A Framework for the Revocation of Unintended Digital Signatures Initiated by Malicious Terminals
IEEE Transactions on Dependable and Secure Computing
Improving the security of 'a flexible biometrics remote user authentication scheme'
Computer Standards & Interfaces
Keep your enemies close: distance bounding against smartcard relay attacks
SS'07 Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
A Demonstrative Ad Hoc Attestation System
ISC '08 Proceedings of the 11th international conference on Information Security
Towards multilaterally secure computing platforms-with open source and trusted computing
Information Security Tech. Report
A secure authentication scheme for a public terminal before a transaction
NBiS'07 Proceedings of the 1st international conference on Network-based information systems
Assessment of E-Commerce security using AHP and evidential reasoning
Expert Systems with Applications: An International Journal
New multi-server password authentication scheme using neural networks
ICNC'05 Proceedings of the First international conference on Advances in Natural Computation - Volume Part II
Using multiple smart cards for signing messages at malicious terminals
ISC'06 Proceedings of the 9th international conference on Information Security
An improved lu-cao's remote user authentication scheme using smart card
EuroPKI 2006 Proceedings of the Third European conference on Public Key Infrastructure: theory and Practice
An efficient and practical fingerprint-based remote user authentication scheme with smart cards
ISPEC'06 Proceedings of the Second international conference on Information Security Practice and Experience
A snapshot of trusted personal devices applicable to transaction processing
Personal and Ubiquitous Computing
Hi-index | 0.00 |