Results: 958
A Privacy-Preserving Multi-Factor Authenticated Key Exchange Protocol with Provable Security for Cloud Computing.
- Published in:
- Journal of Information Science & Engineering, 2017, v. 33, n. 4, p. 907, doi. 10.6688/JISE.2017.33.4.3
- By:
- Publication type:
- Article
An Efficient Smart Card Based Authentication Scheme Using Image Encryption.
- Published in:
- Journal of Information Science & Engineering, 2013, v. 29, n. 6, p. 1135
- By:
- Publication type:
- Article
Weakness and Improvement of the Smart Card Based Remote User Authentication Scheme with Anonymity.
- Published in:
- Journal of Information Science & Engineering, 2013, v. 29, n. 6, p. 1121
- By:
- Publication type:
- Article
Provably Secure Gateway-Oriented Password-Based Authenticated Key Exchange Protocol Resistant to Password Guessing Attacks.
- Published in:
- Journal of Information Science & Engineering, 2013, v. 29, n. 2, p. 249
- By:
- Publication type:
- Article
Secure Verifier-Based Three-Party Key Exchange in the Random Oracle Model.
- Published in:
- Journal of Information Science & Engineering, 2011, v. 27, n. 4, p. 1487
- By:
- Publication type:
- Article
Security Analysis and Enhancements of Verifier-Based Password-Authenticated Key Exchange Protocols in the Three-Party Setting.
- Published in:
- Journal of Information Science & Engineering, 2011, v. 27, n. 3, p. 1059
- By:
- Publication type:
- Article
Weaknesses and Improvement of Secure Hash-Based Strong-Password Authentication Protocol.
- Published in:
- Journal of Information Science & Engineering, 2010, v. 26, n. 5, p. 1845
- By:
- Publication type:
- Article
Anonymous Password Based Authenticated Key Exchange with Sub-Linear Communication.
- Published in:
- Journal of Information Science & Engineering, 2009, v. 25, n. 3, p. 907
- By:
- Publication type:
- Article
A Secure Hash-Based Strong-Password Authentication Protocol Using One-Time Public-Key Cryptography.
- Published in:
- Journal of Information Science & Engineering, 2008, v. 24, n. 4, p. 1213
- By:
- Publication type:
- Article
Electronic identities – public or private.
- Published in:
- International Review of Law, Computers & Technology, 2013, v. 27, n. 1/2, p. 230, doi. 10.1080/13600869.2013.764142
- By:
- Publication type:
- Article
Informationen.
- Published in:
- Information -- Wissenschaft und Praxis, 2024, v. 75, n. 1, p. 69, doi. 10.1515/iwp-2023-2054
- Publication type:
- Article
How Verizon Media Built a Cybersecurity Culture.
- Published in:
- MIS Quarterly Executive, 2022, v. 21, n. 2, p. 165, doi. 10.17705/2msqe.00064
- By:
- Publication type:
- Article
A password less authentication protocol for multi-server environment using physical unclonable function.
- Published in:
- Journal of Supercomputing, 2023, v. 79, n. 18, p. 21474, doi. 10.1007/s11227-023-05437-3
- By:
- Publication type:
- Article
A new password-authenticated module learning with rounding-based key exchange protocol: Saber.PAKE.
- Published in:
- Journal of Supercomputing, 2023, v. 79, n. 16, p. 17859, doi. 10.1007/s11227-023-05251-x
- By:
- Publication type:
- Article
Detecting and classifying online health misinformation with 'Content Similarity Measure (CSM)' algorithm: an automated fact-checking-based approach.
- Published in:
- Journal of Supercomputing, 2023, v. 79, n. 8, p. 9127, doi. 10.1007/s11227-022-05032-y
- By:
- Publication type:
- Article
An anonymous and authenticated V2I communication with a simplified user revocation and re-registration strategy.
- Published in:
- Journal of Supercomputing, 2023, v. 79, n. 7, p. 8070, doi. 10.1007/s11227-022-04978-3
- By:
- Publication type:
- Article
Authentication and key establishment protocol from supersingular isogeny for mobile environments.
- Published in:
- Journal of Supercomputing, 2022, v. 78, n. 5, p. 6371, doi. 10.1007/s11227-021-04121-8
- By:
- Publication type:
- Article
Delegation of cryptographic servers for capture-resilient devices.
- Published in:
- Distributed Computing, 2003, v. 16, n. 4, p. 307, doi. 10.1007/s00446-003-0098-4
- By:
- Publication type:
- Article
An empirical analysis of keystroke dynamics in passwords: A longitudinal study.
- Published in:
- IET Biometrics (Wiley-Blackwell), 2023, v. 12, n. 1, p. 25, doi. 10.1049/bme2.12087
- By:
- Publication type:
- Article
On IoT applications: a proposed SDP framework for MQTT.
- Published in:
- Electronics Letters (Wiley-Blackwell), 2019, v. 55, n. 22, p. 1201, doi. 10.1049/el.2019.2334
- By:
- Publication type:
- Article
Privacy-Preserving Techniques in Cloud/Fog and Internet of Things.
- Published in:
- Cryptography (2410-387X), 2023, v. 7, n. 4, p. 51, doi. 10.3390/cryptography7040051
- By:
- Publication type:
- Article
Attacking Windows Hello for Business: Is It What We Were Promised?
- Published in:
- Cryptography (2410-387X), 2023, v. 7, n. 1, p. 9, doi. 10.3390/cryptography7010009
- By:
- Publication type:
- Article
A Proposal for Dynamic and Secure Authentication in IoT Architectures Based on SDN.
- Published in:
- Journal of Telecommunications & the Digital Economy, 2022, v. 10, n. 4, p. 72, doi. 10.18080/jtde.v10n4.564
- By:
- Publication type:
- Article
Navigating the Cybersecurity Landscape.
- Published in:
- Journal: American Water Works Association, 2024, v. 116, n. 7, p. 50, doi. 10.1002/awwa.2320
- By:
- Publication type:
- Article
Examining the Authentication of a user using 3D Password.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 2,Part 5, p. 6566
- By:
- Publication type:
- Article
Continuous user Authentication through Keystroke Dynamics.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 2,Part 5, p. 5801
- By:
- Publication type:
- Article
Identification of Phony Profiles on Social Platforms using Random Forest and Decision Tree Algorithms.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 2,Part 4, p. 5714
- By:
- Publication type:
- Article
Enhancement of Security and Performance in Cryptography during Implication of Intrusion Detection System.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 2,Part 4, p. 5470
- By:
- Publication type:
- Article
Implementing a Robust Framework for Access Control and Identity Management.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 2,Part 4, p. 4269
- By:
- Publication type:
- Article
A Review on Nonvocal Password Recognition using Lip analysis Strategy.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 2,Part 4, p. 3990
- By:
- Publication type:
- Article
D- Protect: A Decentralized Personal Information Vault.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 2,Part 4, p. 3073
- By:
- Publication type:
- Article
Detection of Phishing Websites using Machine Learning Algorithm.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 2, Part 2, p. 962
- By:
- Publication type:
- Article
Alerting System using Honeyword.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 1, Part 3, p. 2979
- By:
- Publication type:
- Article
Dictionary List Creation using Web Scrapping and Password Cracking.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 1, Part 3, p. 2973
- By:
- Publication type:
- Article
Electronic Products Marketing Store Application Design.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 1, Part 3, p. 2457
- By:
- Publication type:
- Article
Practical Authentication Mechanism using PassText and OTP.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2018, v. 4, n. 3, p. 132
- By:
- Publication type:
- Article
Security Enhanced and Cost-effective User Authentication Scheme for Wireless Sensor Networks.
- Published in:
- Information Technology & Control, 2018, v. 47, n. 2, p. 275, doi. 10.5755/j01.itc.47.2.16397
- By:
- Publication type:
- Article
A Novel Two-Factor Authentication System Robust Against Shoulder Surfing.
- Published in:
- Journal of Soft Computing & Decision Support Systems, 2017, v. 4, n. 1, p. 19
- By:
- Publication type:
- Article
Security Vulnerabilities of Popular Multifactor Authentication Methods and a Remedy.
- Published in:
- Journal of Network & Information Security, 2023, v. 11, n. 1, p. 20
- By:
- Publication type:
- Article
Digital Crime Reporting System by using PHP.
- Published in:
- Journal of Applied Information Science, 2022, v. 10, n. 1, p. 44
- By:
- Publication type:
- Article
An Information Security Governance Framework.
- Published in:
- Information Systems Management, 2007, v. 24, n. 4, p. 361, doi. 10.1080/10580530701586136
- By:
- Publication type:
- Article
Efficient Image Encryption Using a Chaos-based PWL Memristor.
- Published in:
- IETE Technical Review, 2010, v. 27, n. 4, p. 318, doi. 10.4103/0256-4602.64605
- By:
- Publication type:
- Article
Robust Mutual Authentication with a Key Agreement Scheme for the Session Initiation Protocol.
- Published in:
- IETE Technical Review, 2010, v. 27, n. 3, p. 203, doi. 10.4103/0256-4602.62780
- By:
- Publication type:
- Article
Secure Vehicle-to-roadside Communication Protocol Using Certificate-based Cryptosystem.
- Published in:
- IETE Technical Review, 2010, v. 27, n. 3, p. 214, doi. 10.4103/0256-4602.62783
- By:
- Publication type:
- Article
Novel OTP System Design Using Homomorphic Graph of Fingerprints.
- Published in:
- IETE Technical Review, 2009, v. 26, n. 4, p. 268, doi. 10.4103/0256-4602.52996
- By:
- Publication type:
- Article
CONTROL AND ALERT MECHANISM OF RFID DOOR ACCESS CONTROL SYSTEM USING IOT.
- Published in:
- 3C Tecnologia, 2022, p. 269, doi. 10.17993/3ctecno.2022.specialissue9.269-285
- By:
- Publication type:
- Article
USA: Reasonable expectation of privacy of a Dropbox account.
- Published in:
- Computer Law Review International, 2023, v. 24, n. 1, p. 29, doi. 10.9785/cri-2023-240106
- Publication type:
- Article
USA: Preliminary Injunction on basis of Computer Fraud and Abuse Act.
- Published in:
- Computer Law Review International, 2022, v. 23, n. 3, p. 75, doi. 10.9785/cri-2022-230304
- Publication type:
- Article
AWARENESS OF CYBERCRIME AMONG ONLINE BANKING USERS IN NIGERIA.
- Published in:
- Nigerian Journal of Technology, 2023, v. 42, n. 3, p. 406, doi. 10.4314/njt.v42i3.14
- By:
- Publication type:
- Article
A Study on Multibiometrics derived from Calling Activity Context using Smartphone for Implicit User Authentication System.
- Published in:
- International Journal of Contents, 2013, v. 9, n. 2, p. 14, doi. 10.5392/IJoC.2013.9.2.014
- By:
- Publication type:
- Article