JFA), p. 337.
FMFM-2015-Evans #development
Software Development and Authentication for Arms Control Information Barriers (NE), pp. 581–584.
CHICHI-2015-HangLH #exclamation #security #smarttech #what
I Know What You Did Last Week! Do You?: Dynamic Security Questions for Fallback Authentication on Smartphones (AH, ADL, HH), pp. 1383–1392.
CHICHI-2015-LucaHZH #comprehension #exclamation #smarttech #towards
I Feel Like I’m Taking Selfies All Day!: Towards Understanding Biometric Authentication on Smartphones (ADL, AH, EvZ, HH), pp. 1411–1414.
CSCWCSCW-2015-VinesWSWO #collaboration #information management
Authenticity, Relatability and Collaborative Approaches to Sharing Knowledge about Assistive Living Technology (JV, PCW, DS, MW, PO), pp. 82–94.
KDDKDD-2015-ArlorioCLLP #assessment #data mining #mining
Exploiting Data Mining for Authenticity Assessment and Protection of High-Quality Italian Wines from Piedmont (MA, JDC, GL, ML, LP), pp. 1671–1680.
SACSAC-2015-GouthamLY #protocol #smarttech #using
An anonymous ID-based remote mutual authentication with key agreement protocol on ECC using smart cards (RAG, GJL, KYY), pp. 169–174.
SACSAC-2015-PreuveneersJ #named
SmartAuth: dynamic context fingerprinting for continuous user authentication (DP, WJ), pp. 2185–2191.
DATEDATE-2015-HashemianSWWCP #array #robust #using
A robust authentication methodology using physically unclonable functions in DRAM arrays (MSH, BPS, FGW, DJW, SC, CAP), pp. 647–652.
DATEDATE-2015-MundhenkSLFC #lightweight #network
Lightweight authentication for secure automotive networks (PM, SS, ML, SAF, SC), pp. 285–288.
EDMEDM-2014-OstrowH #comparison #feedback #multi #testing #video
Testing the Multimedia Principle in the Real World: A Comparison of Video vs. Text Feedback in Authentic Middle School Math Assignments (KO, NTH), pp. 296–299.
TFPIETFPIE-2014-Winter #functional #named #programming language
Bricklayer: An Authentic Introduction to the Functional Programming Language SML (VLW), pp. 33–49.
FMFM-2014-BonakdarpourHK #automation #knowledge-based #protocol
Knowledge-Based Automated Repair of Authentication Protocols (BB, RH, SSK), pp. 132–147.
FDGFDG-2014-Juul #game studies #independence
High-tech low-tech authenticity: The creation of independent style at the Independent Games Festival (JJ).
CHICHI-2014-BonsignoreMNHKD #design #game studies #interactive
Design tactics for authentic interactive fiction: insights from alternate reality game designers (EMB, VM, CN, DLH, KK, AD), pp. 947–950.
CHICHI-2014-ChowdhuryPM #named
Passhint: memorable and secure authentication (SC, RP, LM), pp. 2917–2926.
CHICHI-2014-LucaHZMSHS #smarttech
Now you see me, now you don’t: protecting smartphone authentication from shoulder surfers (ADL, MH, EvZ, MEM, BES, HH, MS), pp. 2937–2946.
HCIHCI-AIMT-2014-RoshandelMMTK #3d #multi
Multi-sensor Finger Ring for Authentication Based on 3D Signatures (MR, AM, PM, ST, HK), pp. 131–138.
ICPRICPR-2014-LemesSBS #detection
Dynamic Pore Filtering for Keypoint Detection Applied to Newborn Authentication (RdPL, MPS, ORPB, LS), pp. 1698–1703.
POPLPOPL-2014-MillerHKS #data type
Authenticated data structures, generically (AM, MH, JK, ES), pp. 411–424.
SACSAC-2014-A #health #mobile #network #privacy #research #student
Student research abstract: a privacy-preserving profile matching based authentication system for mobile health networks (DHA), pp. 196–197.
SACSAC-2014-MengWK #adaptation #design #mobile
Design of touch dynamics based user authentication with an adaptive mechanism on mobile phones (YM, DSW, LfK), pp. 1680–1687.
SACSAC-2014-YoonY #network #using
A biometric-based authenticated key agreement scheme using ECC for wireless sensor networks (EJY, KYY), pp. 699–705.
ICDARICDAR-2013-GebhardtGSD #detection #documentation #using
Document Authentication Using Printing Technique Features and Unsupervised Anomaly Detection (JG, MG, FS, AD), pp. 479–483.
SIGMODSIGMOD-2013-PapadopoulosCDG #algebra #data type #lightweight #linear #query
Lightweight authentication of linear algebraic queries on data streams (SP, GC, AD, MNG), pp. 881–892.
VLDBVLDB-2013-BajajS #named #query #sql
CorrectDB: SQL Engine with Practical Query Authentication (SB, RS), pp. 529–540.
VLDBVLDB-2014-ChenHX13 #query
Authenticating Top-k Queries in Location-based Services with Confidentiality (QC, HH, JX), pp. 49–60.
ITiCSEITiCSE-2013-BuckD #education #modelling #using
Authentic object modeling in the early computer science curriculum using objektgraph (DB, ID), p. 363.
ITiCSEITiCSE-2013-QianYGBT #learning #mobile #network #security
Mobile device based authentic learning for computer network and security (KQ, MY, MG, PB, LT), p. 335.
SIGITESIGITE-2013-BrannockLN #case study #development #experience #learning
Integrating authentic learning into a software development course: an experience report (EB, RL, NPN), pp. 195–200.
CHICHI-2013-LucaZNMRSL #smarttech
Back-of-device authentication on smartphones (ADL, EvZ, NDHN, MEM, ER, MPS, ML), pp. 2389–2398.
CHICHI-2013-NicholsonCB #performance
Age-related performance issues for PIN and face-based authentication systems (JN, LMC, PB), pp. 323–332.
ICSEICSE-2013-SantosS #assessment #case study #education #re-engineering
Authentic assessment in software engineering education based on PBL principles: a case study in the telecom market (SCdS, FSFS), pp. 1055–1062.
SACSAC-2013-AktasG #assessment #control flow #platform #runtime
Run-time control flow authentication: an assessment on contemporary x86 platforms (EA, KG), pp. 1859–1866.
SIGMODSIGMOD-2012-HuXCY #privacy
Authenticating location-based services without compromising location privacy (HH, JX, QC, ZY), pp. 301–312.
VLDBVLDB-2012-GoodrichNOPTTL #crawling #performance #verification #web
Efficient Verification of Web-Content Searching Through Authenticated Web Crawlers (MTG, DN, OO, CP, RT, NT, CVL), pp. 920–931.
CHICHI-2012-LucaHBLH #exclamation
Touch me once and i know it’s you!: implicit authentication based on touch screen patterns (ADL, AH, FB, CL, HH), pp. 987–996.
CHICHI-2012-Sae-BaeAIM #approach #gesture #multi #novel
Biometric-rich gestures: a novel approach to authentication on multi-touch devices (NSB, KA, KI, NDM), pp. 977–986.
CHICHI-2012-ShiraziMKS #gesture
Assessing the vulnerability of magnetic gestural authentication to video-based shoulder surfing attacks (ASS, PM, HK, AS), pp. 2045–2048.
CIKMCIKM-2012-YungLY #query
Authentication of moving range queries (DY, EL, MLY), pp. 1372–1381.
ICPRICPR-2012-Gomez-BarreroGFOMF #case study #geometry
Inverse biometrics: A case study in hand geometry authentication (MGB, JG, JF, JOG, AM, MAF), pp. 1281–1284.
ICPRICPR-2012-MaLWZH #multimodal #security
Enhancing biometric security with wavelet quantization watermarking based two-stage multimodal authentication (BM, CL, YW, ZZ, DH), pp. 2416–2419.
ICPRICPR-2012-MotlicekSWMM #mobile #modelling #using #variability
Bi-modal authentication in mobile environments using session variability modelling (PM, LES, RW, CM, SM), pp. 1100–1103.
ICPRICPR-2012-NakamuraIKB #behaviour #multi #tablet
Tablet owner authentication based on behavioral characteristics of multi-touch actions (KN, YI, KK, NB), pp. 3431–3434.
ICPRICPR-2012-PohKA #approach #parametricity
A discriminative parametric approach to video-based score-level fusion for biometric authentication (NP, JK, FMA), pp. 2335–2338.
ICPRICPR-2012-RenO #video
Accuracy of a high-level, loss-tolerant video fingerprint for surveillance authentication (Y(R, LO), pp. 1088–1091.
ICPRICPR-2012-YanoZL #multimodal
Multimodal biometric authentication based on iris pattern and pupil light reflex (VY, AZ, LLL), pp. 2857–2860.
SACSAC-2012-RahmanA #named #network #protocol #robust
DRAP: a Robust Authentication protocol to ensure survivability of computational RFID networks (FR, SIA), pp. 498–503.
DATEDATE-2012-LiDT #detection #framework #hardware #self
A sensor-assisted self-authentication framework for hardware trojan detection (ML, AD, MT), pp. 1331–1336.
CHICHI-2011-HayashiHC #security #visual notation
Security through a different kind of obscurity: evaluating distortion in graphical authentication schemes (EH, JIH, NC), pp. 2055–2064.
CHICHI-2011-KhotSK #named #novel #using
MARASIM: a novel jigsaw based authentication scheme using tagging (RAK, KS, PK), pp. 2605–2614.
HCIDUXU-v1-2011-TambasciaDM #mobile #multimodal
Methodology for Evaluating Multimodal Biometric Authentication on Mobile Devices (CdAT, RED, EMDM), pp. 668–677.
HCIHCD-2011-Yamane #case study #design #game studies #multi #online
Secure Online Game Play with Token: A Case Study in the Design of Multi-factor Authentication Device (SRY), pp. 597–605.
HCIHIMI-v1-2011-LeeKW #multi #smarttech #using
Cryptanalysis to a Remote User Authentication Scheme Using Smart Cards for Multi-server Environment (YL, JK, DW), pp. 321–329.
HCIHIMI-v1-2011-NamPKLW
Server-Aided Password-Authenticated Key Exchange: From 3-Party to Group (JN, JP, JK, YL, DW), pp. 339–348.
HCIHIMI-v1-2011-Pavel #analysis #case study #protocol
Analysis of Authentication Protocols with Scyter: Case Study (OP), pp. 359–365.
HCIHIMI-v1-2011-PavelJ #approach #design #logic #protocol
Routing Functionality in the Logic Approach for Authentication Protocol Design (OP, HJ), pp. 366–373.
EDOCEDOC-2011-Bellamy-McIntyreLW #analysis #enterprise #modelling
OpenID and the Enterprise: A Model-Based Analysis of Single Sign-On Authentication (JBM, CL, GW), pp. 129–138.
ICEISICEIS-v3-2011-HuangHGL #health #monitoring
Scheme of Authentication of Health Monitoring System based on Credit Card Mechanism (QH, QH, CG, SL), pp. 350–354.
CIKMCIKM-2011-LinXH #query
Authentication of location-based skyline queries (XL, JX, HH), pp. 1583–1588.
SACSAC-2011-ClaycombS #analysis #formal method #ubiquitous
Formal analysis of device authentication applications in ubiquitous computing (WC, DS), pp. 451–452.
SACSAC-2011-GafurovBBY
Fusion in fingerprint authentication: two finger types vs. two scanner types (DG, CB, PB, BY), pp. 13–18.
SACSAC-2011-MaioranaCGN #mobile
Keystroke dynamics authentication for mobile phones (EM, PC, NGC, AN), pp. 21–26.
PDPPDP-2011-Berbecaru #mobile #named #protocol
LRAP: A Location-Based Remote Client Authentication Protocol for Mobile Environments (DB), pp. 141–145.
CHICHI-2010-KimDBHNNO #multi
Multi-touch authentication on tabletops (DK, PD, PB, JH, JN, JN, PO), pp. 1093–1102.
ICEISICEIS-DISI-2010-AndreiRD #online
Solutions for Speeding-up On-line Dynamic Signature Authentication (VA, SMR, SD), pp. 121–126.
ICEISICEIS-HCI-2010-NosseirT #case study
A Study in Authentication Via Electronic Personal History Questions (AN, ST), pp. 63–70.
ICEISICEIS-J-2010-NosseirT10a #towards
Towards Authentication via Selected Extraction from Electronic Personal Histories (AN, ST), pp. 571–586.
ICPRICPR-2010-GuoZ #capacity #image
High Capacity Data Hiding for Binary Image Authentication (MG, HZ), pp. 1441–1444.
ICPRICPR-2010-HassanAMHW #image #self #using
Secure Self-Recovery Image Authentication Using Randomly-Sized Blocks (AMH, AAH, BM, YMYH, MAAW), pp. 1445–1448.
ICPRICPR-2010-HemerySR #case study #image
Study on Color Spaces for Single Image Enrolment Face Authentication (BH, JJS, CR), pp. 1249–1252.
ICPRICPR-2010-HuangDLTL #detection #normalisation
Finger-Vein Authentication Based on Wide Line Detector and Pattern Normalization (BH, YD, RL, DT, WL), pp. 1269–1272.
ICPRICPR-2010-MaLWZW #adaptation #multimodal
Block Pyramid Based Adaptive Quantization Watermarking for Multimodal Biometric Authentication (BM, CL, YW, ZZ, YW), pp. 1277–1280.
DATEDATE-2010-PellegriniBA
Fault-based attack of RSA authentication (AP, VB, TMA), pp. 855–860.
ICDARICDAR-2009-GarainH #documentation #security
Machine Authentication of Security Documents (UG, BH), pp. 718–722.
ICDARICDAR-2009-MuramatsuYM #online #using
Biometric Person Authentication Method Using Camera-Based Online Signature Acquisition (DM, KY, TM), pp. 46–50.
SIGMODSIGMOD-2009-YangPPK #database #outsourcing
Authenticated join processing in outsourced databases (YY, DP, SP, PK), pp. 5–18.
CHICHI-2009-LucaZH #named
Vibrapass: secure authentication based on shared lies (ADL, EvZ, HH), pp. 913–916.
CHICHI-2009-SchechterER #approach #social #what
It’s not what you know, but who you know: a social approach to last-resort authentication (SES, SE, RWR), pp. 1983–1992.
HCIIDGD-2009-EugeneHMBRL #design #process #what
This Is Who I Am and This Is What I Do: Demystifying the Process of Designing Culturally Authentic Technology (WE, LH, KM, QB, YAR, SL), pp. 19–28.
ICEISICEIS-J-2009-PenteadoM #web
A Video-Based Biometric Authentication for e-Learning Web Applications (BEP, ANM), pp. 770–779.
MODELSMoDELS-2009-LloydJ #analysis #ml #security #using
Security Analysis of a Biometric Authentication System Using UMLsec and JML (JL, JJ), pp. 77–91.
MODELSMoDELS-2009-LloydJ #analysis #ml #security #using
Security Analysis of a Biometric Authentication System Using UMLsec and JML (JL, JJ), pp. 77–91.
SACSAC-2009-HoqueRA #privacy #protocol #robust #security #using
Supporting recovery, privacy and security in RFID systems using a robust authentication protocol (MEH, FR, SIA), pp. 1062–1066.
CASECASE-2009-ChavanZK #protocol
A server centric authentication protocol for a RFID system (KPC, AZ, SK), pp. 227–232.
DACDAC-2009-DengCS #hardware #performance #simulation
Hardware authentication leveraging performance limits in detailed simulations and emulations (DYD, AHC, GES), pp. 682–687.
ESOPESOP-2009-KikuchiK #automation #encryption #protocol #type system #verification
Type-Based Automated Verification of Authenticity in Cryptographic Protocols (DK, NK), pp. 222–236.
FoSSaCSFoSSaCS-2009-Guttman #composition #encryption #protocol #testing
Cryptographic Protocol Composition via the Authentication Tests (JDG), pp. 303–317.
VLDBVLDB-2008-PangM #query
Authenticating the query results of text search engines (HP, KM), pp. 126–137.
SIGITESIGITE-2008-Rubino #identification
An open system for transparent firewall authentication and user traffic identification within corporate intranets (RDR), pp. 113–118.
ICALPICALP-C-2008-JareckiL #multi #performance
Affiliation-Hiding Envelope and Authentication Schemes with Efficient Support for Multiple Credentials (SJ, XL), pp. 715–726.
ICALPICALP-C-2008-KolesnikovR
Password Mistyping in Two-Factor-Authenticated Key Exchange (VK, CR), pp. 702–714.
CHICHI-2008-JakobssonSWY
Love and authentication (MJ, ES, SW, LY), pp. 197–200.
CHICHI-2008-MoherUBSM #design #interactive #named
WallCology: designing interaction affordances for learner engagement in authentic science inquiry (TM, BU, DB, BLS, PM), pp. 163–172.
CHICHI-2008-SasamotoCH #named
Undercover: authentication usable in front of prying eyes (HS, NC, EH), pp. 183–192.
EDOCEDOC-2008-BoehmCFP #case study
Federated Authentication and Authorization: A Case Study (OB, JC, MF, OP), pp. 356–362.
ICEISICEIS-ISAS2-2008-NgoWL #network
A Group Authentication Model for Wireless Network Services Based on Group Key Management (HHN, XW, PDL), pp. 182–188.
ICPRICPR-2008-OkaKXLW #named #similarity #sketching #using
Scribble-a-Secret: Similarity-based password authentication using sketches (MO, KK, YX, LL, FW), pp. 1–4.
ICPRICPR-2008-PohK #bound #fault #multimodal #on the #using
On using error bounds to optimize cost-sensitive multimodal biometric authentication (NP, JK), pp. 1–4.
VLDBVLDB-2007-LiYHK #query
Proof-Infused Streams: Enabling Authentication of Sliding Window Queries On Streams (FL, KY, MH, GK), pp. 147–158.
VLDBVLDB-2007-PapadopoulosYP #data type #named
CADS: Continuous Authentication on Data Streams (SP, YY, DP), pp. 135–146.
HCIHCI-AS-2007-XiaoCR #collaboration #learning #process
Support Case-Based Authentic Learning Activities: A Collaborative Case Commenting Tool and a Collaborative Case Builder (LX, JMC, MBR), pp. 371–380.
HCIOCSC-2007-MaAL #protocol
Chameleon-Based Deniable Authenticated Key Agreement Protocol Secure Against Forgery (CM, JA, JL), pp. 124–133.
DACDAC-2007-SuhD #generative #physics
Physical Unclonable Functions for Device Authentication and Secret Key Generation (GES, SD), pp. 9–14.
DRRDRR-2006-WangDLL #documentation
A new document authentication method by embedding deformation characters (XW, XD, HL, CL).
SIGMODSIGMOD-2006-LiHKR #database #outsourcing
Dynamic authenticated index structures for outsourced databases (FL, MH, GK, LR), pp. 121–132.
EDOCEDOC-2006-WangensteenLJD #enterprise
Secured enterprise access with strong SIM authentication (AW, LL, IJ, TvD), pp. 463–466.
ICEISICEIS-ISAS-2006-MartinhoDR #requirements #workflow
Supporting Authentication Requirements in Workflows (RM, DD, ARS), pp. 181–188.
ICPRICPR-v3-2006-AmorAC #3d #recognition
New Experiments on ICP-Based 3D Face Recognition and Authentication (BBA, MA, LC), pp. 1195–1199.
ICPRICPR-v3-2006-FarajB
Motion Features from Lip Movement for Person Authentication (MIF, JB), pp. 1059–1062.
ICPRICPR-v4-2006-Gonzalez-JimenezA
Pose Correction and Subject-Specific Features for Face Authentication (DGJ, JLAC), pp. 602–605.
ICPRICPR-v4-2006-KumarZ
Combining Fingerprint, Palmprint and Hand-Shape for User Authentication (AK, DZ), pp. 549–552.
DATEDATE-DF-2006-AarajRRJ #architecture #embedded #performance
Architectures for efficient face authentication in embedded systems (NA, SR, AR, NKJ), pp. 1–6.
DiGRADiGRA-2005-Galarneau #case study #experience #game studies #learning #simulation
Authentic Learning Experiences Through Play: Games, Simulations and the Construction of Knowledge (LG).
DACDAC-2005-GuptaRRJ #embedded #performance
Efficient fingerprint-based user authentication for embedded systems (PG, SR, AR, NKJ), pp. 244–247.
ICEISICEIS-v3-2004-PerkinsC #case study #collaboration #design #industrial #process #social
E-Systems Design Through the Study of Authentic Work Practice — Social Activity Theory and the Case of University — Industry Collaboration (JP, SC), pp. 317–324.
ICPRICPR-v1-2004-Li
Handwriting Authentication by Envelopes of Sound Signatures (FFL), pp. 401–404.
ICPRICPR-v2-2004-SchimkeVD #adaptation #distance #online #using
Using Adapted Levenshtein Distance for On-Line Signature Authentication (SS, CV, JD), pp. 931–934.
ICPRICPR-v4-2004-MesserKSHKCMBSCVMLSCPVBSWYHHHMTMWWXMYFDLGSPR #database
Face Authentication Test on the BANCA Database (KM, JK, MS, MH, AK, FC, SM, SB, CS, JC, LV, CM, SL, SS, VC, RPP, EV, LB, LS, YW, YHC, HCL, YPH, AH, MKM, AT, CvdM, RPW, ZW, FX, YM, QY, CF, XD, SL, RG, HS, NP, YR), pp. 523–532.
POPLPOPL-2004-BhargavanFG #semantics #web #web service
A semantics for web services authentication (KB, CF, ADG), pp. 198–209.
SACSAC-2004-WaldmannSE
Protected transmission of biometric user authentication data for oncard-matching (UW, DS, CE), pp. 425–430.
ESOPESOP-2004-BugliesiFM #analysis #composition #protocol
Compositional Analysis of Authentication Protocols (MB, RF, MM), pp. 140–154.
ICDARICDAR-2003-Fairhurst #documentation #future of #verification
Document Identity, Authentication and Ownership: The Future of Biometric Verification (MCF), p. 1108–?.
ICEISICEIS-v3-2003-DooKK
Trusted Authentication Between User and Machine (SD, JK, EK), pp. 577–581.
ICEISICEIS-v3-2003-SawmaP #design #e-commerce #effectiveness
E-Commerce Authentication: An Effective Countermeasures Design Model (VDS, RLP), pp. 447–455.
ICEISICEIS-v4-2003-Coleman
User Authentication for E-Business (JC), pp. 413–417.
SACSAC-2003-AtallahL
Authentication of LZ-77 Compressed Data (MJA, SL), pp. 282–287.
SACSAC-2003-EgidiM
Authentication and Access Delegation with User-Released Certificates (LE, MM), pp. 288–293.
SACSAC-2003-FrancescoP #mobile #protocol #reliability
Authenticity in a Reliable Protocol for Mobile Computing (NDF, MP), pp. 318–324.
SACSAC-2003-GassendCDD
Delay-Based Circuit Authentication and Applications (BG, DEC, MvD, SD), pp. 294–301.
SOSPSOSP-2003-KaminskySMK #distributed #file system
Decentralized user authentication in a global file system (MK, GS, DM, MFK), pp. 60–73.
ICPRICPR-v2-2002-PangKB
Membership Authentication in Dynamic Face Groups (SP, DK, SYB), pp. 374–377.
ICPRICPR-v3-2002-KongZ #analysis #image
Palmprint Texture Analysis Based on Low-Resolution Images for Personal Authentication (AWKK, DZ), pp. 807–810.
SEKESEKE-2002-BlundoC #named #web
SAWM: a tool for secure and authenticated web metering (CB, SC), pp. 641–648.
SASSAS-2002-Blanchet #protocol #security
From Secrecy to Authenticity in Security Protocols (BB), pp. 342–359.
SACSAC-2002-BrommeKEK #algorithm #concept #framework #operating system #testing
A conceptual framework for testing biometric algorithms within operating systems’ authentication (AB, MK, OE, OK), pp. 273–280.
SACSAC-2002-XuS #multi
Authenticated multicast immune to denial-of-service attack (SX, RSS), pp. 196–200.
STOCSTOC-2002-LindellLR #composition #on the
On the composition of authenticated byzantine agreement (YL, AL, TR), pp. 514–523.
WRLAWRLA-2002-OgataF #protocol #verification
Rewriting-Based Verification of Authentication Protocols (KO, KF), pp. 208–222.
VLDBVLDB-2001-Duranti
The Long-Term Preservation of Authentic Electronic Records (LD), pp. 625–628.
PADLPADL-2001-Cirstea #protocol #specification #using
Specifying Authentication Protocols Using Rewriting and Strategies (HC), pp. 138–152.
ICPRICPR-v2-2000-BollePR #evaluation
Evaluation Techniques for Biometrics-Based Authentication Systems (FRR) (RMB, SP, NKR), pp. 2831–2837.
ICPRICPR-v4-2000-Uchida #interface #mobile
Fingerprint-Based User-Friendly Interface and Pocket-PID for Mobile Authentication (KU), pp. 4205–4209.
POPLPOPL-2000-AbadiFG #compilation
Authentication Primitives and Their Compilation (MA, CF, GG), pp. 302–315.
CAVCAV-1999-Schumann #analysis #automation #named #protocol
PIL/SETHEO: A Tool for the Automatic Analysis of Authentication Protocols (JS), pp. 500–504.
ICPRICPR-1998-KronerL #pattern matching #pattern recognition #recognition
Authentication of free hand drawings by pattern recognition methods (SK, ADL), pp. 462–464.
STOCSTOC-1998-BellareCK #analysis #approach #composition #design #protocol
A Modular Approach to the Design and Analysis of Authentication and Key Exchange Protocols (MB, RC, HK), pp. 419–428.
SACSAC-1997-TsaurHC #approach #data access #distributed #geometry #using
An authentication-combined access control scheme using a geometric approach in distributed systems (WJT, SJH, CHC), pp. 361–365.
ICPRICPR-1996-KroepelienVJ #case study #database #image
Image databases: a case study in Norwegian silver authentication (BK, AV, AKJ), pp. 370–374.
ICPRICPR-1996-OGormanR #encryption #pattern matching #pattern recognition #recognition
Photo-image authentication by pattern recognition and cryptography (LO, IR), pp. 949–953.
ICDARICDAR-1993-BrzakovicV #documentation #random #recognition
Document recognition/authentication based on medium-embedded random patterns (DB, NV), pp. 95–98.
SOSPSOSP-1993-WobberABL #operating system
Authentication in the Taos Operating System (EW, MA, MB, BWL), pp. 256–269.
SOSPSOSP-1991-LampsonABW #distributed #theory and practice
Authentication in Distributed Systems: Theory and Practice (BWL, MA, MB, EW), pp. 165–182.
SOSPSOSP-1989-BurrowsAN #logic
A Logic of Authentication (MB, MA, RMN), pp. 1–13.
SOSPSOSP-1981-Gifford #encryption
Cryptographic Sealing for Information Secrecy and Authentication (DKG), pp. 123–124.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.