Authentication using cryptography

被引:0
|
作者
Mitchell, Chris
机构
来源
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:25 / 32
相关论文
共 50 条
  • [1] Collaborative Authentication Using Threshold Cryptography
    Abidin, Aysajan
    Aly, Abdelrahaman
    Mustafa, Mustafa A.
    [J]. EMERGING TECHNOLOGIES FOR AUTHORIZATION AND AUTHENTICATION, ETAA 2019, 2020, 11967 : 122 - 137
  • [2] AIS Authentication Using Certificateless Cryptography
    Rousselot, Axel
    Cuppens, Nora
    Bouakkaz, Samra
    [J]. PROCEEDINGS OF THE 20TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, SECRYPT 2023, 2023, : 49 - 61
  • [3] User Authentication using Visual Cryptography
    Kumar, Praveen P.
    Sabitha, S.
    [J]. 2015 INTERNATIONAL CONFERENCE ON CONTROL COMMUNICATION & COMPUTING INDIA (ICCC), 2015, : 647 - 652
  • [4] A LOSSLESS WATERMARKING USING VISUAL CRYPTOGRAPHY AUTHENTICATION
    Wang, Yuh-Rau
    Lin, Wei-Hung
    Yang, Ling
    [J]. PROCEEDINGS OF 2013 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS (ICMLC), VOLS 1-4, 2013, : 1109 - 1113
  • [5] Group Authentication Using Paillier Threshold Cryptography
    Mehta, Nitish
    Jadhav, Piyush
    Lupane, Pavan
    Honrao, Paresh
    Mahalle, Parikshit
    [J]. 2013 TENTH INTERNATIONAL CONFERENCE ON WIRELESS AND OPTICAL COMMUNICATIONS NETWORKS (WOCN), 2013,
  • [6] Authentication of MAV Communication using Caesar Cipher Cryptography
    Rajatha, B. S.
    Ananda, C. M.
    Nagaraj, S.
    [J]. 2015 INTERNATIONAL CONFERENCE ON SMART TECHNOLOGIES AND MANAGEMENT FOR COMPUTING, COMMUNICATION, CONTROLS, ENERGY AND MATERIALS (ICSTM), 2015, : 58 - 63
  • [7] Distributed authentication in Kerberos using public key cryptography
    Sirbu, MA
    Chuang, JCI
    [J]. 1997 SYMPOSIUM ON NETWORK AND DISTRIBUTED SYSTEM SECURITY, PROCEEDINGS, 1997, : 134 - 141
  • [8] Multi-factor authentication using threshold cryptography
    [J]. 1694, Institute of Electrical and Electronics Engineers Inc., United States
  • [9] Remote Multimodal Biometric Authentication using Visual Cryptography
    Kaur, Harkeerat
    Khanna, Pritee
    [J]. PROCEEDINGS OF 3RD INTERNATIONAL CONFERENCE ON COMPUTER VISION AND IMAGE PROCESSING, CVIP 2018, VOL 2, 2020, 1024 : 13 - 25
  • [10] Authentication communication by using visualization cryptography for UAV networks
    Jawad, Aqeel Thamer
    Maaloul, Rihab
    Chaari, Lamia
    [J]. COMPUTER STANDARDS & INTERFACES, 2025, 92