-
1
-
-
0141946906
-
Security on the Internet: Authenticating the user
-
J. Botting, "Security on the Internet: Authenticating the user," Telecommunications, vol.31, no.12, pp.77-80, 1997.
-
(1997)
Telecommunications
, vol.31
, Issue.12
, pp. 77-80
-
-
Botting, J.1
-
2
-
-
0141877786
-
A batch verifying and detecting multiple RSA digital signatures
-
S.W. Changchien, M.-S. Hwang, and K.-F. Hwang, "A batch verifying and detecting multiple RSA digital signatures," International Journal of Computational and Numerical Analysis and Applications, vol.2, no.3, pp.303-307, 2002.
-
(2002)
International Journal of Computational and Numerical Analysis and Applications
, vol.2
, Issue.3
, pp. 303-307
-
-
Changchien, S.W.1
Hwang, M.-S.2
Hwang, K.-F.3
-
3
-
-
0017018484
-
New directions in cryptography
-
Nov.
-
W. Diffie and M.E. Hellman, "New directions in cryptography," IEEE Trans. Inf. Theory, vol.IT-22, no.6, pp.644-654, Nov. 1976.
-
(1976)
IEEE Trans. Inf. Theory
, vol.IT-22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.E.2
-
4
-
-
84874800178
-
A public-key cryptosystem and a signature scheme based on discrete logarithms
-
July
-
T. ElGamal, "A public-key cryptosystem and a signature scheme based on discrete logarithms," IEEE Trans. Inf. Theory, vol.IT-31, no.4, pp.469-472, July 1985.
-
(1985)
IEEE Trans. Inf. Theory
, vol.IT-31
, Issue.4
, pp. 469-472
-
-
Elgamal, T.1
-
5
-
-
0000270009
-
Password authentication without using password table
-
G. Horng, "Password authentication without using password table," Inf. Process. Lett., vol.55, pp.247-250, 1995.
-
(1995)
Inf. Process. Lett.
, vol.55
, pp. 247-250
-
-
Horng, G.1
-
6
-
-
0036556279
-
Improvement on Peyravian-Zunic's password authentication schemes
-
April
-
J.-J. Hwang and T.-C. Yeh, "Improvement on Peyravian-Zunic's password authentication schemes," IEICE Trans. Commun., vol.E85-B, no.4, pp.823-825, April 2002.
-
(2002)
IEICE Trans. Commun.
, vol.E85-B
, Issue.4
, pp. 823-825
-
-
Hwang, J.-J.1
Yeh, T.-C.2
-
7
-
-
0000694693
-
A remote password authentication scheme based on the digital signature method
-
M.-S. Hwang, "A remote password authentication scheme based on the digital signature method," Int. J. Comput. Math., vol.70, pp.657-666, 1999.
-
(1999)
Int. J. Comput. Math.
, vol.70
, pp. 657-666
-
-
Hwang, M.-S.1
-
8
-
-
0036509730
-
An ElGamal-like cryptosystem for enciphering large messages
-
M.-S. Hwang, C.-C. Chang, and K.-F. Hwang, "An ElGamal-like cryptosystem for enciphering large messages," IEEE Trans. Knowledge Data Engineering, vol.14, no.2, pp.445-446, 2002.
-
(2002)
IEEE Trans. Knowledge Data Engineering
, vol.14
, Issue.2
, pp. 445-446
-
-
Hwang, M.-S.1
Chang, C.-C.2
Hwang, K.-F.3
-
9
-
-
0000362936
-
An improvement of SPLICE/AS in WIDE against guessing attack
-
M.-S. Hwang, C.-C. Lee, and Y.-L. Tang, "An improvement of SPLICE/ AS in WIDE against guessing attack," International Journal of Informatica, vol.12, no.2, pp.297-302, 2001.
-
(2001)
International Journal of Informatica
, vol.12
, Issue.2
, pp. 297-302
-
-
Hwang, M.-S.1
Lee, C.-C.2
Tang, Y.-L.3
-
10
-
-
0038564821
-
Cryptanalysis of the batch verifying multiple RSA digital signatures
-
M.-S. Hwang, I.-C. Lin, and K.-F. Hwang, "Cryptanalysis of the batch verifying multiple RSA digital signatures," Informatica, vol.11, no.1, pp.15-19, 2000.
-
(2000)
Informatica
, vol.11
, Issue.1
, pp. 15-19
-
-
Hwang, M.-S.1
Lin, I.-C.2
Hwang, K.-F.3
-
11
-
-
0030261758
-
Strong password only authenticated key exchange
-
Oct.
-
D.P. Jablon, "Strong password only authenticated key exchange, " Computer Communication Review, vol.26, pp.5-26, Oct. 1996.
-
(1996)
Computer Communication Review
, vol.26
, pp. 5-26
-
-
Jablon, D.P.1
-
12
-
-
0041698518
-
A flexible remote user authentication scheme using smart cards
-
C.-C. Lee, M.-S. Hwang, and W.-P. Yang, "A flexible remote user authentication scheme using smart cards," ACM Operating Systems Review, vol.36, no.3, pp.46-52, 2002.
-
(2002)
ACM Operating Systems Review
, vol.36
, Issue.3
, pp. 46-52
-
-
Lee, C.-C.1
Hwang, M.-S.2
Yang, W.-P.3
-
13
-
-
0035506864
-
A remote password authentication scheme for multi-server architecture using neural networks
-
L.-H. Li, I.-C. Lin, and M.-S. Hwang, "A remote password authentication scheme for multi-server architecture using neural networks, " IEEE Trans. Neural Netw., vol.12, no.6, pp.1498-1504, 2001.
-
(2001)
IEEE Trans. Neural Netw.
, vol.12
, Issue.6
, pp. 1498-1504
-
-
Li, L.-H.1
Lin, I.-C.2
Hwang, M.-S.3
-
14
-
-
0033704170
-
Methods for protecting password transmission
-
M. Peyravian and N. Zunic, "Methods for protecting password transmission," Computers & Security, vol.19, no.5, pp.466-469, 2000.
-
(2000)
Computers & Security
, vol.19
, Issue.5
, pp. 466-469
-
-
Peyravian, M.1
Zunic, N.2
-
15
-
-
0017930809
-
A method for obtaining digital signatures and public key cryptosystems
-
Feb.
-
R.L. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public key cryptosystems," Commun. ACM, vol.21, pp.120-126, Feb. 1978.
-
(1978)
Commun. ACM
, vol.21
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
17
-
-
0141518232
-
On the security of methods for protecting password transmission
-
Y.-M. Tseng, J.-K. Jan, and H.-Y. Chien, "On the security of methods for protecting password transmission," International Journal of Informatica, vol.12, no.2, pp.469-476, 2001.
-
(2001)
International Journal of Informatica
, vol.12
, Issue.2
, pp. 469-476
-
-
Tseng, Y.-M.1
Jan, J.-K.2
Chien, H.-Y.3
|