151 papers:
- DATE-2015-HashemianSWWCP #array #authentication #robust #using
- A robust authentication methodology using physically unclonable functions in DRAM arrays (MSH, BPS, FGW, DJW, SC, CAP), pp. 647–652.
- DATE-2015-MundhenkSLFC #authentication #lightweight #network
- Lightweight authentication for secure automotive networks (PM, SS, ML, SAF, SC), pp. 285–288.
- SIGMOD-2015-ChenHX #authentication #integration #online
- Authenticated Online Data Integration Services (QC, HH, JX), pp. 167–181.
- VLDB-2015-PapadopoulosPTT #authentication #pattern matching #proving
- Practical Authenticated Pattern Matching with Optimal Proof Size (DP, CP, RT, NT), pp. 750–761.
- ITiCSE-2015-MoralesF #authentication #case study #student
- Keystroke Biometrics for Student Authentication: A Case Study (AM, JFA), p. 337.
- FM-2015-Evans #authentication #development
- Software Development and Authentication for Arms Control Information Barriers (NE), pp. 581–584.
- CHI-2015-HangLH #authentication #exclamation #security #smarttech #what
- I Know What You Did Last Week! Do You?: Dynamic Security Questions for Fallback Authentication on Smartphones (AH, ADL, HH), pp. 1383–1392.
- CHI-2015-LucaHZH #authentication #comprehension #exclamation #smarttech #towards
- I Feel Like I’m Taking Selfies All Day!: Towards Understanding Biometric Authentication on Smartphones (ADL, AH, EvZ, HH), pp. 1411–1414.
- CSCW-2015-VinesWSWO #authentication #collaboration #information management
- Authenticity, Relatability and Collaborative Approaches to Sharing Knowledge about Assistive Living Technology (JV, PCW, DS, MW, PO), pp. 82–94.
- KDD-2015-ArlorioCLLP #assessment #authentication #data mining #mining
- Exploiting Data Mining for Authenticity Assessment and Protection of High-Quality Italian Wines from Piedmont (MA, JDC, GL, ML, LP), pp. 1671–1680.
- SAC-2015-GouthamLY #authentication #protocol #smarttech #using
- An anonymous ID-based remote mutual authentication with key agreement protocol on ECC using smart cards (RAG, GJL, KYY), pp. 169–174.
- SAC-2015-PreuveneersJ #authentication #named
- SmartAuth: dynamic context fingerprinting for continuous user authentication (DP, WJ), pp. 2185–2191.
- TFPIE-2014-Winter #authentication #functional #named #programming language
- Bricklayer: An Authentic Introduction to the Functional Programming Language SML (VLW), pp. 33–49.
- FM-2014-BonakdarpourHK #authentication #automation #knowledge-based #protocol
- Knowledge-Based Automated Repair of Authentication Protocols (BB, RH, SSK), pp. 132–147.
- CHI-2014-BonsignoreMNHKD #authentication #design #game studies #interactive
- Design tactics for authentic interactive fiction: insights from alternate reality game designers (EMB, VM, CN, DLH, KK, AD), pp. 947–950.
- CHI-2014-ChowdhuryPM #authentication #named
- Passhint: memorable and secure authentication (SC, RP, LM), pp. 2917–2926.
- CHI-2014-LucaHZMSHS #authentication #smarttech
- Now you see me, now you don’t: protecting smartphone authentication from shoulder surfers (ADL, MH, EvZ, MEM, BES, HH, MS), pp. 2937–2946.
- HCI-AIMT-2014-RoshandelMMTK #3d #authentication #multi
- Multi-sensor Finger Ring for Authentication Based on 3D Signatures (MR, AM, PM, ST, HK), pp. 131–138.
- ICPR-2014-LemesSBS #authentication #detection
- Dynamic Pore Filtering for Keypoint Detection Applied to Newborn Authentication (RdPL, MPS, ORPB, LS), pp. 1698–1703.
- POPL-2014-MillerHKS #authentication #data type
- Authenticated data structures, generically (AM, MH, JK, ES), pp. 411–424.
- SAC-2014-A #authentication #health #mobile #network #privacy #research #student
- Student research abstract: a privacy-preserving profile matching based authentication system for mobile health networks (DHA), pp. 196–197.
- SAC-2014-MengWK #adaptation #authentication #design #mobile
- Design of touch dynamics based user authentication with an adaptive mechanism on mobile phones (YM, DSW, LfK), pp. 1680–1687.
- SAC-2014-YoonY #authentication #network #using
- A biometric-based authenticated key agreement scheme using ECC for wireless sensor networks (EJY, KYY), pp. 699–705.
- ICDAR-2013-GebhardtGSD #authentication #detection #documentation #using
- Document Authentication Using Printing Technique Features and Unsupervised Anomaly Detection (JG, MG, FS, AD), pp. 479–483.
- SIGMOD-2013-PapadopoulosCDG #algebra #authentication #data type #lightweight #linear #query
- Lightweight authentication of linear algebraic queries on data streams (SP, GC, AD, MNG), pp. 881–892.
- VLDB-2013-BajajS #authentication #named #query #sql
- CorrectDB: SQL Engine with Practical Query Authentication (SB, RS), pp. 529–540.
- VLDB-2014-ChenHX13 #authentication #query
- Authenticating Top-k Queries in Location-based Services with Confidentiality (QC, HH, JX), pp. 49–60.
- ITiCSE-2013-BuckD #authentication #education #modelling #using
- Authentic object modeling in the early computer science curriculum using objektgraph (DB, ID), p. 363.
- ITiCSE-2013-QianYGBT #authentication #learning #mobile #network #security
- Mobile device based authentic learning for computer network and security (KQ, MY, MG, PB, LT), p. 335.
- CHI-2013-LucaZNMRSL #authentication #smarttech
- Back-of-device authentication on smartphones (ADL, EvZ, NDHN, MEM, ER, MPS, ML), pp. 2389–2398.
- CHI-2013-NicholsonCB #authentication #performance
- Age-related performance issues for PIN and face-based authentication systems (JN, LMC, PB), pp. 323–332.
- SAC-2013-AktasG #assessment #authentication #control flow #runtime
- Run-time control flow authentication: an assessment on contemporary x86 platforms (EA, KG), pp. 1859–1866.
- ICSE-2013-SantosS #assessment #authentication #case study #education #re-engineering
- Authentic assessment in software engineering education based on PBL principles: a case study in the telecom market (SCdS, FSFS), pp. 1055–1062.
- DATE-2012-LiDT #authentication #detection #framework #hardware #self
- A sensor-assisted self-authentication framework for hardware trojan detection (ML, AD, MT), pp. 1331–1336.
- SIGMOD-2012-HuXCY #authentication #privacy
- Authenticating location-based services without compromising location privacy (HH, JX, QC, ZY), pp. 301–312.
- VLDB-2012-GoodrichNOPTTL #authentication #crawling #performance #verification #web
- Efficient Verification of Web-Content Searching Through Authenticated Web Crawlers (MTG, DN, OO, CP, RT, NT, CVL), pp. 920–931.
- CHI-2012-LucaHBLH #authentication #exclamation
- Touch me once and i know it’s you!: implicit authentication based on touch screen patterns (ADL, AH, FB, CL, HH), pp. 987–996.
- CHI-2012-Sae-BaeAIM #approach #authentication #gesture #multi #novel
- Biometric-rich gestures: a novel approach to authentication on multi-touch devices (NSB, KA, KI, NDM), pp. 977–986.
- CHI-2012-ShiraziMKS #authentication #gesture
- Assessing the vulnerability of magnetic gestural authentication to video-based shoulder surfing attacks (ASS, PM, HK, AS), pp. 2045–2048.
- CIKM-2012-YungLY #authentication #query
- Authentication of moving range queries (DY, EL, MLY), pp. 1372–1381.
- ICPR-2012-Gomez-BarreroGFOMF #authentication #case study #geometry
- Inverse biometrics: A case study in hand geometry authentication (MGB, JG, JF, JOG, AM, MAF), pp. 1281–1284.
- ICPR-2012-MaLWZH #authentication #multimodal #security
- Enhancing biometric security with wavelet quantization watermarking based two-stage multimodal authentication (BM, CL, YW, ZZ, DH), pp. 2416–2419.
- ICPR-2012-MotlicekSWMM #authentication #mobile #modelling #using #variability
- Bi-modal authentication in mobile environments using session variability modelling (PM, LES, RW, CM, SM), pp. 1100–1103.
- ICPR-2012-NakamuraIKB #authentication #behaviour #multi #tablet
- Tablet owner authentication based on behavioral characteristics of multi-touch actions (KN, YI, KK, NB), pp. 3431–3434.
- ICPR-2012-PohKA #approach #authentication #parametricity
- A discriminative parametric approach to video-based score-level fusion for biometric authentication (NP, JK, FMA), pp. 2335–2338.
- ICPR-2012-RenO #authentication #video
- Accuracy of a high-level, loss-tolerant video fingerprint for surveillance authentication (Y(R, LO), pp. 1088–1091.
- ICPR-2012-YanoZL #authentication #multimodal
- Multimodal biometric authentication based on iris pattern and pupil light reflex (VY, AZ, LLL), pp. 2857–2860.
- SAC-2012-RahmanA #authentication #named #network #protocol #robust
- DRAP: a Robust Authentication protocol to ensure survivability of computational RFID networks (FR, SIA), pp. 498–503.
- CHI-2011-HayashiHC #authentication #security #visual notation
- Security through a different kind of obscurity: evaluating distortion in graphical authentication schemes (EH, JIH, NC), pp. 2055–2064.
- CHI-2011-KhotSK #authentication #named #novel #using
- MARASIM: a novel jigsaw based authentication scheme using tagging (RAK, KS, PK), pp. 2605–2614.
- DUXU-v1-2011-TambasciaDM #authentication #mobile #multimodal
- Methodology for Evaluating Multimodal Biometric Authentication on Mobile Devices (CdAT, RED, EMDM), pp. 668–677.
- HCD-2011-Yamane #authentication #case study #design #game studies #multi #online
- Secure Online Game Play with Token: A Case Study in the Design of Multi-factor Authentication Device (SRY), pp. 597–605.
- HIMI-v1-2011-LeeKW #authentication #multi #smarttech #using
- Cryptanalysis to a Remote User Authentication Scheme Using Smart Cards for Multi-server Environment (YL, JK, DW), pp. 321–329.
- HIMI-v1-2011-NamPKLW #authentication
- Server-Aided Password-Authenticated Key Exchange: From 3-Party to Group (JN, JP, JK, YL, DW), pp. 339–348.
- HIMI-v1-2011-Pavel #analysis #authentication #case study #protocol
- Analysis of Authentication Protocols with Scyter: Case Study (OP), pp. 359–365.
- HIMI-v1-2011-PavelJ #approach #authentication #design #logic #protocol
- Routing Functionality in the Logic Approach for Authentication Protocol Design (OP, HJ), pp. 366–373.
- EDOC-2011-Bellamy-McIntyreLW #analysis #authentication #enterprise #modelling
- OpenID and the Enterprise: A Model-Based Analysis of Single Sign-On Authentication (JBM, CL, GW), pp. 129–138.
- ICEIS-v3-2011-HuangHGL #authentication #health #monitoring
- Scheme of Authentication of Health Monitoring System based on Credit Card Mechanism (QH, QH, CG, SL), pp. 350–354.
- CIKM-2011-LinXH #authentication #query
- Authentication of location-based skyline queries (XL, JX, HH), pp. 1583–1588.
- SAC-2011-ClaycombS #analysis #authentication #formal method #ubiquitous
- Formal analysis of device authentication applications in ubiquitous computing (WC, DS), pp. 451–452.
- SAC-2011-GafurovBBY #authentication
- Fusion in fingerprint authentication: two finger types vs. two scanner types (DG, CB, PB, BY), pp. 13–18.
- SAC-2011-MaioranaCGN #authentication #mobile
- Keystroke dynamics authentication for mobile phones (EM, PC, NGC, AN), pp. 21–26.
- DATE-2010-PellegriniBA #authentication
- Fault-based attack of RSA authentication (AP, VB, TMA), pp. 855–860.
- CHI-2010-KimDBHNNO #authentication #multi
- Multi-touch authentication on tabletops (DK, PD, PB, JH, JN, JN, PO), pp. 1093–1102.
- ICEIS-DISI-2010-AndreiRD #authentication #online
- Solutions for Speeding-up On-line Dynamic Signature Authentication (VA, SMR, SD), pp. 121–126.
- ICEIS-HCI-2010-NosseirT #authentication #case study
- A Study in Authentication Via Electronic Personal History Questions (AN, ST), pp. 63–70.
- ICEIS-J-2010-NosseirT10a #authentication #towards
- Towards Authentication via Selected Extraction from Electronic Personal Histories (AN, ST), pp. 571–586.
- ICPR-2010-GuoZ #authentication #capacity #image
- High Capacity Data Hiding for Binary Image Authentication (MG, HZ), pp. 1441–1444.
- ICPR-2010-HassanAMHW #authentication #image #self #using
- Secure Self-Recovery Image Authentication Using Randomly-Sized Blocks (AMH, AAH, BM, YMYH, MAAW), pp. 1445–1448.
- ICPR-2010-HemerySR #authentication #case study #image
- Study on Color Spaces for Single Image Enrolment Face Authentication (BH, JJS, CR), pp. 1249–1252.
- ICPR-2010-HuangDLTL #authentication #detection #normalisation
- Finger-Vein Authentication Based on Wide Line Detector and Pattern Normalization (BH, YD, RL, DT, WL), pp. 1269–1272.
- ICPR-2010-MaLWZW #adaptation #authentication #multimodal
- Block Pyramid Based Adaptive Quantization Watermarking for Multimodal Biometric Authentication (BM, CL, YW, ZZ, YW), pp. 1277–1280.
- CASE-2009-ChavanZK #authentication #protocol
- A server centric authentication protocol for a RFID system (KPC, AZ, SK), pp. 227–232.
- DAC-2009-DengCS #authentication #hardware #performance #simulation
- Hardware authentication leveraging performance limits in detailed simulations and emulations (DYD, AHC, GES), pp. 682–687.
- ICDAR-2009-GarainH #authentication #documentation #security
- Machine Authentication of Security Documents (UG, BH), pp. 718–722.
- ICDAR-2009-MuramatsuYM #authentication #online #using
- Biometric Person Authentication Method Using Camera-Based Online Signature Acquisition (DM, KY, TM), pp. 46–50.
- SIGMOD-2009-YangPPK #authentication #database #outsourcing
- Authenticated join processing in outsourced databases (YY, DP, SP, PK), pp. 5–18.
- ESOP-2009-KikuchiK #authentication #automation #encryption #protocol #type system #verification
- Type-Based Automated Verification of Authenticity in Cryptographic Protocols (DK, NK), pp. 222–236.
- FoSSaCS-2009-Guttman #authentication #composition #encryption #protocol #testing
- Cryptographic Protocol Composition via the Authentication Tests (JDG), pp. 303–317.
- CHI-2009-LucaZH #authentication #named
- Vibrapass: secure authentication based on shared lies (ADL, EvZ, HH), pp. 913–916.
- CHI-2009-SchechterER #approach #authentication #social #what
- It’s not what you know, but who you know: a social approach to last-resort authentication (SES, SE, RWR), pp. 1983–1992.
- IDGD-2009-EugeneHMBRL #authentication #design #process #what
- This Is Who I Am and This Is What I Do: Demystifying the Process of Designing Culturally Authentic Technology (WE, LH, KM, QB, YAR, SL), pp. 19–28.
- ICEIS-J-2009-PenteadoM #authentication #web
- A Video-Based Biometric Authentication for e-Learning Web Applications (BEP, ANM), pp. 770–779.
- MoDELS-2009-LloydJ #analysis #authentication #ml #security #using
- Security Analysis of a Biometric Authentication System Using UMLsec and JML (JL, JJ), pp. 77–91.
- MoDELS-2009-LloydJ #analysis #authentication #ml #security #using
- Security Analysis of a Biometric Authentication System Using UMLsec and JML (JL, JJ), pp. 77–91.
- SAC-2009-HoqueRA #authentication #privacy #protocol #robust #security #using
- Supporting recovery, privacy and security in RFID systems using a robust authentication protocol (MEH, FR, SIA), pp. 1062–1066.
- VLDB-2008-PangM #authentication #query
- Authenticating the query results of text search engines (HP, KM), pp. 126–137.
- ICALP-C-2008-JareckiL #authentication #multi #performance
- Affiliation-Hiding Envelope and Authentication Schemes with Efficient Support for Multiple Credentials (SJ, XL), pp. 715–726.
- ICALP-C-2008-KolesnikovR #authentication
- Password Mistyping in Two-Factor-Authenticated Key Exchange (VK, CR), pp. 702–714.
- CHI-2008-JakobssonSWY #authentication
- Love and authentication (MJ, ES, SW, LY), pp. 197–200.
- CHI-2008-MoherUBSM #authentication #design #interactive #named
- WallCology: designing interaction affordances for learner engagement in authentic science inquiry (TM, BU, DB, BLS, PM), pp. 163–172.
- CHI-2008-SasamotoCH #authentication #named
- Undercover: authentication usable in front of prying eyes (HS, NC, EH), pp. 183–192.
- EDOC-2008-BoehmCFP #authentication #case study
- Federated Authentication and Authorization: A Case Study (OB, JC, MF, OP), pp. 356–362.
- ICEIS-ISAS2-2008-NgoWL #authentication #network
- A Group Authentication Model for Wireless Network Services Based on Group Key Management (HHN, XW, PDL), pp. 182–188.
- ICPR-2008-OkaKXLW #authentication #named #similarity #sketching #using
- Scribble-a-Secret: Similarity-based password authentication using sketches (MO, KK, YX, LL, FW), pp. 1–4.
- ICPR-2008-PohK #authentication #bound #fault #multimodal #on the #using
- On using error bounds to optimize cost-sensitive multimodal biometric authentication (NP, JK), pp. 1–4.
- DAC-2007-SuhD #authentication #generative #physics
- Physical Unclonable Functions for Device Authentication and Secret Key Generation (GES, SD), pp. 9–14.
- VLDB-2007-LiYHK #authentication #query
- Proof-Infused Streams: Enabling Authentication of Sliding Window Queries On Streams (FL, KY, MH, GK), pp. 147–158.
- VLDB-2007-PapadopoulosYP #authentication #data type #named
- CADS: Continuous Authentication on Data Streams (SP, YY, DP), pp. 135–146.
- HCI-AS-2007-XiaoCR #authentication #collaboration #learning #process
- Support Case-Based Authentic Learning Activities: A Collaborative Case Commenting Tool and a Collaborative Case Builder (LX, JMC, MBR), pp. 371–380.
- OCSC-2007-MaAL #authentication #protocol
- Chameleon-Based Deniable Authenticated Key Agreement Protocol Secure Against Forgery (CM, JA, JL), pp. 124–133.
- DATE-DF-2006-AarajRRJ #architecture #authentication #embedded #performance
- Architectures for efficient face authentication in embedded systems (NA, SR, AR, NKJ), pp. 1–6.
- DRR-2006-WangDLL #authentication #documentation
- A new document authentication method by embedding deformation characters (XW, XD, HL, CL).
- SIGMOD-2006-LiHKR #authentication #database #outsourcing
- Dynamic authenticated index structures for outsourced databases (FL, MH, GK, LR), pp. 121–132.
- EDOC-2006-WangensteenLJD #authentication #enterprise
- Secured enterprise access with strong SIM authentication (AW, LL, IJ, TvD), pp. 463–466.
- ICEIS-ISAS-2006-MartinhoDR #authentication #requirements #workflow
- Supporting Authentication Requirements in Workflows (RM, DD, ARS), pp. 181–188.
- ICPR-v3-2006-AmorAC #3d #authentication #recognition
- New Experiments on ICP-Based 3D Face Recognition and Authentication (BBA, MA, LC), pp. 1195–1199.
- ICPR-v3-2006-FarajB #authentication
- Motion Features from Lip Movement for Person Authentication (MIF, JB), pp. 1059–1062.
- ICPR-v4-2006-Gonzalez-JimenezA #authentication
- Pose Correction and Subject-Specific Features for Face Authentication (DGJ, JLAC), pp. 602–605.
- ICPR-v4-2006-KumarZ #authentication
- Combining Fingerprint, Palmprint and Hand-Shape for User Authentication (AK, DZ), pp. 549–552.
- DAC-2005-GuptaRRJ #authentication #embedded #performance
- Efficient fingerprint-based user authentication for embedded systems (PG, SR, AR, NKJ), pp. 244–247.
- ESOP-2004-BugliesiFM #analysis #authentication #composition #protocol
- Compositional Analysis of Authentication Protocols (MB, RF, MM), pp. 140–154.
- ICEIS-v3-2004-PerkinsC #authentication #case study #collaboration #design #industrial #process #social
- E-Systems Design Through the Study of Authentic Work Practice — Social Activity Theory and the Case of University — Industry Collaboration (JP, SC), pp. 317–324.
- ICPR-v1-2004-Li #authentication
- Handwriting Authentication by Envelopes of Sound Signatures (FFL), pp. 401–404.
- ICPR-v2-2004-SchimkeVD #adaptation #authentication #distance #online #using
- Using Adapted Levenshtein Distance for On-Line Signature Authentication (SS, CV, JD), pp. 931–934.
- ICPR-v4-2004-MesserKSHKCMBSCVMLSCPVBSWYHHHMTMWWXMYFDLGSPR #authentication #database
- Face Authentication Test on the BANCA Database (KM, JK, MS, MH, AK, FC, SM, SB, CS, JC, LV, CM, SL, SS, VC, RPP, EV, LB, LS, YW, YHC, HCL, YPH, AH, MKM, AT, CvdM, RPW, ZW, FX, YM, QY, CF, XD, SL, RG, HS, NP, YR), pp. 523–532.
- POPL-2004-BhargavanFG #authentication #semantics #web #web service
- A semantics for web services authentication (KB, CF, ADG), pp. 198–209.
- SAC-2004-WaldmannSE #authentication
- Protected transmission of biometric user authentication data for oncard-matching (UW, DS, CE), pp. 425–430.
- ICDAR-2003-Fairhurst #authentication #documentation #future of #verification
- Document Identity, Authentication and Ownership: The Future of Biometric Verification (MCF), p. 1108–?.
- ICEIS-v3-2003-DooKK #authentication
- Trusted Authentication Between User and Machine (SD, JK, EK), pp. 577–581.
- ICEIS-v3-2003-SawmaP #authentication #design #e-commerce #effectiveness
- E-Commerce Authentication: An Effective Countermeasures Design Model (VDS, RLP), pp. 447–455.
- ICEIS-v4-2003-Coleman #authentication
- User Authentication for E-Business (JC), pp. 413–417.
- SAC-2003-AtallahL #authentication
- Authentication of LZ-77 Compressed Data (MJA, SL), pp. 282–287.
- SAC-2003-EgidiM #authentication
- Authentication and Access Delegation with User-Released Certificates (LE, MM), pp. 288–293.
- SAC-2003-FrancescoP #authentication #mobile #protocol #reliability
- Authenticity in a Reliable Protocol for Mobile Computing (NDF, MP), pp. 318–324.
- SAC-2003-GassendCDD #authentication
- Delay-Based Circuit Authentication and Applications (BG, DEC, MvD, SD), pp. 294–301.
- SOSP-2003-KaminskySMK #authentication #distributed #file system
- Decentralized user authentication in a global file system (MK, GS, DM, MFK), pp. 60–73.
- WRLA-2002-OgataF #authentication #protocol #verification
- Rewriting-Based Verification of Authentication Protocols (KO, KF), pp. 208–222.
- SAS-2002-Blanchet #authentication #protocol #security
- From Secrecy to Authenticity in Security Protocols (BB), pp. 342–359.
- STOC-2002-LindellLR #authentication #composition #on the
- On the composition of authenticated byzantine agreement (YL, AL, TR), pp. 514–523.
- ICPR-v2-2002-PangKB #authentication
- Membership Authentication in Dynamic Face Groups (SP, DK, SYB), pp. 374–377.
- ICPR-v3-2002-KongZ #analysis #authentication #image
- Palmprint Texture Analysis Based on Low-Resolution Images for Personal Authentication (AWKK, DZ), pp. 807–810.
- SEKE-2002-BlundoC #authentication #named #web
- SAWM: a tool for secure and authenticated web metering (CB, SC), pp. 641–648.
- SAC-2002-BrommeKEK #algorithm #authentication #concept #framework #operating system #testing
- A conceptual framework for testing biometric algorithms within operating systems’ authentication (AB, MK, OE, OK), pp. 273–280.
- SAC-2002-XuS #authentication #multi
- Authenticated multicast immune to denial-of-service attack (SX, RSS), pp. 196–200.
- VLDB-2001-Duranti #authentication
- The Long-Term Preservation of Authentic Electronic Records (LD), pp. 625–628.
- PADL-2001-Cirstea #authentication #protocol #specification #using
- Specifying Authentication Protocols Using Rewriting and Strategies (HC), pp. 138–152.
- ICPR-v2-2000-BollePR #authentication #evaluation
- Evaluation Techniques for Biometrics-Based Authentication Systems (FRR) (RMB, SP, NKR), pp. 2831–2837.
- ICPR-v4-2000-Uchida #authentication #interface #mobile
- Fingerprint-Based User-Friendly Interface and Pocket-PID for Mobile Authentication (KU), pp. 4205–4209.
- POPL-2000-AbadiFG #authentication #compilation
- Authentication Primitives and Their Compilation (MA, CF, GG), pp. 302–315.
- CAV-1999-Schumann #analysis #authentication #automation #named #protocol
- PIL/SETHEO: A Tool for the Automatic Analysis of Authentication Protocols (JS), pp. 500–504.
- STOC-1998-BellareCK #analysis #approach #authentication #composition #design #protocol
- A Modular Approach to the Design and Analysis of Authentication and Key Exchange Protocols (Extended Abstract) (MB, RC, HK), pp. 419–428.
- ICPR-1998-KronerL #authentication #pattern matching #pattern recognition #recognition
- Authentication of free hand drawings by pattern recognition methods (SK, ADL), pp. 462–464.
- SAC-1997-TsaurHC #approach #authentication #data access #distributed #geometry #using
- An authentication-combined access control scheme using a geometric approach in distributed systems (WJT, SJH, CHC), pp. 361–365.
- ICPR-1996-KroepelienVJ #authentication #case study #database #image
- Image databases: a case study in Norwegian silver authentication (BK, AV, AKJ), pp. 370–374.
- ICPR-1996-OGormanR #authentication #encryption #pattern matching #pattern recognition #recognition
- Photo-image authentication by pattern recognition and cryptography (LO, IR), pp. 949–953.
- ICDAR-1993-BrzakovicV #authentication #documentation #random #recognition
- Document recognition/authentication based on medium-embedded random patterns (DB, NV), pp. 95–98.
- SOSP-1993-WobberABL #authentication #operating system
- Authentication in the Taos Operating System (EW, MA, MB, BWL), pp. 256–269.
- SOSP-1991-LampsonABW #authentication #distributed #theory and practice
- Authentication in Distributed Systems: Theory and Practice (BWL, MA, MB, EW), pp. 165–182.
- SOSP-1989-BurrowsAN #authentication #logic
- A Logic of Authentication (MB, MA, RMN), pp. 1–13.
- SOSP-1981-Gifford #authentication #encryption #summary
- Cryptographic Sealing for Information Secrecy and Authentication (Summary) (DKG), pp. 123–124.