Search results

From MaRDI portal
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • RFID LIGHTWEIGHT AUTHENTICATION PROTOCOL 2012-08-30 Paper Quasi-Linear Cryptanalysis of a Secure RFID Ultralightweight Authentication Protocol 2011-07-29...
    10 bytes (20 words) - 03:19, 12 December 2023
  • constructions of perfect authentication codes from projective geometry over finite fields 2016-06-21 Paper Construction of authentication codes with double arbiters...
    10 bytes (17 words) - 03:46, 10 December 2023
  • \(c\)-splitting authentication and secrecy codes 2018-07-03 Paper Some new classes of 2-fold optimal or perfect splitting authentication codes 2017-02-09...
    10 bytes (16 words) - 07:08, 7 October 2023
  • On Privacy-Preserving Biometric Authentication 2017-05-05 Paper On the Leakage of Information in Biometric Authentication 2015-09-10 Paper Direct proof of...
    10 bytes (16 words) - 11:22, 6 October 2023
  • for using hash functions to solve remote user authentication 2008-02-04 Paper A novel deniable authentication protocol using generalized ElGamal signature...
    10 bytes (18 words) - 11:37, 6 October 2023
  • RFID tag mutual authentication protocol 2015-06-17 Paper METAHEURISTIC TRACEABILITY ATTACK AGAINST SLMAP, AN RFID LIGHTWEIGHT AUTHENTICATION PROTOCOL 2012-08-30...
    10 bytes (18 words) - 11:58, 6 October 2023
  • of Cartesian authentication codes over symplectic spaces 1995-07-12 Paper Bounds on the probability of deception in multiple authentication 1995-03-01 Paper...
    10 bytes (16 words) - 15:10, 24 September 2023
  • Part—II: Typical-Authentication 2024-03-14 Paper Keyless Authentication for AWGN Channels 2024-03-14 Paper Short-Range Low-VHF Channel Characterization in...
    10 bytes (18 words) - 00:50, 28 December 2023
  • Part—II: Typical-Authentication 2024-03-14 Paper Keyless Authentication for AWGN Channels 2024-03-14 Paper Inducing Information Stability to Obtain Information...
    10 bytes (16 words) - 21:51, 26 December 2023
  • Publication Date of Publication Type Authentication of Digital Streams 2017-07-12 Paper Bounds and trade-offs for double-base number systems 2013-03-28...
    10 bytes (16 words) - 21:05, 24 September 2023
  • AND APPROXIMATE AUTHENTICATION 2012-08-27 Paper ON "THE POWER OF VERIFICATION QUERIES" IN UNCONDITIONALLY SECURE MESSAGE AUTHENTICATION 2012-06-12 Paper...
    10 bytes (16 words) - 09:43, 6 October 2023
  • electronic signatures 2018-12-07 Paper Chip authentication for e-Passports: PACE with chip authentication mapping v2 2018-10-18 Paper Controlled randomness...
    10 bytes (16 words) - 17:28, 24 September 2023
  • on Wang--Li--Tie's user-friendly remote authentication scheme 2005-11-22 Paper Improved public key authentication scheme for non-repudiation 2005-11-04 Paper...
    10 bytes (17 words) - 12:29, 6 October 2023
  • Non-degrading Erasure-Tolerant Information Authentication with an Application to Multicast Stream Authentication over Lossy Channels 2008-04-17 Paper Some...
    10 bytes (16 words) - 09:48, 25 September 2023
  • sharing scheme 2020-04-01 Paper Authentication codes based on resilient Boolean maps 2016-07-21 Paper Systematic Authentication Codes Based on a Class of Bent...
    10 bytes (20 words) - 06:46, 7 October 2023
  • Paper Multiround unconditionally secure authentication 1999-11-14 Paper Unconditionally secure group authentication 1999-05-05 Paper...
    10 bytes (16 words) - 15:10, 24 September 2023
  • de/entity/Q4436119 2003-11-23 Paper A simple remote user authentication scheme 2003-10-14 Paper A new key authentication scheme based on discrete logarithms 2003-09-09...
    10 bytes (19 words) - 02:33, 25 September 2023
  • Hybrid key encapsulation mechanisms and authenticated key exchange 2020-02-25 Paper Protocols for Authentication and Key Establishment 2019-10-10 Paper...
    10 bytes (16 words) - 12:52, 6 October 2023
  • broadcast encryption and authentication 2023-06-20 Paper Asymptotically tight lower bounds in anonymous broadcast encryption and authentication 2022-06-29 Paper...
    10 bytes (16 words) - 13:54, 24 September 2023
  • Publication Date of Publication Type An efficient anonymous authentication scheme based on double authentication preventing signature for mobile healthcare crowd...
    10 bytes (16 words) - 09:40, 7 October 2023
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)