暂无分享,去创建一个
Sugata Sanyal | Uday Kumar | Tuhin Borgohain | Amardeep Borgohain | Hong Kong | Monetary Authority | About The Hkma
[1] Sugata Sanyal,et al. An LSB Data Hiding Technique Using Natural Number Decomposition , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).
[2] Alexey Melnikov,et al. Simple Authentication and Security Layer (SASL) , 2006, RFC.
[3] Muhammad Khurram Khan,et al. OTP-Based Two-Factor Authentication Using Mobile Phones , 2011, 2011 Eighth International Conference on Information Technology: New Generations.
[4] Sugata Sanyal,et al. A Novel Multipath Approach to Security in Mobile Ad Hoc Networks (MANETs) , 2011, ArXiv.
[5] Jayesh Kataria. A Scheme to Control Flooding of Fake Route Requests in Ad-hoc Networks , 2006 .
[6] Sagar Acharya,et al. Two Factor Authentication Using Smartphone Generated One Time Password , 2013 .
[7] Neil Haller,et al. The S/KEY One-Time Password System , 1995, RFC.
[8] Michael B. Jones,et al. The OAuth 2.0 Authorization Framework: Bearer Token Usage , 2012, RFC.
[9] Gurpreet Singh Bhamra,et al. Ant colony algorithms in MANETs: A review , 2012, J. Netw. Comput. Appl..
[10] Sugata Sanyal,et al. A Multi-Factor Security Protocol for Wireless Payment - Secure Web Authentication using Mobile Devices , 2011, ArXiv.
[11] Sugata Sanyal,et al. The N/R one time password system , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.
[12] D. Recordon,et al. The OAuth 2.0 Authorization Protocol: Bearer Tokens draft-ietf-oauth-v2-bearer-10 , 2012 .
[13] Hassan M. Elkamchouchi,et al. Mobile one-time passwords: two-factor authentication using mobile phones , 2012, Secur. Commun. Networks.
[14] Dharma P. Agrawal,et al. Jigsaw-based secure data transfer over computer networks , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..
[15] Angelos Stavrou,et al. Universal Multi-Factor Authentication Using Graphical Passwords , 2008, 2008 IEEE International Conference on Signal Image Technology and Internet Based Systems.
[16] Sugata Sanyal,et al. A Multifactor Secure Authentication System for Wireless Payment , 2010, Emergent Web Intelligence.
[17] Klaus Wehrle,et al. Delegation-based authentication and authorization for the IP-based Internet of Things , 2014, 2014 Eleventh Annual IEEE International Conference on Sensing, Communication, and Networking (SECON).
[18] Steven Furnell,et al. Authentication of users on mobile telephones - A survey of attitudes and practices , 2005, Comput. Secur..
[19] Hugo Krawczyk,et al. Public-key cryptography and password protocols , 1999 .
[20] Kyung Sup Kwak,et al. Security and Privacy Issues in Wireless Sensor Networks for Healthcare Applications , 2010, Journal of Medical Systems.
[21] Eran Hammer-Lahav,et al. The OAuth 1.0 Protocol , 2010, RFC.
[22] Hokeun Kim,et al. Authentication and Authorization for the Internet of Things , 2017, IT Professional.
[23] Hannes Tschofenig,et al. A Set of Simple Authentication and Security Layer (SASL) Mechanisms for OAuth , 2015, RFC.
[24] Hugo Krawczyk,et al. Public-key cryptography and password protocols , 1998, CCS '98.
[25] Ivar Jørstad,et al. Using the mobile phone as a security token for unified authentication , 2007, 2007 Second International Conference on Systems and Networks Communications (ICSNC 2007).
[26] Wassim El-Hajj,et al. Two factor authentication using mobile phones , 2009, 2009 IEEE/ACS International Conference on Computer Systems and Applications.
[27] Sugata Sanyal,et al. Ant Colony based Routing for Mobile Ad-Hoc Networks towards Improved Quality of Services , 2013, ArXiv.
[28] Dick Hardt,et al. The OAuth 2.0 Authorization Framework , 2012, RFC.
[29] Prabath Siriwardena,et al. OAuth 2.0 , 2014 .