skip to main content
Resultados 1 2 3 4 5 next page
Refinado por: Base de dados/Biblioteca: ACM Digital Library remover Nome da Publicação: Acm Sigops Operating Systems Review remover
Result Number Material Type Add to My Shelf Action Record Details and Options
1
A remote user authentication scheme using hash functions
Material Type:
Artigo
Adicionar ao Meu Espaço

A remote user authentication scheme using hash functions

LEE, Cheng-Chi ; LI, Li-Hua ; HWANG, Min-Shiang

Operating systems review, 2002-10, Vol.36 (4), p.23-28

New York, NY: Association for Computing Machinery

Texto completo disponível

2
Three-party encrypted key exchange : Attacks and A solution
Material Type:
Artigo
Adicionar ao Meu Espaço

Three-party encrypted key exchange : Attacks and A solution

LIN, Chun-Li ; SUN, Hung-Min ; TZONELIH HWANG

Operating systems review, 2000-10, Vol.34 (4), p.12-20

New York, NY: Association for Computing Machinery

Texto completo disponível

3
A flexible remote user authentication scheme using smart cards
Material Type:
Artigo
Adicionar ao Meu Espaço

A flexible remote user authentication scheme using smart cards

LEE, Cheng-Chi ; HWANG, Min-Shiang ; YANG, Wei-Peng

Operating systems review, 2002-07, Vol.36 (3), p.46-52

New York, NY: Association for Computing Machinery

Texto completo disponível

4
Context sensitivity in role-based access control
Material Type:
Artigo
Adicionar ao Meu Espaço

Context sensitivity in role-based access control

KUMAR, Arun ; KARNIK, Neeran ; CHAFLE, Girish

Operating systems review, 2002-07, Vol.36 (3), p.53-66

New York, NY: Association for Computing Machinery

Texto completo disponível

5
Remarks on fingerprint-based remote user authentication scheme using smart cards
Material Type:
Artigo
Adicionar ao Meu Espaço

Remarks on fingerprint-based remote user authentication scheme using smart cards

CHANG, Chin-Chen ; LIN, Juon-Chang

Operating systems review, 2004-10, Vol.38 (4), p.91-96

New York, NY: Association for Computing Machinery

Texto completo disponível

6
Hierarchical key management scheme using polynomial interpolation
Material Type:
Artigo
Adicionar ao Meu Espaço

Hierarchical key management scheme using polynomial interpolation

MANIK LAL DAS ; SAXENA, Ashutosh ; GULATI, Ved P ; PHATAK, Deepak B

Operating systems review, 2005, Vol.39 (1), p.40-47

New York, NY: Association for Computing Machinery

Texto completo disponível

7
ID-based password authentication scheme using smart cards and fingerprints
Material Type:
Artigo
Adicionar ao Meu Espaço

ID-based password authentication scheme using smart cards and fingerprints

KIM, Hyun-Sung ; LEE, Sung-Woon ; YOO, Kee-Young

Operating systems review, 2003-10, Vol.37 (4), p.32-41

New York, NY: Association for Computing Machinery

Texto completo disponível

8
A new multi-stage secret sharing scheme using one-way function
Material Type:
Artigo
Adicionar ao Meu Espaço

A new multi-stage secret sharing scheme using one-way function

CHANG, Ting-Yi ; HWANG, Min-Shiang ; YANG, Wei-Pang

Operating systems review, 2005, Vol.39 (1), p.48-55

New York, NY: Association for Computing Machinery

Texto completo disponível

9
Security enhancement for optimal strong-password authentication protocol
Material Type:
Artigo
Adicionar ao Meu Espaço

Security enhancement for optimal strong-password authentication protocol

LIN, Chih-Wei ; SHEN, Jau-Ji ; HWANG, Min-Shiang

Operating systems review, 2003-04, Vol.37 (2), p.7-12

New York, NY: Association for Computing Machinery

Texto completo disponível

10
An authentication scheme for mobile satellite communication systems
Material Type:
Artigo
Adicionar ao Meu Espaço

An authentication scheme for mobile satellite communication systems

HWANG, Min-Shiang ; YANG, Chao-Chen ; SHIU, Cheng-Yeh

Operating systems review, 2003-10, Vol.37 (4), p.42-47

New York, NY: Association for Computing Machinery

Texto completo disponível

Resultados 1 2 3 4 5 next page

Buscando em bases de dados remotas. Favor aguardar.