Trusted Platform Module for Smart Cards
Akram, R.N., Markantonakis, K., Mayes, K.. 2014. Trusted Platform Module for Smart Cards. New Technologies, Mobility and Security (NTMS), 2014 6th International Conference on. :1-5.
View ArticleImproved privacy-preserving authentication scheme for roaming service in...
Ding Wang, Ping Wang, Jing Liu. 2014. Improved privacy-preserving authentication scheme for roaming service in mobile networks. Wireless Communications and Networking Conference (WCNC), 2014 IEEE....
View ArticleRemote Login Password Authentication Scheme Based on Cuboid Using Biometric
Kumari, S., Om, H.. 2014. Remote Login Password Authentication Scheme Based on Cuboid Using Biometric. Information Technology (ICIT), 2014 International Conference on. :190-194.
View ArticleCryptanalysis of a Remote User Authentication Protocol Using Smart Cards
Madhusudhan, R., Kumar, S.R.. 2014. Cryptanalysis of a Remote User Authentication Protocol Using Smart Cards. Service Oriented System Engineering (SOSE), 2014 IEEE 8th International Symposium on....
View ArticleTrusted Platform Module for Smart Cards
Akram, R.N., Markantonakis, K., Mayes, K.. 2014. Trusted Platform Module for Smart Cards. New Technologies, Mobility and Security (NTMS), 2014 6th International Conference on. :1-5.
View ArticleImproved privacy-preserving authentication scheme for roaming service in...
Ding Wang, Ping Wang, Jing Liu. 2014. Improved privacy-preserving authentication scheme for roaming service in mobile networks. Wireless Communications and Networking Conference (WCNC), 2014 IEEE....
View ArticleRemote Login Password Authentication Scheme Based on Cuboid Using Biometric
Kumari, S., Om, H.. 2014. Remote Login Password Authentication Scheme Based on Cuboid Using Biometric. Information Technology (ICIT), 2014 International Conference on. :190-194.
View ArticleCryptanalysis of a Remote User Authentication Protocol Using Smart Cards
Madhusudhan, R., Kumar, S.R.. 2014. Cryptanalysis of a Remote User Authentication Protocol Using Smart Cards. Service Oriented System Engineering (SOSE), 2014 IEEE 8th International Symposium on....
View Article"A novel simulation approach for fault injection resistance evaluation on...
L. Rivière, J. Bringer, T. H. Le, H. Chabanne. 2015. "A novel simulation approach for fault injection resistance evaluation on smart cards". 2015 IEEE Eighth International Conference on Software...
View ArticleAn efficient remote mutual authentication scheme using smart mobile phone...
Amin, R., Islam, S. K. H., Biswas, G. P., Khan, M. K.. 2015. An efficient remote mutual authentication scheme using smart mobile phone over insecure networks. 2015 International Conference on Cyber...
View ArticleProviding advanced security mechanism for scalable data sharing in cloud storage
Swathy, V., Sudha, K., Aruna, R., Sangeetha, C., Janani, R.. 2016. Providing advanced security mechanism for scalable data sharing in cloud storage. 2016 International Conference on Inventive...
View ArticleAdvanced biometric home security system using digital signature and DNA...
Mathew, S., Saranya, G.. 2017. Advanced biometric home security system using digital signature and DNA cryptography. 2017 International Conference on Innovations in Green Energy and Healthcare...
View ArticleAchieving Privacy and Security Using QR Code by Means of Encryption Technique...
Malathi, V., Balamurugan, B., Eshwar, S.. 2017. Achieving Privacy and Security Using QR Code by Means of Encryption Technique in ATM. 2017 Second International Conference on Recent Trends and...
View ArticleA multifactor authentication system using secret splitting in the perspective...
Shah, R. H., Salapurkar, D. P.. 2017. A multifactor authentication system using secret splitting in the perspective of Cloud of Things. 2017 International Conference on Emerging Trends Innovation in...
View ArticleAn object-oriented open software architecture for security applications
Farulla, G. A., Pane, A. J., Prinetto, P., Varriale, A.. 2017. An object-oriented open software architecture for security applications. 2017 IEEE East-West Design Test Symposium (EWDTS). :1–6.
View ArticleHardware Based Two-Factor User Authentication for the Internet of Things
Gurabi, M. A., Alfandi, O., Bochem, A., Hogrefe, D.. 2018. Hardware Based Two-Factor User Authentication for the Internet of Things. 2018 14th International Wireless Communications Mobile Computing...
View ArticleA Lightweight Anonymous Mobile User Authentication Scheme for Smart Grid
Yang, B., Xu, G., Zeng, X., Liu, J., Zhang, Y.. 2018. A Lightweight Anonymous Mobile User Authentication Scheme for Smart Grid. 2018 IEEE SmartWorld, Ubiquitous Intelligence Computing, Advanced...
View ArticleEncryption Using Finger-Code Generated from Fingerprints
Ntshangase, C. S., Shabalala, M. B.. 2018. Encryption Using Finger-Code Generated from Fingerprints. 2018 Conference on Information Communications Technology and Society (ICTAS). :1-5.
View ArticlePerformance Analysis of Pairing-Based Elliptic Curve Cryptography on...
Hajny, J., Dzurenda, P., Ricci, S., Malina, L., Vrba, K.. 2018. Performance Analysis of Pairing-Based Elliptic Curve Cryptography on Constrained Devices. 2018 10th International Congress on Ultra...
View ArticleSecure Smart Card Signing with Time-based Digital Signature
Rezaeighaleh, Hossein, Laurens, Roy, Zou, Cliff C.. 2018. Secure Smart Card Signing with Time-based Digital Signature. 2018 International Conference on Computing, Networking and Communications...
View Article
More Pages to Explore .....