X
Search Filters
Format Format
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
cryptography (106) 106
authentication (79) 79
security (71) 71
computer science, information systems (47) 47
engineering, electrical & electronic (39) 39
digital signature (38) 38
telecommunications (30) 30
mathematics, applied (29) 29
computer science, software engineering (27) 27
computer science, theory & methods (25) 25
data security (25) 25
password (25) 25
privacy (24) 24
access control (23) 23
computer science, artificial intelligence (23) 23
computer science, hardware & architecture (23) 23
computer science (22) 22
cryptosystem (22) 22
smart cards (22) 22
scheme (20) 20
research (17) 17
studies (17) 17
information security (16) 16
smart card (16) 16
cryptanalysis (15) 15
key agreement (14) 14
network security (14) 14
password authentication (14) 14
proxy signature (14) 14
algorithms (13) 13
computation (13) 13
usage (13) 13
mobile communication (12) 12
threshold proxy signature (12) 12
computer security (11) 11
cryptosystems (11) 11
digital signatures (11) 11
information management (11) 11
internet (11) 11
key exchange (11) 11
secret sharing (11) 11
verschlüsselung (11) 11
blind signature (10) 10
methods (10) 10
mobile communication systems (10) 10
public key (10) 10
user authentication (10) 10
analysis (9) 9
automation & control systems (9) 9
cloud computing (9) 9
rsa (9) 9
authentication protocols (8) 8
computer information security (8) 8
computer network protocols (8) 8
improvement (8) 8
messages (8) 8
one-way hash function (8) 8
protocols (8) 8
rfid (8) 8
steganography (8) 8
wireless networks (8) 8
authenticated encryption scheme (7) 7
computer networks (7) 7
data encryption (7) 7
images (7) 7
management (7) 7
passwords (7) 7
protocol (7) 7
servers (7) 7
system (7) 7
threshold scheme (7) 7
communication (6) 6
computer science, interdisciplinary applications (6) 6
design engineering (6) 6
encryption (6) 6
engineering (6) 6
hash function (6) 6
key management (6) 6
protection (6) 6
signatures (6) 6
wireless communication systems (6) 6
authenticated encryption (5) 5
batch verifying (5) 5
data hiding (5) 5
discrete logarithms (5) 5
efficient (5) 5
electronic cash (5) 5
electronics (5) 5
information technology (5) 5
key establishment (5) 5
law (5) 5
management information systems (5) 5
mathematical models (5) 5
medical image (5) 5
message recovery (5) 5
mobile communications (5) 5
national security (5) 5
public key cryptography (5) 5
radio frequency identification (5) 5
safety and security measures (5) 5
more...
Language Language
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


Journal of Network and Computer Applications, ISSN 1084-8045, 2010, Volume 33, Issue 1, pp. 1 - 5
In this paper, we propose an efficient biometric-based remote user authentication scheme using smart cards, in which the computation cost is relatively low... 
Biometrics | Smart cards | User authentication | Cryptography | Security | COMPUTER SCIENCE, SOFTWARE ENGINEERING | COMPUTER SCIENCE, HARDWARE & ARCHITECTURE | COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS | KEY ESTABLISHMENT | IMPROVEMENT | PASSWORD AUTHENTICATION | Integrated circuit cards
Journal Article
The Journal of Systems & Software, ISSN 0164-1212, 2008, Volume 81, Issue 1, pp. 150 - 158
In this paper, we shall propose a new image steganographic technique capable of producing a secret-embedded image that is totally indistinguishable from the... 
Data hiding | Modulus operation | Steganography | Cover image | Stego-image | Imperceptible | COMPUTER SCIENCE, SOFTWARE ENGINEERING | data hiding | SCHEME | AUTHENTICATION | cover image | steganography | SECRET IMAGE | COMPUTER SCIENCE, THEORY & METHODS | stego-image | imperceptible | modulus operation | LSB SUBSTITUTION
Journal Article
Information Sciences, ISSN 0020-0255, 2011, Volume 181, Issue 23, pp. 5333 - 5347
Journal Article
Computer Communications, ISSN 0140-3664, 2008, Volume 31, Issue 12, pp. 2803 - 2814
Privacy and security should be paid much more attention in secure vehicular ad hoc networks (VANETs). However, as far as we know, few researches on secure... 
Mutual authentication | Privacy | Key establishment | Security | Vehicular ad hoc networks | mutual authentication | vehicular ad hoc networks | security | SIGNATURES | COMPUTER SCIENCE, INFORMATION SYSTEMS | privacy | TELECOMMUNICATIONS | key establishment | ENGINEERING, ELECTRICAL & ELECTRONIC
Journal Article
IEEE Transactions on Consumer Electronics, ISSN 0098-3063, 05/2003, Volume 49, Issue 2, pp. 414 - 416
Hwang and Li (see IEEE Trans. Consumer Electron., vol.46, no.1, p.28-30, 2000) proposed a new remote authentication scheme using smart cards. Their scheme is... 
Smart cards | Law | Chaotic communication | Data security | Councils | Delay effects | Authentication | Public key cryptography | Information management | Legal factors | Cryptography | Security | Password | password | security | cryptography | CRYPTANALYSIS | TELECOMMUNICATIONS | authentication | PASSWORD AUTHENTICATION | ENGINEERING, ELECTRICAL & ELECTRONIC | Research | Electronics | Repairing | Maintenance
Journal Article
Information Sciences, ISSN 0020-0255, 2011, Volume 181, Issue 1, pp. 217 - 226
Three-party password authenticated key exchange (3PAKE) protocols allow two users (clients) to establish a session key through an authentication server over an... 
Provably secure | Cryptography | Authentication | Key exchange | Password | TRANSMISSION | IMPROVEMENT | COMPUTER SCIENCE, INFORMATION SYSTEMS | GUESSING ATTACKS | SECURITY ENHANCEMENT | AGREEMENT | Systems and data security software | Analysis | Messages | Keys | Passwords | Mathematical models | Clients | Servers | Channels
Journal Article
Journal of Computer and System Sciences, ISSN 0022-0000, 2006, Volume 72, Issue 4, pp. 727 - 740
Journal Article
The Journal of Systems & Software, ISSN 0164-1212, 03/2013, Volume 86, Issue 3, pp. 716 - 727
► We proposed a histogram shifting method for image reversible data hiding testing on 16-sign-bit depth medical image. ► We proposed six criteria for data... 
Medical image | Reversible data embedding | Histogram | Criteria | Difference expansion | COMPUTER SCIENCE, SOFTWARE ENGINEERING | SCHEME | COMPUTER SCIENCE, THEORY & METHODS | STEGANOGRAPHIC METHOD | Computer science | Algorithms | Universities and colleges | Methods
Journal Article
The Journal of Systems & Software, ISSN 0164-1212, 2011, Volume 84, Issue 12, pp. 2196 - 2207
Journal Article
The Journal of Supercomputing, ISSN 0920-8542, 8/2019, Volume 75, Issue 8, pp. 4601 - 4616
Journal Article
Symmetry, ISSN 2073-8994, 08/2017, Volume 9, Issue 8, p. 134
In this paper, we propose new password authenticated key exchange (PAKE) and protected password change (PPC) protocols without any symmetric or public-key... 
Authenticated key exchange | Provable security | Password authentication | Diffie-Hellman problem | SCHEME | authenticated key exchange | password authentication | provable security | MULTIDISCIPLINARY SCIENCES | Computer systems | Denial of service attacks | Cryptography | Computer security | Authentication | Passwords
Journal Article
Applied Mathematics and Computation, ISSN 0096-3003, 2004, Volume 151, Issue 2, pp. 483 - 490
In the ( t, n) multi-secret sharing scheme, there are n participants in the system. At least t or more participants can easily pool their secrets shadows and... 
Digital signature | Secret sharing | Threshold scheme | Cryptosystem | threshold scheme | MATHEMATICS, APPLIED | ONE-WAY FUNCTION | cryptosystem | digital signature | secret sharing
Journal Article
Information Sciences, ISSN 0020-0255, 04/2013, Volume 227, pp. 102 - 115
In this article, we shall propose a ((t1, n1), (t2, n2)) proxy signature scheme with (t3, n3) shared verification based on the RSA problem. In this scheme, any... 
Digital signature | Proxy signature | Data security | Threshold proxy signature | DIGITAL-SIGNATURES | THRESHOLD-SIGNATURE | KEY EXCHANGE | RSA | SHARED VERIFICATION | COMPUTER SCIENCE, INFORMATION SYSTEMS | MULTI-SIGNATURE | AUTHENTICATED ENCRYPTION | RING SIGNATURE | SECURITY | IMPROVEMENT | Computer science | University and college libraries | Proxy
Journal Article
International Journal of Foundations of Computer Science, ISSN 0129-0541, 02/2019, Volume 30, Issue 2, pp. 255 - 273
The idea of public key encryption with keyword search (PEKS), proposed by Boneh et al., enables one to send a trapdoor containing a encrypted keyword to query... 
designated tester | ElGamal | PEKS | encryption | off-line keyword guessing attack | RANKED SEARCH | CLOUD DATA | CRYPTOSYSTEM | GUESSING ATTACKS | COMPUTER SCIENCE, THEORY & METHODS
Journal Article
The Journal of Systems & Software, ISSN 0164-1212, 2010, Volume 83, Issue 1, pp. 163 - 172
In this paper, we provide a defense mechanism to Kim–Lee–Yoo’s ID-based password authentication scheme, which is vulnerable to impersonation attacks and... 
Client puzzles | Smart card | ID-based scheme | Password authentication | Resources exhaustion attack | COMPUTER SCIENCE, SOFTWARE ENGINEERING | COMPUTER SCIENCE, THEORY & METHODS | REMOTE | CRYPTANALYSIS | EFFICIENT | Computer science | Smart cards | Integrated circuit cards
Journal Article
International Journal of Mobile Communications, ISSN 1470-949X, 2012, Volume 10, Issue 1, pp. 103 - 118
Journal Article
Future Generation Computer Systems, ISSN 0167-739X, 2003, Volume 19, Issue 1, pp. 13 - 22
Remote user authentication is used to validate the legitimacy of a remote login user. Conventional user authentication schemes are suited to solve the privacy... 
User authentication | Cryptography | Security | Remote login | security | user authentication | cryptography | remote login | NETWORKS | COMPUTER SCIENCE, THEORY & METHODS | SMART CARDS | PASSWORD AUTHENTICATION
Journal Article
INTERNATIONAL JOURNAL OF MOBILE COMMUNICATIONS, ISSN 1470-949X, 2017, Volume 15, Issue 3, pp. 266 - 277
A privacy and authentication protocol (PAP) requires a tag to perform four simple operations in mobile communications: Comparing two numbers used to execute a... 
ATTACKS | SCHEME | security | mobile communication | privacy | RFID | COMMUNICATION | authentication
Journal Article
International Journal of Mobile Communications, ISSN 1470-949X, 08/2012, Volume 10, Issue 5, pp. 508 - 520
In the past researches, most of the authentication protocols were designed in an effort to solve the RFID security and privacy problem regarding the encrypted... 
Mobile communication | RFID | Mobile agent | Security | Authentication | security | mobile communication | PRIVACY | mobile agent | TRACKING | FRAMEWORK | COMMUNICATION | authentication | Agents (artificial intelligence) | Privacy | Tracking | Devices | Readers | Radio frequency identification
Journal Article
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.