Publisher
Springer Berlin Heidelberg
Reference12 articles.
1. Abadi M., Burrows M., Kaufman C. and Lampson B., Authentication and delegation with smart-cards, Sci. of Comp. Prog., 21 (2), Oct. 1993, 93–113.
2. Boly J., Bosselaers A., Cramer R., Michelsen R., Mjolsnes S., Muller F., Pedersen T., Pfitzmann B., de Rooij P., Schoenmakers B., Schunter M., Vallee L. and Waidner M., The esprit project cafe — high security digital payment system, in Computer Security — ESORICS 94, Springer-Verlag LNCS Vol. 875, 1994.
3. Gilbert E., MacWilliams F. and Sloane N., Codes which detect deception, Bell Sys. Tech. J., Vol. 53, No. 3, 1974, 405–424.
4. Gobioff H., Smith S., Tygar J. D. and Yee B., Smartcards in hostile environments, in Proc. of The 2nd USENIX Workshop on Elec. Commerce, Nov. 1996, 23–28.
5. Haller N. M., The S/KEY one-time password system, in Internet Soc. Symp. on Network and Dist. Sys. Sec., 1994.
Cited by
79 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Security enhanced random grid visual cryptography scheme using master share and embedding method;International Journal of Information Technology;2023-08-17
2. Quantitative Weighted Visual Cryptographic (k, m, n) Method;Security and Communication Networks;2021-05-27
3. Hardware-Based Authentication Applications;Authentication of Embedded Devices;2021
4. A Dynamic Security Model for Visual Cryptography and Digital Watermarking;Lecture Notes on Data Engineering and Communications Technologies;2019-08-01
5. Introduction;Improving Image Quality in Visual Cryptography;2019-06-09