Amanote Research
Register
Sign In
Discover open access scientific publications
Search, annotate, share and cite publications
Publications by M. Lochter
HMAC-SHA-2 Authentication Protocols in the User-Based Security Model (USM) for SNMPv3
Related publications
Differential Power Analysis of HMAC SHA-2 in the Hamming Weight Model
End User Authentication (EUA) Model and Password for Security
Journal of Organizational and End User Computing
Computer Science Applications
Management
Human-Computer Interaction
Strategy
A Forward Privacy Model for RFID Authentication Protocols
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Cryptanalysis and Security Enhancement of Two Advanced Authentication Protocols
6th International Conference on Research into Design, ICoRD 2017
Decision Sciences
Computer Science
Security Analysis and Improvement of User Authentication Framework for Cloud Computing
Journal of Networks
HMAC-MD5 IP Authentication With Replay Prevention
User Authentication With Provable Security Against Online Dictionary Attacks
Journal of Networks
Hardware Authentication Based on PUFs and SHA-3 2nd Round Candidates
A Dependable Model for Attaining Maximum Authentication Security Procedure in a Grid Based Environment
Trends in Applied Sciences Research