Akademska digitalna zbirka SLovenije - logo

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources SI consortium. For full access, REGISTER.

1 2 3 4 5
hits: 283
1.
  • 2FLIP: A Two-Factor Lightwe... 2FLIP: A Two-Factor Lightweight Privacy-Preserving Authentication Scheme for VANET
    Wang, Fei; Xu, Yongjun; Zhang, Hanwen ... IEEE transactions on vehicular technology, 2016-Feb., 2016-2-00, 20160201, Volume: 65, Issue: 2
    Journal Article
    Peer reviewed

    Authentication in a vehicular ad-hoc network (VANET) requires not only secure and efficient authentication with privacy preservation but applicable flexibility to handle complicated transportation ...
Full text
Available for: IJS, NUK, UL
2.
  • Two Birds with One Stone: T... Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional Bound
    Wang, Ding; Wang, Ping IEEE transactions on dependable and secure computing, 07/2018, Volume: 15, Issue: 4
    Journal Article

    As the most prevailing two-factor authentication mechanism, smart-card-based password authentication has been a subject of intensive research in the past two decades, and hundreds of this type of ...
Full text
Available for: IJS, NUK, UL
3.
  • MudraChain: Blockchain-base... MudraChain: Blockchain-based framework for automated cheque clearance in financial institutions
    Kabra, Naman; Bhattacharya, Pronaya; Tanwar, Sudeep ... Future generation computer systems, January 2020, 2020-01-00, Volume: 102
    Journal Article
    Peer reviewed

    Currently, the burden on the cheque clearing houses in financial institutions is increasing day-by-day, which necessitates the upgrading of the existing cheque truncation system (CTS). It is a manual ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
4.
  • Quantum2FA: Efficient Quant... Quantum2FA: Efficient Quantum-Resistant Two-Factor Authentication Scheme for Mobile Devices
    Wang, Qingxuan; Wang, Ding; Cheng, Chi ... IEEE transactions on dependable and secure computing, 2023-Jan.-Feb.-1, 2023-1-1, 20230101, Volume: 20, Issue: 1
    Journal Article

    Smart-card based password authentication has been the most widely used two-factor authentication (2FA) mechanism for security-critical applications (e.g., e-Health, smart grid and e-Commerce) in the ...
Full text
Available for: IJS, NUK, UL
5.
  • Anonymous Two-Factor Authen... Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment
    Wang, Ding; He, Debiao; Wang, Ping ... IEEE transactions on dependable and secure computing, 2015-July-Aug.-1, 2015-7-1, 20150701, Volume: 12, Issue: 4
    Journal Article

    Despite two decades of intensive research, it remains a challenge to design a practical anonymous two-factor authentication scheme, for the designers are confronted with an impressive list of ...
Full text
Available for: IJS, NUK, UL
6.
  • A Self‐Oscillated Organic S... A Self‐Oscillated Organic Synapse for In‐Memory Two‐Factor Authentication
    Liu, Shuzhi; Zhong, Xiaolong; Li, Yuxuan ... Advanced science, 06/2024, Volume: 11, Issue: 21
    Journal Article
    Peer reviewed
    Open access

    Entering the era of AI 2.0, bio‐inspired target recognition facilitates life. However, target recognition may suffer from some risks when the target is hijacked. Therefore, it is significantly ...
Full text
Available for: FZAB, GIS, IJS, KILJ, NLZOH, NUK, OILJ, SBCE, SBMB, UL, UM, UPUK
7.
  • Recognition of HIV-1 capsid... Recognition of HIV-1 capsid by PQBP1 licenses an innate immune sensing of nascent HIV-1 DNA
    Yoh, Sunnie M.; Mamede, João I.; Lau, Derrick ... Molecular cell, 08/2022, Volume: 82, Issue: 15
    Journal Article
    Peer reviewed
    Open access

    We have previously described polyglutamine-binding protein 1 (PQBP1) as an adapter required for the cyclic GMP-AMP synthase (cGAS)-mediated innate response to the human immunodeficiency virus 1 ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
8.
  • Biohashing: two factor auth... Biohashing: two factor authentication featuring fingerprint data and tokenised random number
    Jin, Andrew Teoh Beng; Ling, David Ngo Chek; Goh, Alwyn Pattern recognition, November 2004, 2004-11-00, Volume: 37, Issue: 11
    Journal Article
    Peer reviewed

    Human authentication is the security task whose job is to limit access to physical locations or computer network only to those with authorisation. This is done by equipped authorised users with ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UL, UM, UPCLJ, UPUK
9.
  • An efficient two-factor aut... An efficient two-factor authentication scheme based on negative databases: Experiments and extensions
    Liu, Ran; Wang, Xiang; Wang, Can Applied soft computing, April 2022, 2022-04-00, Volume: 119
    Journal Article
    Peer reviewed

    With the rapid development of network communication technology, identity authentication based on smart cards is one of the most common two-factor authentication schemes. In some real-world ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
10.
  • On the anonymity of two-fac... On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions
    Wang, Ding; Wang, Ping Computer networks (Amsterdam, Netherlands : 1999), 11/2014, Volume: 73
    Journal Article
    Peer reviewed

    Display omitted •We demonstrate privacy breaches into two password authentication schemes for WSNs.•Public-key techniques are indispensible to achieve user untraceability.•Our principle is applicable ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UL, UM, UPCLJ, UPUK
1 2 3 4 5
hits: 283

Load filters