Search Results

There are 23477 results for: content related to: Human Factors and Information Security

  1. Human Factors and Information Security

    Handbook of Human Factors and Ergonomics, Fourth Edition

    Gavriel Salvendy, Pages: 1250–1266, 2012

    Published Online : 26 MAR 2012, DOI: 10.1002/9781118131350.ch45

  2. Robust smart-cards-based user authentication scheme with user anonymity

    Security and Communication Networks

    Volume 5, Issue 2, February 2012, Pages: 236–248, Shuhua Wu, Yuefei Zhu and Qiong Pu

    Version of Record online : 28 APR 2011, DOI: 10.1002/sec.315

  3. Data mining techniques for information security applications

    Wiley Interdisciplinary Reviews: Computational Statistics

    Volume 3, Issue 3, May/June 2011, Pages: 221–229, Amany Al-Shawi

    Version of Record online : 14 MAR 2011, DOI: 10.1002/wics.161

  4. User authentication scheme preserving anonymity for ubiquitous devices

    Security and Communication Networks

    Volume 8, Issue 17, 25 November 2015, Pages: 3131–3141, Benchaa Djellali, Kheira Belarbi, Abdallah Chouarfia and Pascal Lorenz

    Version of Record online : 26 MAR 2015, DOI: 10.1002/sec.1238

  5. A lightweight password-based authentication protocol using smart card

    International Journal of Communication Systems

    Chenyu Wang, Ding Wang, Guoai Xu and Yanhui Guo

    Version of Record online : 31 MAY 2017, DOI: 10.1002/dac.3336

  6. A Proposal of User Authentication Infrastructure for Next-Generation Telematics

    IEEJ Transactions on Electrical and Electronic Engineering

    Volume 5, Issue 4, July 2010, Pages: 439–449, Katsuyuki Umezawa, Seiichi Susaki, Masamori Kashiyama and Satoru Tezuka

    Version of Record online : 18 JUN 2010, DOI: 10.1002/tee.20557

  7. Security analysis and design of an efficient ECC-based two-factor password authentication scheme

    Security and Communication Networks

    Volume 9, Issue 17, 25 November 2016, Pages: 4166–4181, Tanmoy Maitra, Mohammad S. Obaidat, SK Hafizul Islam, Debasis Giri and Ruhul Amin

    Version of Record online : 24 AUG 2016, DOI: 10.1002/sec.1596

  8. Cryptanalysis and improvement of a biometric-based remote user authentication protocol usable in a multiserver environment

    Transactions on Emerging Telecommunications Technologies

    Preeti Chandrakar and Hari Om

    Version of Record online : 25 MAY 2017, DOI: 10.1002/ett.3200

  9. Security flaws in two improved remote user authentication schemes using smart cards

    International Journal of Communication Systems

    Volume 27, Issue 10, October 2014, Pages: 2215–2227, Chun-Guang Ma, Ding Wang and Sen-Dong Zhao

    Version of Record online : 7 NOV 2012, DOI: 10.1002/dac.2468

  10. Infrastructure-Level Solutions

    Distributed Systems Security: Issues, Processes and Solutions

    Abhijit Belapurkar, Anirban Chakrabarti, Harigopal Ponnapalli, Niranjan Varadarajan, Srinivas Padmanabhuni, Srikanth Sundarrajan, Pages: 169–203, 2009

    Published Online : 10 FEB 2009, DOI: 10.1002/9780470751787.ch9

  11. Role-based authentication protocol

    Security and Communication Networks

    Volume 4, Issue 4, April 2011, Pages: 460–470, Hongyan Yao

    Version of Record online : 6 OCT 2010, DOI: 10.1002/sec.180

  12. Robust three-factor remote user authentication scheme with key agreement for multimedia systems

    Security and Communication Networks

    Volume 9, Issue 13, 10 September 2016, Pages: 1916–1927, Xiong Li, Jianwei Niu, Muhammad Khurram Khan, Junguo Liao and Xiaoke Zhao

    Version of Record online : 5 MAR 2014, DOI: 10.1002/sec.961

  13. Dual cooperative RFID-telecare medicine information system authentication protocol for healthcare environments

    Security and Communication Networks

    Volume 9, Issue 18, December 2016, Pages: 4924–4948, Mustapha Benssalah, Mustapha Djeddou and Karim Drouiche

    Version of Record online : 8 NOV 2016, DOI: 10.1002/sec.1665

  14. Design of an efficient and provably secure anonymity preserving three-factor user authentication and key agreement scheme for TMIS

    Security and Communication Networks

    Volume 9, Issue 13, 10 September 2016, Pages: 1983–2001, Mohammad Wazid, Ashok Kumar Das, Saru Kumari, Xiong Li and Fan Wu

    Version of Record online : 11 FEB 2016, DOI: 10.1002/sec.1452

  15. You have free access to this content
    Cryptanalysis and improvement of ‘an improved authentication with key agreement scheme on elliptic curve cryptosystem for global mobility networks’

    International Journal of Network Management

    Volume 25, Issue 1, January/February 2015, Pages: 31–51, Mohammad Sabzinejad Farash

    Version of Record online : 5 DEC 2014, DOI: 10.1002/nem.1883

  16. Privacy preserving smartcard-based authentication system with provable security

    Security and Communication Networks

    Volume 8, Issue 17, 25 November 2015, Pages: 3028–3044, Jin Wook Byun

    Version of Record online : 17 FEB 2015, DOI: 10.1002/sec.1229

  17. Statistical learning methods for information security: fundamentals and case studies

    Applied Stochastic Models in Business and Industry

    Volume 31, Issue 2, March/April 2015, Pages: 97–113, H.-K. Pao, Y.-J. Lee and C.-Y. Huang

    Version of Record online : 6 AUG 2014, DOI: 10.1002/asmb.2052

  18. An enhanced multi-server authentication protocol using password and smart-card: cryptanalysis and design

    Security and Communication Networks

    Volume 9, Issue 17, 25 November 2016, Pages: 4615–4638, Tanmoy Maitra, SK Hafizul Islam, Ruhul Amin, Debasis Giri, Muhammad Khurram Khan and Neeraj Kumar

    Version of Record online : 26 OCT 2016, DOI: 10.1002/sec.1653

  19. A biometrics and smart cards-based authentication scheme for multi-server environments

    Security and Communication Networks

    Volume 8, Issue 17, 25 November 2015, Pages: 3219–3228, Yanrong Lu, Lixiang Li, Haipeng Peng and Yixian Yang

    Version of Record online : 26 MAR 2015, DOI: 10.1002/sec.1246

  20. An improved lightweight multiserver authentication scheme

    International Journal of Communication Systems

    Azeem Irshad, Shehzad Ashraf Chaudhry, Saru Kumari, Muhammad Usman, Khalid Mahmood and Muhammad Shahzad Faisal

    Version of Record online : 4 JUL 2017, DOI: 10.1002/dac.3351