Paper
  • You must be logged in to use all features
  • Import a .START file
  • Add this to a Review
  • Tell someone about this
  • Search on Google Scholar
  • Download Bibtex
  • Download APA reference
  • Edit this data
  • Manage associations
  • Merge it with duplicates
  • Exec internal actor
  • Update from DOI
  • Add multiple references

Strengthening user authentication through opportunistic cryptographic identity assertions



2012

Created by ACM worker at 2019-04-15 14:26:45.0.
Simplified Graph of Associations
  • SHOW IT!!! (may be slow...)
  • How to use it
  • Use default pruning algorithm
  • Use alternative pruning algorithm
  • Generate image with complete graph
  • Show Graph Info
  • Download graph data for viewer
  • Get URL to embbed it anywhere
Word Cloud
  • Get URL to embbed it anywhere
  • Search topics on Google Scholar
Research Paradigm
  • Add/Edit Research Paradigms
Authors
  • View detailed list
  • Add an Author
  • Get URL to embbed this list anywhere
5

Alexei Czeskis

Michael Dietz

Tadayoshi Kohno

Dirk Balfanz

Dan Wallach

Venue
  • View detailed list
  • Add a Venue
  • Get URL to embbed this list anywhere
1

Proceedings of the 2012 ACM conference on Computer and communications security - CCS ’12

Referenced By
  • View detailed list
  • Add a Citer
  • Get URL to embbed this list anywhere
1

“It’s not actually that horrible”

Quid
Login / Register
Help

Your opinion



Is it representative of "Strengthening user authentication through opportunistic cryptographic identity assertions"?

Does it provide additional information for your research?

How does this feature contributes to your overall usage of this system?


Please provide any other comment or suggestion:

Your email (optional):

Let other people know about this data


Paper :

Strengthening user authentication through opportunistic cryptographic identity assertions


Send a link to this page to:
Send to yourself
Aditional email(s):
Custom message:

Add to a Bibliographic Set


Strengthening user authentication through opportunistic cryptographic identity assertions


Reviews owned by user

Why help?


If you for we can improve the data describing it. In turn, this can help you and other users to improve bibliographical sets and reviews, based on new data we retrieve after your contribution.

Graph Info


Wait, its calculating

Information


Run Internal Actor


Scientific Paradigms


Select one or more research facets assignable to this publication:
Other:

Add association


First, try and find an existing:
Name
Ajax Status - waiting response