X
Search Filters
Format Format
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
passwort (8) 8
server (7) 7
austausch (6) 6
baugruppe (3) 3
gewährleistung (3) 3
authentication (2) 2
authentifizierung (2) 2
compiler (2) 2
computer science (2) 2
computer-system (2) 2
password policies (2) 2
password registration (2) 2
passwortauthentifizierung (2) 2
smooth projective hash functions (2) 2
two-server pake (2) 2
zertifikat (2) 2
[info.info-cl]computer science [cs]/computation and language [cs.cl] (1) 1
[info.info-cr]computer science [cs]/cryptography and security [cs.cr] (1) 1
analysis (1) 1
anesthesiology (1) 1
ascii passwords (1) 1
authentication protocols (1) 1
authentifizierungsprotokoll (1) 1
baukastenprinzip (1) 1
beton (1) 1
blindheit (1) 1
blood volume - physiology (1) 1
blood-volume (1) 1
browser (1) 1
browsers (1) 1
channel binding (1) 1
channels (1) 1
coding and information theory (1) 1
communications engineering, networks (1) 1
computation and language (1) 1
computer communication networks (1) 1
computer network protocols (1) 1
computer networks and communications (1) 1
computer science, information systems (1) 1
computer science, software engineering (1) 1
computer science, theory & methods (1) 1
cryptography (1) 1
cryptography and security (1) 1
data encryption (1) 1
datenaustausch (1) 1
datenverschlüsselung (1) 1
digital signatures (1) 1
direktzugriff (1) 1
domain names (1) 1
efficient exponentiation (1) 1
elective surgical procedures - adverse effects (1) 1
elective surgical procedures - methods (1) 1
electric communication technique (1) 1
electricity (1) 1
electronic identities (1) 1
elektronische signatur (1) 1
elektronische unterschrift (1) 1
elektronisches regieren (1) 1
elliptic curve cryptography (1) 1
encryption (1) 1
european citizen card (1) 1
extended access control (1) 1
fasting - adverse effects (1) 1
fasting - physiology (1) 1
formale sprache (1) 1
funktion (1) 1
geheimer schlüssel (1) 1
hierarchy (1) 1
humans (1) 1
hypovolemia - diagnosis (1) 1
hypovolemia - etiology (1) 1
hypovolemia - physiopathology (1) 1
index medicus (1) 1
informatik (1) 1
information systems (1) 1
java platform micro edition (1) 1
key exchange (1) 1
konservierung (1) 1
kryptographie (1) 1
leistungsbewertung (1) 1
management of computing and information systems (1) 1
massivbau (1) 1
mehrnutzerbetrieb (1) 1
mobile devices (1) 1
near field communication (1) 1
network security (1) 1
operating systems (1) 1
password authenticated connection establishment (1) 1
password authentication (1) 1
password hashing (1) 1
passwords (1) 1
pki-dienstleistung (1) 1
preoperative care - adverse effects (1) 1
preoperative care - methods (1) 1
privacy (1) 1
prospective studies (1) 1
protocol (1) 1
prozesstechnik (1) 1
pseudorandomness (1) 1
public-key-infrastruktur (1) 1
more...
Library Location Library Location
Language Language
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2014, Volume 8713, Issue 2, pp. 295 - 312
Conference Proceeding
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2014, Volume 8479, pp. 199 - 216
Conference Proceeding
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2015, Volume 9476, pp. 59 - 74
Conference Proceeding
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2015, Volume 9290, pp. 191 - 208
Conference Proceeding
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2014, Volume 8479, pp. 199 - 216
Conference Proceeding
2016
Password-based authentication is the most popular authentication mechanism for humans today, not only on the internet. Despite increasing efforts to move to... 
Dissertation
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2018, Volume 11322, pp. 1 - 20
Conference Proceeding
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2014, Volume 8341, pp. 31 - 46
Conference Proceeding
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2016, Volume 9866, pp. 95 - 114
Conference Proceeding
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2016, Volume 9866, pp. 147 - 166
Conference Proceeding
AsiaPKC 2016 - Proceedings of the 3rd ACM International Workshop on ASIA Public-Key Cryptography, Co-located with Asia CCS 2016, 05/2016, pp. 39 - 48
Conference Proceeding
Proceedings of the 8th ACM SIGSAC symposium on information, computer and communications security, 05/2013, pp. 107 - 118
We develop a three-level hierarchy of privacy notions for (unforgeable) digital signature schemes. We first prove mutual independence of existing notions of... 
privacy | digital signatures | pseudorandomness | hierarchy
Conference Proceeding
1985, ISBN 9783446140059, v. 1, pt. 1-2; v. 2, pt. 1-2; v. 3, pt. 1-2; v. 4, pt. 1-2; v. 5; v. 6, pt. 1-2; v. 7; v. 8, pt. 1-2; v. 9-10; v. 11, pt. 1.1-1.2, pt. 2; v. 12; v. 13, pt. 1-2; v. 14-17; v. 18, pt. 1-2; 19, v. 20, pt. 1-3; v. 21; in 33
Book
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.