Authentication using cryptography

被引:0
|
作者
Mitchell, Chris
机构
来源
Information Security Technical Report | 1997年 / 2卷 / 02期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:25 / 32
相关论文
共 50 条
  • [1] Collaborative Authentication Using Threshold Cryptography
    Abidin, Aysajan
    Aly, Abdelrahaman
    Mustafa, Mustafa A.
    EMERGING TECHNOLOGIES FOR AUTHORIZATION AND AUTHENTICATION, ETAA 2019, 2020, 11967 : 122 - 137
  • [2] AIS Authentication Using Certificateless Cryptography
    Rousselot, Axel
    Cuppens, Nora
    Bouakkaz, Samra
    PROCEEDINGS OF THE 20TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, SECRYPT 2023, 2023, : 49 - 61
  • [3] User Authentication using Visual Cryptography
    Kumar, Praveen P.
    Sabitha, S.
    2015 INTERNATIONAL CONFERENCE ON CONTROL COMMUNICATION & COMPUTING INDIA (ICCC), 2015, : 647 - 652
  • [4] A LOSSLESS WATERMARKING USING VISUAL CRYPTOGRAPHY AUTHENTICATION
    Wang, Yuh-Rau
    Lin, Wei-Hung
    Yang, Ling
    PROCEEDINGS OF 2013 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS (ICMLC), VOLS 1-4, 2013, : 1109 - 1113
  • [5] Group Authentication Using Paillier Threshold Cryptography
    Mehta, Nitish
    Jadhav, Piyush
    Lupane, Pavan
    Honrao, Paresh
    Mahalle, Parikshit
    2013 TENTH INTERNATIONAL CONFERENCE ON WIRELESS AND OPTICAL COMMUNICATIONS NETWORKS (WOCN), 2013,
  • [6] Authentication of MAV Communication using Caesar Cipher Cryptography
    Rajatha, B. S.
    Ananda, C. M.
    Nagaraj, S.
    2015 INTERNATIONAL CONFERENCE ON SMART TECHNOLOGIES AND MANAGEMENT FOR COMPUTING, COMMUNICATION, CONTROLS, ENERGY AND MATERIALS (ICSTM), 2015, : 58 - 63
  • [7] Remote Multimodal Biometric Authentication using Visual Cryptography
    Kaur, Harkeerat
    Khanna, Pritee
    PROCEEDINGS OF 3RD INTERNATIONAL CONFERENCE ON COMPUTER VISION AND IMAGE PROCESSING, CVIP 2018, VOL 2, 2020, 1024 : 13 - 25
  • [8] Authentication communication by using visualization cryptography for UAV networks
    Jawad, Aqeel Thamer
    Maaloul, Rihab
    Chaari, Lamia
    COMPUTER STANDARDS & INTERFACES, 2025, 92
  • [9] Distributed authentication in Kerberos using public key cryptography
    Sirbu, MA
    Chuang, JCI
    1997 SYMPOSIUM ON NETWORK AND DISTRIBUTED SYSTEM SECURITY, PROCEEDINGS, 1997, : 134 - 141
  • [10] Multi-factor authentication using threshold cryptography
    1694, Institute of Electrical and Electronics Engineers Inc., United States