Home > Research > Browse

Results for Authentication

Publications & Outputs

  1. Resonant-Tunnelling Diodes as PUF Building Blocks

    Bagci, I. E., McGrath, T., Barthelmes, C., Dean, S., Bernardo Gavito, R., Young, R. J. & Roedig, U., 30/04/2021, In: IEEE Transactions on Emerging Topics in Computing. 9, 2, p. 878-885 8 p.

    Research output: Contribution to journalJournal articlepeer-review

  2. Throughput Aware Authentication Prioritisation for Vehicular Communication Networks

    Yuan, H., Bradbury, M., Maple, C. & Gu, C., 7/11/2019, 2019 IEEE 90th Vehicular Technology Conference (VTC2019-Fall). IEEE, p. 1-5 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  3. Simulation of Si nanowire quantum-dot devices for authentication

    Carrillo-Nunez, H., Wang, C., Asenov, A., Young, R. & Georgiev, V., 1/04/2019.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  4. A PUF Taxonomy

    McGrath, T., Bagci, I. E., Wang, Z., Roedig, U. & Young, R. J., 03/2019, In: Applied Physics Reviews. 6, 1, 25 p., 011303.

    Research output: Contribution to journalJournal articlepeer-review

  5. Security analyses of click-based graphical passwords via image point memorability

    Zhu, B. B., Yan, J., Yang, M. & Wei, D., 3/11/2014, CCS '14 Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. New York: ACM, p. 1217-1231 15 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  6. Towards a framework for benchmarking privacy-ABC technologies

    Veseli, F., Vateva-Gurova, T., Krontiris, I., Rannenberg, K. & Suri, N., 2014, IFIP Advances in Information and Communication Technology: 29th IFIP TC 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014. Proceedings. Springer New York LLC, Vol. 428. p. 197-204 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  7. Security implications of password discretization for click-based graphical passwords

    Zhu, B. B., Wei, D., Yang, M. & Yan, J., 05/2013, WWW 2013 - Proceedings of the 22nd International Conference on World Wide Web. New York: ACM, p. 1581-1591 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  8. Back-of-Device authentication on smartphones

    De Luca, A., Von Zezschwitz, E., Nguyen, N. D. H., Maurer, M-E., Rubegni, E., Scipioni, M. P. & Langheinrich, M., 2013, CHI '13 Proceedings of the SIGCHI Conference on Human Factors in Computing Systems Pages 2389-2398. ACM, p. 2389-2398 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  9. Towards a Secure and Seamless Host Mobility for the real world

    Georgopoulos, P., McCarthy, B. & Edwards, C., 2011, Wireless On-Demand Network Systems and Services (WONS), 2011 Eighth International Conference on. IEEE, p. 134-141 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Spontaneous mobile device authentication based on sensor data

    Mayrhofer, R. & Gellersen, H., 08/2008, In: Information Security Technical Report. 13, 3, p. 136-150 15 p.

    Research output: Contribution to journalJournal articlepeer-review