Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

Degree: Master

You searched for subject:(authentication). Showing records 1 – 30 of 33 total matches.

[1] [2]

Search Limiters

Last 2 Years | English Only

▼ Search Limiters


NSYSU

1. Hsin, Tsung-Chin. Design and Implementation of User Authentication Based on Keystroke Dynamic.

Degree: Master, Computer Science and Engineering, 2008, NSYSU

 In the traditional login systems, we use the username and the password to identify the legalities of users. It is a simple and convenient way… (more)

Subjects/Keywords: User Authentication; Biometrics Feature; Keystroke Dynamic

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hsin, T. (2008). Design and Implementation of User Authentication Based on Keystroke Dynamic. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0128108-135223

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Hsin, Tsung-Chin. “Design and Implementation of User Authentication Based on Keystroke Dynamic.” 2008. Thesis, NSYSU. Accessed October 21, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0128108-135223.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Hsin, Tsung-Chin. “Design and Implementation of User Authentication Based on Keystroke Dynamic.” 2008. Web. 21 Oct 2019.

Vancouver:

Hsin T. Design and Implementation of User Authentication Based on Keystroke Dynamic. [Internet] [Thesis]. NSYSU; 2008. [cited 2019 Oct 21]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0128108-135223.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Hsin T. Design and Implementation of User Authentication Based on Keystroke Dynamic. [Thesis]. NSYSU; 2008. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0128108-135223

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

2. Chen, Hsiao-ying. A Comparison of Three Verification Methods for Keystroke Dynamic.

Degree: Master, Computer Science and Engineering, 2009, NSYSU

 In login systems, a user is asked to enter his correct account and password in order to be allowed to enter to the system. The… (more)

Subjects/Keywords: User Authentication; Keystroke Dynamic; Biometrics Feature

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chen, H. (2009). A Comparison of Three Verification Methods for Keystroke Dynamic. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0211109-214139

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chen, Hsiao-ying. “A Comparison of Three Verification Methods for Keystroke Dynamic.” 2009. Thesis, NSYSU. Accessed October 21, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0211109-214139.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chen, Hsiao-ying. “A Comparison of Three Verification Methods for Keystroke Dynamic.” 2009. Web. 21 Oct 2019.

Vancouver:

Chen H. A Comparison of Three Verification Methods for Keystroke Dynamic. [Internet] [Thesis]. NSYSU; 2009. [cited 2019 Oct 21]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0211109-214139.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chen H. A Comparison of Three Verification Methods for Keystroke Dynamic. [Thesis]. NSYSU; 2009. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0211109-214139

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

3. Liao, Shih-Yi. Message Authentication, Anonymousness and Private Communication in VANETs without RSU.

Degree: Master, Electrical Engineering, 2013, NSYSU

 Vehicular ad-hoc networks(VANETs) is a popular topic received attention of academia in recent years. By broadcasting messages among vehicles can pass the information about the… (more)

Subjects/Keywords: Anonymousness; RSP; Message Authentication; Private communication; VANETs

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Liao, S. (2013). Message Authentication, Anonymousness and Private Communication in VANETs without RSU. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0618113-120020

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Liao, Shih-Yi. “Message Authentication, Anonymousness and Private Communication in VANETs without RSU.” 2013. Thesis, NSYSU. Accessed October 21, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0618113-120020.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Liao, Shih-Yi. “Message Authentication, Anonymousness and Private Communication in VANETs without RSU.” 2013. Web. 21 Oct 2019.

Vancouver:

Liao S. Message Authentication, Anonymousness and Private Communication in VANETs without RSU. [Internet] [Thesis]. NSYSU; 2013. [cited 2019 Oct 21]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0618113-120020.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Liao S. Message Authentication, Anonymousness and Private Communication in VANETs without RSU. [Thesis]. NSYSU; 2013. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0618113-120020

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

4. Chen, Wei-Chung. RSP Based Message Authentication, Anonymousness and Private Communication in VANETs.

Degree: Master, Computer Science and Engineering, 2014, NSYSU

 For transmitting messages between vehicles, there are more and more researches about vehicular ad-hoc network (VANETs) which is proposed in recent year. Every vehicle transmits… (more)

Subjects/Keywords: RSP; VANETs; IBC; Message Authentication; Private Communication

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chen, W. (2014). RSP Based Message Authentication, Anonymousness and Private Communication in VANETs. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0616114-134614

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chen, Wei-Chung. “RSP Based Message Authentication, Anonymousness and Private Communication in VANETs.” 2014. Thesis, NSYSU. Accessed October 21, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0616114-134614.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chen, Wei-Chung. “RSP Based Message Authentication, Anonymousness and Private Communication in VANETs.” 2014. Web. 21 Oct 2019.

Vancouver:

Chen W. RSP Based Message Authentication, Anonymousness and Private Communication in VANETs. [Internet] [Thesis]. NSYSU; 2014. [cited 2019 Oct 21]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0616114-134614.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chen W. RSP Based Message Authentication, Anonymousness and Private Communication in VANETs. [Thesis]. NSYSU; 2014. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0616114-134614

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

5. Chen, Yung-Chih. An EAP Method with Biometrics Privacy Preserving in IEEE 802.11 Wireless LANs.

Degree: Master, Computer Science and Engineering, 2009, NSYSU

 It is necessary to authenticate users when they want to access services in WLANs. Extensible Authentication Protocol (EAP) is an authentication framework widely used in… (more)

Subjects/Keywords: Extensible Authentication Protocol (EAP); Lightweight Computation; Wireless Local Area Networks (WLANs); Three-Factor Authentication; Forward Secrecy

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chen, Y. (2009). An EAP Method with Biometrics Privacy Preserving in IEEE 802.11 Wireless LANs. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0815109-160229

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chen, Yung-Chih. “An EAP Method with Biometrics Privacy Preserving in IEEE 802.11 Wireless LANs.” 2009. Thesis, NSYSU. Accessed October 21, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0815109-160229.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chen, Yung-Chih. “An EAP Method with Biometrics Privacy Preserving in IEEE 802.11 Wireless LANs.” 2009. Web. 21 Oct 2019.

Vancouver:

Chen Y. An EAP Method with Biometrics Privacy Preserving in IEEE 802.11 Wireless LANs. [Internet] [Thesis]. NSYSU; 2009. [cited 2019 Oct 21]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0815109-160229.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chen Y. An EAP Method with Biometrics Privacy Preserving in IEEE 802.11 Wireless LANs. [Thesis]. NSYSU; 2009. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0815109-160229

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

6. YANG, QILIANG. Lattice-Based Group Authentication Scheme.

Degree: Master, Computer Science and Engineering, 2017, NSYSU

Authentication has been adopted in many areas. But most of these authentication schemes are built on traditional cryptographic primitives. It is widely believed that such… (more)

Subjects/Keywords: Authentication; Quantum Attacks; Lattice-Based Cryptography; Quantum-Resistant Primitive; Group

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

YANG, Q. (2017). Lattice-Based Group Authentication Scheme. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0721117-184627

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

YANG, QILIANG. “Lattice-Based Group Authentication Scheme.” 2017. Thesis, NSYSU. Accessed October 21, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0721117-184627.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

YANG, QILIANG. “Lattice-Based Group Authentication Scheme.” 2017. Web. 21 Oct 2019.

Vancouver:

YANG Q. Lattice-Based Group Authentication Scheme. [Internet] [Thesis]. NSYSU; 2017. [cited 2019 Oct 21]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0721117-184627.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

YANG Q. Lattice-Based Group Authentication Scheme. [Thesis]. NSYSU; 2017. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0721117-184627

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

7. Fan, Kai-hsun. The Authentication Scheme Based on Chameleon Hashing for Vehicular Ad-Hoc Networks without RSU Device.

Degree: Master, Computer Science and Engineering, 2014, NSYSU

 Studies were conducted on vehicular ad-hoc network (VANET) in recent years. VANET is a network that combines on-board wireless equipment and roadside fixed wireless equipment… (more)

Subjects/Keywords: Message Authentication; VANETs; Elliptic Curve Cryptosystem; Key Agreement; Chameleon Hashing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Fan, K. (2014). The Authentication Scheme Based on Chameleon Hashing for Vehicular Ad-Hoc Networks without RSU Device. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0020114-171247

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Fan, Kai-hsun. “The Authentication Scheme Based on Chameleon Hashing for Vehicular Ad-Hoc Networks without RSU Device.” 2014. Thesis, NSYSU. Accessed October 21, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0020114-171247.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Fan, Kai-hsun. “The Authentication Scheme Based on Chameleon Hashing for Vehicular Ad-Hoc Networks without RSU Device.” 2014. Web. 21 Oct 2019.

Vancouver:

Fan K. The Authentication Scheme Based on Chameleon Hashing for Vehicular Ad-Hoc Networks without RSU Device. [Internet] [Thesis]. NSYSU; 2014. [cited 2019 Oct 21]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0020114-171247.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Fan K. The Authentication Scheme Based on Chameleon Hashing for Vehicular Ad-Hoc Networks without RSU Device. [Thesis]. NSYSU; 2014. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0020114-171247

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

8. Luo, Zhong-Ting. Chameleon Hashing Based Message Authentication, Private Communication and Revocation in Vehicular Ad Hoc Networks.

Degree: Master, Computer Science and Engineering, 2014, NSYSU

 In recent year, Vehicular Ad Hoc Networks has many research to explore, VANET is a mobile communication technology, and the major utilize of the moving… (more)

Subjects/Keywords: Key Agreement; Chameleon Hashing; Revocation; VANETs; Anonymous Authentication

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Luo, Z. (2014). Chameleon Hashing Based Message Authentication, Private Communication and Revocation in Vehicular Ad Hoc Networks. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0615114-150131

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Luo, Zhong-Ting. “Chameleon Hashing Based Message Authentication, Private Communication and Revocation in Vehicular Ad Hoc Networks.” 2014. Thesis, NSYSU. Accessed October 21, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0615114-150131.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Luo, Zhong-Ting. “Chameleon Hashing Based Message Authentication, Private Communication and Revocation in Vehicular Ad Hoc Networks.” 2014. Web. 21 Oct 2019.

Vancouver:

Luo Z. Chameleon Hashing Based Message Authentication, Private Communication and Revocation in Vehicular Ad Hoc Networks. [Internet] [Thesis]. NSYSU; 2014. [cited 2019 Oct 21]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0615114-150131.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Luo Z. Chameleon Hashing Based Message Authentication, Private Communication and Revocation in Vehicular Ad Hoc Networks. [Thesis]. NSYSU; 2014. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0615114-150131

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

9. Cho, Yan-Fu. Authenticated Re-Encryption Scheme for Named Data Network.

Degree: Master, Computer Science and Engineering, 2014, NSYSU

 With the rapid growth of technology and the Internet, the digital communication is increasingly based on the architecture of TCP/IP. However, TCP/IPâs architecture has limitations… (more)

Subjects/Keywords: Authentication; Secure Transfer Protocol; Named Data Network; Proxy Re-Encryption

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Cho, Y. (2014). Authenticated Re-Encryption Scheme for Named Data Network. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0715114-175841

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Cho, Yan-Fu. “Authenticated Re-Encryption Scheme for Named Data Network.” 2014. Thesis, NSYSU. Accessed October 21, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0715114-175841.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Cho, Yan-Fu. “Authenticated Re-Encryption Scheme for Named Data Network.” 2014. Web. 21 Oct 2019.

Vancouver:

Cho Y. Authenticated Re-Encryption Scheme for Named Data Network. [Internet] [Thesis]. NSYSU; 2014. [cited 2019 Oct 21]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0715114-175841.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Cho Y. Authenticated Re-Encryption Scheme for Named Data Network. [Thesis]. NSYSU; 2014. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0715114-175841

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

10. Zhong, Min-Zhe. Fast Handover Authentication for Fifth Generation (5G) Mobile Communications.

Degree: Master, Computer Science and Engineering, 2014, NSYSU

 Due to the rising number of mobile devices and the increasing demand for better quality of service (QoS), issues related to the next generation of… (more)

Subjects/Keywords: handover; authentication; privacy preserving; active revocation; 5G mobile communications

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zhong, M. (2014). Fast Handover Authentication for Fifth Generation (5G) Mobile Communications. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0715114-180628

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Zhong, Min-Zhe. “Fast Handover Authentication for Fifth Generation (5G) Mobile Communications.” 2014. Thesis, NSYSU. Accessed October 21, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0715114-180628.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Zhong, Min-Zhe. “Fast Handover Authentication for Fifth Generation (5G) Mobile Communications.” 2014. Web. 21 Oct 2019.

Vancouver:

Zhong M. Fast Handover Authentication for Fifth Generation (5G) Mobile Communications. [Internet] [Thesis]. NSYSU; 2014. [cited 2019 Oct 21]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0715114-180628.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Zhong M. Fast Handover Authentication for Fifth Generation (5G) Mobile Communications. [Thesis]. NSYSU; 2014. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0715114-180628

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

11. Chen, Liang-Chih. The Authentication Scheme Based on IBC and Chameleon Hashing for Vehicular Ad-Hoc Networks.

Degree: Master, Computer Science and Engineering, 2011, NSYSU

 In the VANET environment, the security of traffic information between vehicles is very important. The messages need to be real-time, and the complexity of authentication(more)

Subjects/Keywords: Chameleon hashing function; VANET; Identity-based Cryptography; Message Authentication

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chen, L. (2011). The Authentication Scheme Based on IBC and Chameleon Hashing for Vehicular Ad-Hoc Networks. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0720111-175911

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chen, Liang-Chih. “The Authentication Scheme Based on IBC and Chameleon Hashing for Vehicular Ad-Hoc Networks.” 2011. Thesis, NSYSU. Accessed October 21, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0720111-175911.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chen, Liang-Chih. “The Authentication Scheme Based on IBC and Chameleon Hashing for Vehicular Ad-Hoc Networks.” 2011. Web. 21 Oct 2019.

Vancouver:

Chen L. The Authentication Scheme Based on IBC and Chameleon Hashing for Vehicular Ad-Hoc Networks. [Internet] [Thesis]. NSYSU; 2011. [cited 2019 Oct 21]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0720111-175911.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chen L. The Authentication Scheme Based on IBC and Chameleon Hashing for Vehicular Ad-Hoc Networks. [Thesis]. NSYSU; 2011. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0720111-175911

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

12. Huang, Shih-wei. Strong Privacy Preserving Communication Protocol for VANETs.

Degree: Master, Computer Science and Engineering, 2011, NSYSU

 Vehicular ad hoc networks (VANETs) are instances of mobile ad hoc networks with the aim to enhance the safety and efficiency of road traffic. The… (more)

Subjects/Keywords: Blind Signature; Vehicular Communication; Privacy Preservation; Authentication; Anonymity

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Huang, S. (2011). Strong Privacy Preserving Communication Protocol for VANETs. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0823111-191024

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Huang, Shih-wei. “Strong Privacy Preserving Communication Protocol for VANETs.” 2011. Thesis, NSYSU. Accessed October 21, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0823111-191024.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Huang, Shih-wei. “Strong Privacy Preserving Communication Protocol for VANETs.” 2011. Web. 21 Oct 2019.

Vancouver:

Huang S. Strong Privacy Preserving Communication Protocol for VANETs. [Internet] [Thesis]. NSYSU; 2011. [cited 2019 Oct 21]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0823111-191024.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Huang S. Strong Privacy Preserving Communication Protocol for VANETs. [Thesis]. NSYSU; 2011. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0823111-191024

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

13. Wang , Jian-Sheng. Flexible Authentication Protocol with Key Reconstruction in WBAN Environment.

Degree: Master, Computer Science and Engineering, 2016, NSYSU

 Wireless body area network (WBAN) plays an important part in mobile healthcare. WBAN can be imagined as a small wireless local area network around our… (more)

Subjects/Keywords: Key reconstruction; Authentication; Wireless body area network; Homomorphic secret sharing; Healthcare

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wang , J. (2016). Flexible Authentication Protocol with Key Reconstruction in WBAN Environment. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0621116-153846

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Wang , Jian-Sheng. “Flexible Authentication Protocol with Key Reconstruction in WBAN Environment.” 2016. Thesis, NSYSU. Accessed October 21, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0621116-153846.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Wang , Jian-Sheng. “Flexible Authentication Protocol with Key Reconstruction in WBAN Environment.” 2016. Web. 21 Oct 2019.

Vancouver:

Wang J. Flexible Authentication Protocol with Key Reconstruction in WBAN Environment. [Internet] [Thesis]. NSYSU; 2016. [cited 2019 Oct 21]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0621116-153846.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Wang J. Flexible Authentication Protocol with Key Reconstruction in WBAN Environment. [Thesis]. NSYSU; 2016. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0621116-153846

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

14. Liu, Jian-You. An Anonymous Authentication and Key Agreement Scheme in VANETs.

Degree: Master, Computer Science and Engineering, 2012, NSYSU

 Vehicular ad-hoc network (VANETs) has been a hot research topic in recent years. In this environment, each vehicle can broadcast messages to other vehicles and… (more)

Subjects/Keywords: VANETs; Anonymous Authentication; ID-based Cryptography; Key Agreement; Chameleon hashing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Liu, J. (2012). An Anonymous Authentication and Key Agreement Scheme in VANETs. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0723112-111418

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Liu, Jian-You. “An Anonymous Authentication and Key Agreement Scheme in VANETs.” 2012. Thesis, NSYSU. Accessed October 21, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0723112-111418.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Liu, Jian-You. “An Anonymous Authentication and Key Agreement Scheme in VANETs.” 2012. Web. 21 Oct 2019.

Vancouver:

Liu J. An Anonymous Authentication and Key Agreement Scheme in VANETs. [Internet] [Thesis]. NSYSU; 2012. [cited 2019 Oct 21]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0723112-111418.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Liu J. An Anonymous Authentication and Key Agreement Scheme in VANETs. [Thesis]. NSYSU; 2012. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0723112-111418

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

15. Tong, Yi-Wen. Efficient Strong Anonymous Authentication Scheme for Wireless Communications.

Degree: Master, Computer Science and Engineering, 2012, NSYSU

 Because of the popularity of wireless communication technologies, people can access servers without the restriction of place and time. With the rapid development of mobile… (more)

Subjects/Keywords: Authentication; Wireless Network; Anonymity; Group Signature; Revocation; Secure Roaming

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tong, Y. (2012). Efficient Strong Anonymous Authentication Scheme for Wireless Communications. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0830112-142803

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Tong, Yi-Wen. “Efficient Strong Anonymous Authentication Scheme for Wireless Communications.” 2012. Thesis, NSYSU. Accessed October 21, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0830112-142803.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Tong, Yi-Wen. “Efficient Strong Anonymous Authentication Scheme for Wireless Communications.” 2012. Web. 21 Oct 2019.

Vancouver:

Tong Y. Efficient Strong Anonymous Authentication Scheme for Wireless Communications. [Internet] [Thesis]. NSYSU; 2012. [cited 2019 Oct 21]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0830112-142803.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Tong Y. Efficient Strong Anonymous Authentication Scheme for Wireless Communications. [Thesis]. NSYSU; 2012. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0830112-142803

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

16. Kuo, Pin-Chun. Chameleon Hash Based Message Authentication for VANETs in Sparse RSU Environment.

Degree: Master, Computer Science and Engineering, 2015, NSYSU

 In recent years, more and more people have invested a lot of effort in Vehicular Ad Hoc Networks (VANETs) to study and discuss. VANETs is… (more)

Subjects/Keywords: Key Agreement; Intra / Inter Pairing; Anonymous Authentication; Chameleon Hashing; VANETs

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kuo, P. (2015). Chameleon Hash Based Message Authentication for VANETs in Sparse RSU Environment. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0718115-093000

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Kuo, Pin-Chun. “Chameleon Hash Based Message Authentication for VANETs in Sparse RSU Environment.” 2015. Thesis, NSYSU. Accessed October 21, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0718115-093000.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Kuo, Pin-Chun. “Chameleon Hash Based Message Authentication for VANETs in Sparse RSU Environment.” 2015. Web. 21 Oct 2019.

Vancouver:

Kuo P. Chameleon Hash Based Message Authentication for VANETs in Sparse RSU Environment. [Internet] [Thesis]. NSYSU; 2015. [cited 2019 Oct 21]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0718115-093000.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Kuo P. Chameleon Hash Based Message Authentication for VANETs in Sparse RSU Environment. [Thesis]. NSYSU; 2015. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0718115-093000

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

17. Chiu, Wan-Ru. Cross-Network-Slice Authentication Scheme for the 5th Generation Mobile Communication System.

Degree: Master, Institute Of Computer Science And Engineering, 2018, NSYSU

 The 5th Generation Mobile Network (or 5th Generation Wireless System, 5G) is an extension of 4G. The major difference between other generations communication networks is… (more)

Subjects/Keywords: Authentication; 5G; Network Slicing; Edge Computing; Low-latency

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chiu, W. (2018). Cross-Network-Slice Authentication Scheme for the 5th Generation Mobile Communication System. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0728118-231935

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chiu, Wan-Ru. “Cross-Network-Slice Authentication Scheme for the 5th Generation Mobile Communication System.” 2018. Thesis, NSYSU. Accessed October 21, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0728118-231935.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chiu, Wan-Ru. “Cross-Network-Slice Authentication Scheme for the 5th Generation Mobile Communication System.” 2018. Web. 21 Oct 2019.

Vancouver:

Chiu W. Cross-Network-Slice Authentication Scheme for the 5th Generation Mobile Communication System. [Internet] [Thesis]. NSYSU; 2018. [cited 2019 Oct 21]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0728118-231935.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chiu W. Cross-Network-Slice Authentication Scheme for the 5th Generation Mobile Communication System. [Thesis]. NSYSU; 2018. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0728118-231935

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

18. Cheng, Yen-hung. One-Round Mutual Authentication Mechanism Based on Symmetric-Key Cryptosystems with Forward Secrecy and Location Privacy for Wireless Networks.

Degree: Master, Computer Science and Engineering, 2009, NSYSU

 In recent years, the development of mobile networks is thriving or flourishing from 2G GSM, 2.5G GPRS, 3G UMTS to All-IP 4G, which integrates all… (more)

Subjects/Keywords: Forward Secrecy; UMTS; False Base Attacks; Mobile Networks; Location Privacy; Mutual Authentication

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Cheng, Y. (2009). One-Round Mutual Authentication Mechanism Based on Symmetric-Key Cryptosystems with Forward Secrecy and Location Privacy for Wireless Networks. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0812109-202320

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Cheng, Yen-hung. “One-Round Mutual Authentication Mechanism Based on Symmetric-Key Cryptosystems with Forward Secrecy and Location Privacy for Wireless Networks.” 2009. Thesis, NSYSU. Accessed October 21, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0812109-202320.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Cheng, Yen-hung. “One-Round Mutual Authentication Mechanism Based on Symmetric-Key Cryptosystems with Forward Secrecy and Location Privacy for Wireless Networks.” 2009. Web. 21 Oct 2019.

Vancouver:

Cheng Y. One-Round Mutual Authentication Mechanism Based on Symmetric-Key Cryptosystems with Forward Secrecy and Location Privacy for Wireless Networks. [Internet] [Thesis]. NSYSU; 2009. [cited 2019 Oct 21]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0812109-202320.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Cheng Y. One-Round Mutual Authentication Mechanism Based on Symmetric-Key Cryptosystems with Forward Secrecy and Location Privacy for Wireless Networks. [Thesis]. NSYSU; 2009. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0812109-202320

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Kaunas University of Technology

19. Matačiūnas, Jonas. Vartotojo prieigos duomenų saugojimo lustinėse kortelėse metodo sukūrimas ir tyrimas.

Degree: Master, Informatics, 2011, Kaunas University of Technology

Darbe nagrinėjama galimybė panaudoti lustinę kortelę saugoti vartotojo prieigos duomenis. Analizuojami raktų apsikeitimo protokolai DH-EKE, SRP. Taip pat nagrinėjama saugaus ryšio technologija TLS. Pasiūlomas konkretus… (more)

Subjects/Keywords: Lustinės kortelės; Autentifikavimas; Raktų apsikeitimo protokolai; Smart card; Authentication; Key agreement protocols

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Matačiūnas, Jonas. (2011). Vartotojo prieigos duomenų saugojimo lustinėse kortelėse metodo sukūrimas ir tyrimas. (Masters Thesis). Kaunas University of Technology. Retrieved from http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2011~D_20110831_111957-86344 ;

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Chicago Manual of Style (16th Edition):

Matačiūnas, Jonas. “Vartotojo prieigos duomenų saugojimo lustinėse kortelėse metodo sukūrimas ir tyrimas.” 2011. Masters Thesis, Kaunas University of Technology. Accessed October 21, 2019. http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2011~D_20110831_111957-86344 ;.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

MLA Handbook (7th Edition):

Matačiūnas, Jonas. “Vartotojo prieigos duomenų saugojimo lustinėse kortelėse metodo sukūrimas ir tyrimas.” 2011. Web. 21 Oct 2019.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Vancouver:

Matačiūnas, Jonas. Vartotojo prieigos duomenų saugojimo lustinėse kortelėse metodo sukūrimas ir tyrimas. [Internet] [Masters thesis]. Kaunas University of Technology; 2011. [cited 2019 Oct 21]. Available from: http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2011~D_20110831_111957-86344 ;.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Council of Science Editors:

Matačiūnas, Jonas. Vartotojo prieigos duomenų saugojimo lustinėse kortelėse metodo sukūrimas ir tyrimas. [Masters Thesis]. Kaunas University of Technology; 2011. Available from: http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2011~D_20110831_111957-86344 ;

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete


NSYSU

20. Cheng, Chen Hsi. Anonymous Authentication and Key Agreement Protocol for LTE Networks.

Degree: Master, Computer Science and Engineering, 2018, NSYSU

 In 2008, 3GPP proposed the Long Term Evolution(LTE) in version 8. The standard is used in high-speed wireless communication standard for mobile terminal in telecommunication.… (more)

Subjects/Keywords: Long Term Evolution; Authentication and Key Agreement Protocol; Signature; Anonymous; Pseudorandom Permutation

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Cheng, C. H. (2018). Anonymous Authentication and Key Agreement Protocol for LTE Networks. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0609118-133912

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Cheng, Chen Hsi. “Anonymous Authentication and Key Agreement Protocol for LTE Networks.” 2018. Thesis, NSYSU. Accessed October 21, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0609118-133912.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Cheng, Chen Hsi. “Anonymous Authentication and Key Agreement Protocol for LTE Networks.” 2018. Web. 21 Oct 2019.

Vancouver:

Cheng CH. Anonymous Authentication and Key Agreement Protocol for LTE Networks. [Internet] [Thesis]. NSYSU; 2018. [cited 2019 Oct 21]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0609118-133912.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Cheng CH. Anonymous Authentication and Key Agreement Protocol for LTE Networks. [Thesis]. NSYSU; 2018. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0609118-133912

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Universidade do Estado do Rio de Janeiro

21. Cassia Isac Gonçalves da Silva. Autenticacão de Assinaturas Online: Estudo dos Parâmetros do Dynamic Time Warping e da Representação da Assinatura.

Degree: Master, 2011, Universidade do Estado do Rio de Janeiro

O reconhecimento de padões é uma área da inteligência computacional que apoia a resolução de problemas utilizando ferramentas computacionais. Dentre esses problemas podem ser citados… (more)

Subjects/Keywords: Curvature; Dynamic Time Warping; CIENCIA DA COMPUTACAO; Signature; Authentication; Curvatura; Dynamic Time Warping; Online; Assinaturas; Autenticacão; Online

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Silva, C. I. G. d. (2011). Autenticacão de Assinaturas Online: Estudo dos Parâmetros do Dynamic Time Warping e da Representação da Assinatura. (Masters Thesis). Universidade do Estado do Rio de Janeiro. Retrieved from http://www.bdtd.uerj.br/tde_busca/arquivo.php?codArquivo=6543 ;

Chicago Manual of Style (16th Edition):

Silva, Cassia Isac Gonçalves da. “Autenticacão de Assinaturas Online: Estudo dos Parâmetros do Dynamic Time Warping e da Representação da Assinatura.” 2011. Masters Thesis, Universidade do Estado do Rio de Janeiro. Accessed October 21, 2019. http://www.bdtd.uerj.br/tde_busca/arquivo.php?codArquivo=6543 ;.

MLA Handbook (7th Edition):

Silva, Cassia Isac Gonçalves da. “Autenticacão de Assinaturas Online: Estudo dos Parâmetros do Dynamic Time Warping e da Representação da Assinatura.” 2011. Web. 21 Oct 2019.

Vancouver:

Silva CIGd. Autenticacão de Assinaturas Online: Estudo dos Parâmetros do Dynamic Time Warping e da Representação da Assinatura. [Internet] [Masters thesis]. Universidade do Estado do Rio de Janeiro; 2011. [cited 2019 Oct 21]. Available from: http://www.bdtd.uerj.br/tde_busca/arquivo.php?codArquivo=6543 ;.

Council of Science Editors:

Silva CIGd. Autenticacão de Assinaturas Online: Estudo dos Parâmetros do Dynamic Time Warping e da Representação da Assinatura. [Masters Thesis]. Universidade do Estado do Rio de Janeiro; 2011. Available from: http://www.bdtd.uerj.br/tde_busca/arquivo.php?codArquivo=6543 ;


Kaunas University of Technology

22. Petreikienė, Vaida. Vaizdų autentiškumo kontrolė.

Degree: Master, Informatics Engineering, 2006, Kaunas University of Technology

 Digital watermarking is the way to solve digital image copyright protection problem. Such a solution is quite new and the need for software, which would… (more)

Subjects/Keywords: Vandens ženklas; Authentication; watermark; Autentiškumas; Digital watermarking

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Petreikienė, Vaida. (2006). Vaizdų autentiškumo kontrolė. (Masters Thesis). Kaunas University of Technology. Retrieved from http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2006~D_20060529_121624-79307 ;

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Chicago Manual of Style (16th Edition):

Petreikienė, Vaida. “Vaizdų autentiškumo kontrolė.” 2006. Masters Thesis, Kaunas University of Technology. Accessed October 21, 2019. http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2006~D_20060529_121624-79307 ;.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

MLA Handbook (7th Edition):

Petreikienė, Vaida. “Vaizdų autentiškumo kontrolė.” 2006. Web. 21 Oct 2019.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Vancouver:

Petreikienė, Vaida. Vaizdų autentiškumo kontrolė. [Internet] [Masters thesis]. Kaunas University of Technology; 2006. [cited 2019 Oct 21]. Available from: http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2006~D_20060529_121624-79307 ;.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Council of Science Editors:

Petreikienė, Vaida. Vaizdų autentiškumo kontrolė. [Masters Thesis]. Kaunas University of Technology; 2006. Available from: http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2006~D_20060529_121624-79307 ;

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete


Kaunas University of Technology

23. Lenza, Mantas. E. parašo taikymas autentifikavimui ir šifravimui video paskaitų sistemoje.

Degree: Master, Informatics, 2010, Kaunas University of Technology

Šiuolaikinės informacijos perdavimo technologijos leidžia organizuoti video paskaitas ir tam yra kuriamos video paskaitų sistemos. Išanalizavus egzistuojančias video paskaitų sistemas buvo iškeltos kelios problemos: •… (more)

Subjects/Keywords: E. parašas; Autentifikavimas e. parašu; Video paskaitų sistemos; Digital signature; Authentication using digital signature; Video lecture system

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lenza, Mantas. (2010). E. parašo taikymas autentifikavimui ir šifravimui video paskaitų sistemoje. (Masters Thesis). Kaunas University of Technology. Retrieved from http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2010~D_20100825_102509-69594 ;

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Chicago Manual of Style (16th Edition):

Lenza, Mantas. “E. parašo taikymas autentifikavimui ir šifravimui video paskaitų sistemoje.” 2010. Masters Thesis, Kaunas University of Technology. Accessed October 21, 2019. http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2010~D_20100825_102509-69594 ;.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

MLA Handbook (7th Edition):

Lenza, Mantas. “E. parašo taikymas autentifikavimui ir šifravimui video paskaitų sistemoje.” 2010. Web. 21 Oct 2019.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Vancouver:

Lenza, Mantas. E. parašo taikymas autentifikavimui ir šifravimui video paskaitų sistemoje. [Internet] [Masters thesis]. Kaunas University of Technology; 2010. [cited 2019 Oct 21]. Available from: http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2010~D_20100825_102509-69594 ;.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Council of Science Editors:

Lenza, Mantas. E. parašo taikymas autentifikavimui ir šifravimui video paskaitų sistemoje. [Masters Thesis]. Kaunas University of Technology; 2010. Available from: http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2010~D_20100825_102509-69594 ;

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete


NSYSU

24. Chan, Yung-Cheng. Robust Remote Authentication Schemes with Smart Cards.

Degree: Master, Computer Science and Engineering, 2005, NSYSU

 Due to low computation cost and convenient portability, smart cards are usually adopted to store the personal secret information of users for remote authentication. Although… (more)

Subjects/Keywords: Information security; Login; Remote authentication; Smart cards; Cryptography

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chan, Y. (2005). Robust Remote Authentication Schemes with Smart Cards. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0714105-165720

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chan, Yung-Cheng. “Robust Remote Authentication Schemes with Smart Cards.” 2005. Thesis, NSYSU. Accessed October 21, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0714105-165720.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chan, Yung-Cheng. “Robust Remote Authentication Schemes with Smart Cards.” 2005. Web. 21 Oct 2019.

Vancouver:

Chan Y. Robust Remote Authentication Schemes with Smart Cards. [Internet] [Thesis]. NSYSU; 2005. [cited 2019 Oct 21]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0714105-165720.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chan Y. Robust Remote Authentication Schemes with Smart Cards. [Thesis]. NSYSU; 2005. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0714105-165720

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

25. Melissa Vieira Fernandes Villar. Modelo de autenticaÃÃo e autorizaÃÃo baseado em certificados de atributos para controle de acesso de aplicaÃÃes em ambiente distribuÃdo utilizando redes de petri coloridas.

Degree: Master, 2007, Universidade Federal do Ceará

Devido Ãs crescentes ameaÃas inerentes aos sistemas de informaÃÃo, o uso de mecanismos de autenticaÃÃo e autorizaÃÃo baseados em identificador de usuÃrio e senha nÃo… (more)

Subjects/Keywords: TELEINFORMATICA; certificado de atributos; IGP; autenticaÃÃo; autorizaÃÃo; privilÃgios; controle de acesso; seguranÃa ; attribute certificate; PMI; authentication; authorization; privileges; access control; security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Villar, M. V. F. (2007). Modelo de autenticaÃÃo e autorizaÃÃo baseado em certificados de atributos para controle de acesso de aplicaÃÃes em ambiente distribuÃdo utilizando redes de petri coloridas. (Masters Thesis). Universidade Federal do Ceará. Retrieved from http://www.teses.ufc.br/tde_busca/arquivo.php?codArquivo=2047 ;

Chicago Manual of Style (16th Edition):

Villar, Melissa Vieira Fernandes. “Modelo de autenticaÃÃo e autorizaÃÃo baseado em certificados de atributos para controle de acesso de aplicaÃÃes em ambiente distribuÃdo utilizando redes de petri coloridas.” 2007. Masters Thesis, Universidade Federal do Ceará. Accessed October 21, 2019. http://www.teses.ufc.br/tde_busca/arquivo.php?codArquivo=2047 ;.

MLA Handbook (7th Edition):

Villar, Melissa Vieira Fernandes. “Modelo de autenticaÃÃo e autorizaÃÃo baseado em certificados de atributos para controle de acesso de aplicaÃÃes em ambiente distribuÃdo utilizando redes de petri coloridas.” 2007. Web. 21 Oct 2019.

Vancouver:

Villar MVF. Modelo de autenticaÃÃo e autorizaÃÃo baseado em certificados de atributos para controle de acesso de aplicaÃÃes em ambiente distribuÃdo utilizando redes de petri coloridas. [Internet] [Masters thesis]. Universidade Federal do Ceará 2007. [cited 2019 Oct 21]. Available from: http://www.teses.ufc.br/tde_busca/arquivo.php?codArquivo=2047 ;.

Council of Science Editors:

Villar MVF. Modelo de autenticaÃÃo e autorizaÃÃo baseado em certificados de atributos para controle de acesso de aplicaÃÃes em ambiente distribuÃdo utilizando redes de petri coloridas. [Masters Thesis]. Universidade Federal do Ceará 2007. Available from: http://www.teses.ufc.br/tde_busca/arquivo.php?codArquivo=2047 ;


Kaunas University of Technology

26. Kulikauskas, Kristijonas. Biometrinės autentifikacijos modelio automobiliams sukūrimas ir tyrimas.

Degree: Master, Informatics, 2011, Kaunas University of Technology

Automobilių apsauga visada buvo, yra ir bus aktuali. Esamos apsaugos priemonės nesunkiai apeinamos ir nesudaro didelių kliūčių, norint transporto priemonę pasisavinti. Reikalinga naujoviška vairuotojo autentifikavimo… (more)

Subjects/Keywords: Biometrija; Autentifikacija; Piršto kraujagyslės; Atvaizdų palyginimas; Automobilių sauga; Biometrics; Authentication; Finger vein; Image comparison; Automobile security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kulikauskas, Kristijonas. (2011). Biometrinės autentifikacijos modelio automobiliams sukūrimas ir tyrimas. (Masters Thesis). Kaunas University of Technology. Retrieved from http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2011~D_20110831_112618-06857 ;

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Chicago Manual of Style (16th Edition):

Kulikauskas, Kristijonas. “Biometrinės autentifikacijos modelio automobiliams sukūrimas ir tyrimas.” 2011. Masters Thesis, Kaunas University of Technology. Accessed October 21, 2019. http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2011~D_20110831_112618-06857 ;.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

MLA Handbook (7th Edition):

Kulikauskas, Kristijonas. “Biometrinės autentifikacijos modelio automobiliams sukūrimas ir tyrimas.” 2011. Web. 21 Oct 2019.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Vancouver:

Kulikauskas, Kristijonas. Biometrinės autentifikacijos modelio automobiliams sukūrimas ir tyrimas. [Internet] [Masters thesis]. Kaunas University of Technology; 2011. [cited 2019 Oct 21]. Available from: http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2011~D_20110831_112618-06857 ;.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Council of Science Editors:

Kulikauskas, Kristijonas. Biometrinės autentifikacijos modelio automobiliams sukūrimas ir tyrimas. [Masters Thesis]. Kaunas University of Technology; 2011. Available from: http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2011~D_20110831_112618-06857 ;

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete


Kaunas University of Technology

27. Petrauskienė, Rasa. Prieigos prie bevielio tinklo resursų valdymas panaudojant vietos informaciją.

Degree: Master, Informatics Engineering, 2011, Kaunas University of Technology

Tobulėjant mobilioms technologijoms vietos informacija tapo svarbi prieigos valdymui. Šiame darbe analizuojamos vietos informacijos derinimo su autentifikacijos ir prieigos valdymo mechanizmais galimybės. Darbe išskirti vietos… (more)

Subjects/Keywords: Prieigos valdymas; Bevielis tinkas; Vietos informacija pagrįsta autentifikacija; Geo-RBAC; Access control; Wireless LAN; Location-based authentication; Geo-RBAC

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Petrauskienė, Rasa. (2011). Prieigos prie bevielio tinklo resursų valdymas panaudojant vietos informaciją. (Masters Thesis). Kaunas University of Technology. Retrieved from http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2011~D_20110901_140213-99282 ;

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Chicago Manual of Style (16th Edition):

Petrauskienė, Rasa. “Prieigos prie bevielio tinklo resursų valdymas panaudojant vietos informaciją.” 2011. Masters Thesis, Kaunas University of Technology. Accessed October 21, 2019. http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2011~D_20110901_140213-99282 ;.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

MLA Handbook (7th Edition):

Petrauskienė, Rasa. “Prieigos prie bevielio tinklo resursų valdymas panaudojant vietos informaciją.” 2011. Web. 21 Oct 2019.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Vancouver:

Petrauskienė, Rasa. Prieigos prie bevielio tinklo resursų valdymas panaudojant vietos informaciją. [Internet] [Masters thesis]. Kaunas University of Technology; 2011. [cited 2019 Oct 21]. Available from: http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2011~D_20110901_140213-99282 ;.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Council of Science Editors:

Petrauskienė, Rasa. Prieigos prie bevielio tinklo resursų valdymas panaudojant vietos informaciją. [Masters Thesis]. Kaunas University of Technology; 2011. Available from: http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2011~D_20110901_140213-99282 ;

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete


NSYSU

28. Chiang, Tsung-Pin. Light-Weight Authentication and Key Exchange Protocols with Forward Secrecy for Digital Home.

Degree: Master, Computer Science and Engineering, 2007, NSYSU

 In this thesis we propose a complete solution of authentication and key exchange for digital home environments such that mobile devices can securely access the… (more)

Subjects/Keywords: security; key exchange; identity authentication; forward secrecy; light-weight computation; digital home

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chiang, T. (2007). Light-Weight Authentication and Key Exchange Protocols with Forward Secrecy for Digital Home. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0815107-153153

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chiang, Tsung-Pin. “Light-Weight Authentication and Key Exchange Protocols with Forward Secrecy for Digital Home.” 2007. Thesis, NSYSU. Accessed October 21, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0815107-153153.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chiang, Tsung-Pin. “Light-Weight Authentication and Key Exchange Protocols with Forward Secrecy for Digital Home.” 2007. Web. 21 Oct 2019.

Vancouver:

Chiang T. Light-Weight Authentication and Key Exchange Protocols with Forward Secrecy for Digital Home. [Internet] [Thesis]. NSYSU; 2007. [cited 2019 Oct 21]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0815107-153153.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chiang T. Light-Weight Authentication and Key Exchange Protocols with Forward Secrecy for Digital Home. [Thesis]. NSYSU; 2007. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0815107-153153

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

29. Hsu, Hsing. Efficient Secure Electronic Mail Protocols with Forward Secrecy.

Degree: Master, Computer Science and Engineering, 2007, NSYSU

 In 1976, Diffie and Hellman proposed the concept of public key cryptosystem (PKC). The application and research of public key cryptography are arisen in the… (more)

Subjects/Keywords: Forward Secrecy; Signcryption; Authentication; Electronic Mail Protocols; Key Agreement; Public Keys

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hsu, H. (2007). Efficient Secure Electronic Mail Protocols with Forward Secrecy. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0907107-170832

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Hsu, Hsing. “Efficient Secure Electronic Mail Protocols with Forward Secrecy.” 2007. Thesis, NSYSU. Accessed October 21, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0907107-170832.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Hsu, Hsing. “Efficient Secure Electronic Mail Protocols with Forward Secrecy.” 2007. Web. 21 Oct 2019.

Vancouver:

Hsu H. Efficient Secure Electronic Mail Protocols with Forward Secrecy. [Internet] [Thesis]. NSYSU; 2007. [cited 2019 Oct 21]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0907107-170832.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Hsu H. Efficient Secure Electronic Mail Protocols with Forward Secrecy. [Thesis]. NSYSU; 2007. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0907107-170832

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

30. Lin, Yi-Hui. Remote Password Authentication Scheme with Smart Cards and Biometrics.

Degree: Master, Computer Science and Engineering, 2006, NSYSU

 More and more researchers combine biometrics with passwords and smart cards to design remote authentication schemes for the purpose of high-degree security. However, in most… (more)

Subjects/Keywords: Smart cards; Biometrics; Three-factor security; Remote authentication; Passwords; GNY logic

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lin, Y. (2006). Remote Password Authentication Scheme with Smart Cards and Biometrics. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0726106-092914

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Lin, Yi-Hui. “Remote Password Authentication Scheme with Smart Cards and Biometrics.” 2006. Thesis, NSYSU. Accessed October 21, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0726106-092914.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Lin, Yi-Hui. “Remote Password Authentication Scheme with Smart Cards and Biometrics.” 2006. Web. 21 Oct 2019.

Vancouver:

Lin Y. Remote Password Authentication Scheme with Smart Cards and Biometrics. [Internet] [Thesis]. NSYSU; 2006. [cited 2019 Oct 21]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0726106-092914.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Lin Y. Remote Password Authentication Scheme with Smart Cards and Biometrics. [Thesis]. NSYSU; 2006. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0726106-092914

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

[1] [2]

.