-
1
-
-
0141946906
-
Security on the Internet: Authenticating the use
-
Botting, J. (1997). Security on the Internet: authenticating the use. Telecommunications, 31(12), 77-80.
-
(1997)
Telecommunications
, vol.31
, Issue.12
, pp. 77-80
-
-
Botting, J.1
-
2
-
-
0141877786
-
A batch verifying and detecting multiple RSA digital signatures
-
Changchien, S.W., M.S. Hwang and K.F. Hwang (2002). A batch verifying and detecting multiple RSA digital signatures. International Journal of Computational and Numerical Analysis and Applications, 2(3), 303-307.
-
(2002)
International Journal of Computational and Numerical Analysis and Applications
, vol.2
, Issue.3
, pp. 303-307
-
-
Changchien, S.W.1
Hwang, M.S.2
Hwang, K.F.3
-
3
-
-
0013017020
-
Rijndael, the advanced encryption standard
-
Daemen, J., and V. Rijmen (2001). Rijndael, the advanced encryption standard. Dr. Dobb's Journal, 26(3), 137-139.
-
(2001)
Dr. Dobb's Journal
, vol.26
, Issue.3
, pp. 137-139
-
-
Daemen, J.1
Rijmen, V.2
-
5
-
-
0002805220
-
Undetected on-line password guessing attacks
-
Ding, Y., and P. Horster (1995). Undetected on-line password guessing attacks. ACM Operating Systems Review, 29(4), 77-86.
-
(1995)
ACM Operating Systems Review
, vol.29
, Issue.4
, pp. 77-86
-
-
Ding, Y.1
Horster, P.2
-
6
-
-
84874800178
-
A public-key cryptosystem and a signature scheme based on discrete logarithms
-
ElGamal, T. (1985). A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, IT-31, 469-472.
-
(1985)
IEEE Transactions on Information Theory
, vol.IT-31
, pp. 469-472
-
-
ElGamal, T.1
-
7
-
-
0000270009
-
Password authentication without using password table
-
Horng, G. (1995). Password authentication without using password table. Information Processing Letters, 55(4), 247-250.
-
(1995)
Information Processing Letters
, vol.55
, Issue.4
, pp. 247-250
-
-
Horng, G.1
-
8
-
-
0036556279
-
Improvement on Peyravian-Zunic's password authentication schemes
-
Hwang, J.J., and T.C. Yeh (2002). Improvement on Peyravian-Zunic's password authentication schemes. IEICE Trans. on Communications, E85-B(4), 823-825.
-
(2002)
IEICE Trans. on Communications
, vol.E85-B
, Issue.4
, pp. 823-825
-
-
Hwang, J.J.1
Yeh, T.C.2
-
9
-
-
0000694693
-
A remote password authentication scheme based on the digital signature method
-
Hwang, M.S. (1999). A remote password authentication scheme based on the digital signature method. International Journal of Computer Mathematics, 70, 657-666.
-
(1999)
International Journal of Computer Mathematics
, vol.70
, pp. 657-666
-
-
Hwang, M.S.1
-
10
-
-
0346438816
-
A new redundancy reducing cipher
-
Hwang, M.S. (2000). A new redundancy reducing cipher. Informatica, 11(4), 435-440.
-
(2000)
Informatica
, vol.11
, Issue.4
, pp. 435-440
-
-
Hwang, M.S.1
-
11
-
-
0036509730
-
An ElGamal-like cryptosystem for enciphering large messages
-
Hwang, M.S., C.C. Chang and K.P. Hwang (2002a). An ElGamal-like cryptosystem for enciphering large messages. IEEE Transactions on Knowledge and Data Engineering, 14(2), 445-446.
-
(2002)
IEEE Transactions on Knowledge and Data Engineering
, vol.14
, Issue.2
, pp. 445-446
-
-
Hwang, M.S.1
Chang, C.C.2
Hwang, K.P.3
-
12
-
-
0742283301
-
A new method to strengthen ciphers
-
Hwang, M.S., S.W. Changchien and C.C. Lee (2002b). A new method to strengthen ciphers. International Journal of Pure and Applied Mathematics, 3(2), 187-192.
-
(2002)
International Journal of Pure and Applied Mathematics
, vol.3
, Issue.2
, pp. 187-192
-
-
Hwang, M.S.1
Changchien, S.W.2
Lee, C.C.3
-
13
-
-
0000362936
-
An improvement of SPLICE/AS in WIDE against guessing attack
-
Hwang, M.S., C.C. Lee and Y.L. Tang (2001). An improvement of SPLICE/AS in WIDE against guessing attack. Informatica, 12(2), 297-302.
-
(2001)
Informatica
, vol.12
, Issue.2
, pp. 297-302
-
-
Hwang, M.S.1
Lee, C.C.2
Tang, Y.L.3
-
14
-
-
0038564821
-
Cryptanalysis of the batch verifying multiple RSA digital signatures
-
Hwang, M.S., I.C. Lin and K.F. Hwang (2000). Cryptanalysis of the batch verifying multiple RSA digital signatures. Informatica, 11(1), 15-18.
-
(2000)
Informatica
, vol.11
, Issue.1
, pp. 15-18
-
-
Hwang, M.S.1
Lin, I.C.2
Hwang, K.F.3
-
15
-
-
0030261758
-
Strong password only authenticated key exchange
-
Jablon, D.P. (1996). Strong password only authenticated key exchange. Computer Communication Review, 26, 5-26.
-
(1996)
Computer Communication Review
, vol.26
, pp. 5-26
-
-
Jablon, D.P.1
-
16
-
-
0041698518
-
A flexible remote user authentication scheme using smart cards
-
Lee, C.C., M.S. Hwang and W.P. Yang (2002). A flexible remote user authentication scheme using smart cards. ACM Operating Systems Review, 36(3), 46-52.
-
(2002)
ACM Operating Systems Review
, vol.36
, Issue.3
, pp. 46-52
-
-
Lee, C.C.1
Hwang, M.S.2
Yang, W.P.3
-
17
-
-
0035506864
-
A remote password authentication scheme for multi-server architecture using neural networks
-
Li, L.H., I.C. Lin and M.S. Hwang (2001). A remote password authentication scheme for multi-server architecture using neural networks. IEEE Transactions on Neural Networks, 12(6), 1498-1504.
-
(2001)
IEEE Transactions on Neural Networks
, vol.12
, Issue.6
, pp. 1498-1504
-
-
Li, L.H.1
Lin, I.C.2
Hwang, M.S.3
-
18
-
-
0033704170
-
Methods for protecting password transmission
-
Peyravian, M., and N. Zunic (2000). Methods for protecting password transmission. Computers and Security, 19(5), 466-469.
-
(2000)
Computers and Security
, vol.19
, Issue.5
, pp. 466-469
-
-
Peyravian, M.1
Zunic, N.2
-
19
-
-
0017930809
-
A method for obtaining digital signatures and public key cryptosystems
-
Rivest, R.L., A. Shainir and L. Adleman (1978). A method for obtaining digital signatures and public key cryptosystems. Communications of the ACM, 21, 120-126.
-
(1978)
Communications of the ACM
, vol.21
, pp. 120-126
-
-
Rivest, R.L.1
Shainir, A.2
Adleman, L.3
-
20
-
-
0024012695
-
The data encryption standard: Past and future
-
Smid, M.E., and D. K. Branstad (1988). The data encryption standard: past and future. Proc. of the IEEE, 76, 550-559.
-
(1988)
Proc. of the IEEE
, vol.76
, pp. 550-559
-
-
Smid, M.E.1
Branstad, D.K.2
-
21
-
-
0141518232
-
On the security of methods for protecting password transmission
-
Tseng, Y.M., J.K. Jan and H.Y. Chien (2001). On the security of methods for protecting password transmission. Informatica, 12(3), 469-477.
-
(2001)
Informatica
, vol.12
, Issue.3
, pp. 469-477
-
-
Tseng, Y.M.1
Jan, J.K.2
Chien, H.Y.3
|