default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 35 matches
- 2024
- A. Revathi, N. Sasikaladevi, N. Raju:
Real time implementation of voice based robust person authentication using T-F features and CNN. Multim. Tools Appl. 83(11): 31587-31601 (2024) - 2023
- Moritz Volkmann, Shashank Shekher Tripathi, Sascha Kaven, Carsten Frank, Volker Skwarek:
Privacy in Local Energy Markets: A Framework for a Self-Sovereign Identity based P2P-Trading Authentication System. INDIN 2023: 1-7 - Bijan Borzou, Martin Bouchard, Hilmi R. Dajani:
Machine Learning Based Listener Classification and Authentication Using Frequency Following Responses to English Vowels for Biometric Applications. SAS 2023: 1-6 - 2022
- Ryogo Miyazaki, Kazuya Sasaki, Norimichi Tsumura, Keita Hirai:
Hand authentication from RGB-D video based on deep neural network. 3D Imaging and Applications 2022: 1-5 - 2021
- Fares Yousefi, Hoshang Kolivand, Thar Baker:
SaS-BCI: a new strategy to predict image memorability and use mental imagery as a brain-based biometric authentication. Neural Comput. Appl. 33(9): 4283-4297 (2021) - Manojkumar Vivekanandan, V. N. Sastry, U. Srinivasulu Reddy:
BIDAPSCA5G: Blockchain based Internet of Things (IoT) device to device authentication protocol for smart city applications using 5G technology. Peer-to-Peer Netw. Appl. 14(1): 403-419 (2021) - Manojkumar Vivekanandan, V. N. Sastry, U. Srinivasulu Reddy:
Blockchain based Privacy Preserving User Authentication Protocol for Distributed Mobile Cloud Environment. Peer-to-Peer Netw. Appl. 14(3): 1572-1595 (2021) - Sascha Kaven, Lorenz Bornholdt, Volker Skwarek:
Authentication by RSSI-Position Based Localization in a LoRa LPWAN. CIST 2021: 448-454 - Chalee Vorakulpipat, Sasakorn Pichetjamroen, Chantri Polprasert:
Interacting Face Detection-based Access Control with Various Authentication Factors. ICMLSC 2021: 65-69 - 2020
- Saswati Debnath, Pinki Roy:
User Authentication System Based on Speech and Cascade Hybrid Facial Feature. Int. J. Image Graph. 20(3): 2050022:1-2050022:25 (2020) - Malathi Devarajan, N. Sasikaladevi:
An hyper elliptic curve based efficient signcryption scheme for user authentication. J. Intell. Fuzzy Syst. 39(6): 8487-8498 (2020) - Khalid Haseeb, Ahmad Almogren, Ikram Ud Din, Naveed Islam, Ayman Altameem:
SASC: Secure and Authentication-Based Sensor Cloud Architecture for Intelligent Internet of Things. Sensors 20(9): 2468 (2020) - 2019
- Tanmoy Maitra, Debasis Giri, Ram N. Mohapatra:
SAS-SIP: A secure authentication scheme based on ECC and a fuzzy extractor for session initiation protocol. Cryptologia 43(3): 212-232 (2019) - N. Sasikaladevi, K. Geetha, N. Mahalakshmi, N. Archana:
SNAP-compressive lossless sensitive image authentication and protection scheme based on Genus-2 hyper elliptic curve. Multim. Tools Appl. 78(18): 26163-26179 (2019) - R. Ramya, T. Sasikala:
An efficient Minkowski distance-based matching with Merkle hash tree authentication for biometric recognition in cloud computing. Soft Comput. 23(24): 13423-13431 (2019) - N. Sasikaladevi, D. Malathi:
Energy Efficient Lightweight Mutual Authentication Protocol (REAP) for MBAN Based on Genus-2 Hyper-Elliptic Curve. Wirel. Pers. Commun. 109(4): 2471-2488 (2019) - Manojkumar Vivekanandan, V. N. Sastry, U. Srinivasulu Reddy:
Biometric based User Authentication Protocol for Mobile Cloud Environment. ISBA 2019: 1-6 - Saswati Debnath, Pinki Roy:
Multi-modal authentication system based on audio-visual data. TENCON 2019: 2507-2512 - 2017
- Anup Kumar Maurya, V. N. Sastry:
Fuzzy Extractor and Elliptic Curve Based Efficient User Authentication Protocol for Wireless Sensor Networks and Internet of Things. Inf. 8(4): 136 (2017) - Eric Wang, William Xu, Suhas Sastry, Songsong Liu, Kai Zeng:
Hardware module-based message authentication in intra-vehicle networks. ICCPS 2017: 207-216 - 2015
- Anup Kumar Maurya, V. N. Sastry, Siba Kumar Udgata:
Cryptanalysis and Improvement of ECC - Based Security Enhanced User Authentication Protocol for Wireless Sensor Networks. SSCC 2015: 134-145 - 2014
- Sasan Adibi:
A low overhead scaled equalized harmonic-based voice authentication system. Telematics Informatics 31(1): 137-152 (2014) - 2010
- Yu Sasaki, Lei Wang, Kazuo Ohta, Kazumaro Aoki, Noboru Kunihiro:
Practical Password Recovery Attacks on MD4 Based Prefix and Hybrid Authentication Protocols. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 93-A(1): 84-92 (2010) - Lei Wang, Kazuo Ohta, Yu Sasaki, Kazuo Sakiyama, Noboru Kunihiro:
Cryptanalysis of Two MD5-Based Authentication Protocols: APOP and NMAC. IEICE Trans. Inf. Syst. 93-D(5): 1087-1095 (2010) - Ulrich Rührmair, Stefan Katzenbeisser, Martin Steinebach, Sascha Zmudzinski:
Watermark-Based Authentication and Key Exchange in Teleconferencing Systems. Communications and Multimedia Security 2010: 75-80 - Ileana Buhan, Gabriele Lenzini, Sasa Radomirovic:
Contextual Biometric-Based Authentication for Ubiquitous Services. UIC 2010: 680-693 - 2009
- Sascha Zmudzinski, Martin Steinebach:
Perception-Based Audio Authentication Watermarking in the Time-Frequency Domain. Information Hiding 2009: 146-160 - Sascha Zmudzinski, Martin Steinebach:
Perception-based authentication watermarking for digital audio data. Media Forensics and Security 2009: 725414 - 2008
- Sascha Zmudzinski, Martin Steinebach:
Psycho-acoustic model-based message authentication coding for audio data. MM&Sec 2008: 75-84 - Sven Laur, Sylvain Pasini:
SAS-Based Group Authentication and Key Agreement Protocols. Public Key Cryptography 2008: 197-213
skipping 5 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-09-22 05:38 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint