-
1
-
-
0019634370
-
Password authentication with insecure communication
-
L. Lamport, "Password authentication with insecure communication," Communication of ACM, vol. 24, pp. 77-771, 1981.
-
(1981)
Communication of ACM
, vol.24
, pp. 77-771
-
-
Lamport, L.1
-
2
-
-
0019579253
-
Cryptographic authentication of time-invariant quanities
-
R. E. Lennon, S. M. Matyas, and C. H. Mayer, "Cryptographic authentication of time-invariant quanities," IEEE Trans. Commun., COM-29, no. 6, pp. 773-777, 1981.
-
(1981)
IEEE Trans. Commun.
, vol.COM-29
, Issue.6
, pp. 773-777
-
-
Lennon, R.E.1
Matyas, S.M.2
Mayer, C.H.3
-
3
-
-
0024715186
-
Limitations of challenge-response entity authentication
-
Aug.
-
C. Mitchell, "Limitations of challenge-response entity authentication," Electronics Letters, vol. 25, no. 17, pp. 1195-1196, Aug. 1989.
-
(1989)
Electronics Letters
, vol.25
, Issue.17
, pp. 1195-1196
-
-
Mitchell, C.1
-
4
-
-
0000873739
-
Reparable key distribution protocols for internet environments
-
May
-
T. Hwang and W. C. Ku, "Reparable key distribution protocols for internet environments," IEEE Trans. Commun., vol. 43, no. 5, pp. 1947-1950, May 1995.
-
(1995)
IEEE Trans. Commun.
, vol.43
, Issue.5
, pp. 1947-1950
-
-
Hwang, T.1
Ku, W.C.2
-
5
-
-
0013456359
-
Comments on the S/KEY user authentication scheme
-
Oct.
-
C. J. Mitchell and L. Chen, "Comments on the S/KEY user authentication scheme," ACM Operating System Review, vol. 30, no. 4, pp. 12-16, Oct. 1996.
-
(1996)
ACM Operating System Review
, vol.30
, Issue.4
, pp. 12-16
-
-
Mitchell, C.J.1
Chen, L.2
-
6
-
-
0003256983
-
Shared authentication token secure against replay and weak key attack
-
S. M. Yen, and K. H. Liao, "Shared authentication token secure against replay and weak key attack," Information Processing Letters, pp. 78-80, 1997.
-
(1997)
Information Processing Letters
, pp. 78-80
-
-
Yen, S.M.1
Liao, K.H.2
-
7
-
-
84939573910
-
Differential power analysis
-
P. Kocher, J. Jaffe, and B. Jun, "Differential power analysis," Proc. Advances in Cryptology (CRYPTO'99), pp. 388-397, 1999.
-
(1999)
Proc. Advances in Cryptology (CRYPTO'99)
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
8
-
-
0034140374
-
A new remote user authentication scheme using smart card
-
Feb.
-
M. S. Hwang and L. H. Li, "A new remote user authentication scheme using smart card," IEEE Trans. on Consumer Electron., vol. 46, no. 1, pp. 28-30, Feb. 2000.
-
(2000)
IEEE Trans. on Consumer Electron.
, vol.46
, Issue.1
, pp. 28-30
-
-
Hwang, M.S.1
Li, L.H.2
-
9
-
-
0034317895
-
Cryptanalysis of a remote user authentication scheme using smart cards
-
Nov.
-
C. K. Chan and L. M. Cheng, "Cryptanalysis of a remote user authentication scheme using smart cards," IEEE Trans. on Consumer Electron., vol. 46, no. 4, pp. 992-993, Nov. 2000.
-
(2000)
IEEE Trans. on Consumer Electron.
, vol.46
, Issue.4
, pp. 992-993
-
-
Chan, C.K.1
Cheng, L.M.2
-
10
-
-
0034318245
-
An efficient remote user authentication scheme using smart cards
-
Nov.
-
H. M. Sun, "An efficient remote user authentication scheme using smart cards," IEEE Trans. on Consumer Electron., vol. 46, no. 4, pp. 958-961, Nov. 2000.
-
(2000)
IEEE Trans. on Consumer Electron.
, vol.46
, Issue.4
, pp. 958-961
-
-
Sun, H.M.1
-
12
-
-
0036302680
-
An efficient and practical solution to remote authentication: Smart card
-
H. Y. Chien, J. K. Jan and Y. M. Tseng, "An efficient and practical solution to remote authentication: smart card," Computers & Security, vol. 21, no. 4, pp. 372-375, 2002.
-
(2002)
Computers & Security
, vol.21
, Issue.4
, pp. 372-375
-
-
Chien, H.Y.1
Jan, J.K.2
Tseng, Y.M.3
-
13
-
-
0036566408
-
Examining smart-card security under the threat of power analysis attacks
-
May
-
T. S. Messerges, E. A. Dabbish, and R. H. Sloan, "Examining smart-card security under the threat of power analysis attacks," IEEE Trans. on Computers, vol. 51, no. 5, pp. 541-552, May 2002.
-
(2002)
IEEE Trans. on Computers
, vol.51
, Issue.5
, pp. 541-552
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
-
14
-
-
0142007776
-
Cryptanalysis of a variant of Peyravian-Zunic's password authentication scheme
-
May
-
W. C. Ku, C. M. Chen, and H. L. Lee, "Cryptanalysis of a variant of Peyravian-Zunic's password authentication scheme," IEICE Trans. Commun., vol. E86-B, no. 5, pp. 1682-1684, May 2003.
-
(2003)
IEICE Trans. Commun.
, vol.E86-B
, Issue.5
, pp. 1682-1684
-
-
Ku, W.C.1
Chen, C.M.2
Lee, H.L.3
-
15
-
-
0042196051
-
A modified remote user authentication scheme using smart cards
-
May
-
J. J. Shen, C. W. Lin, M. S. Hwang, "A modified remote user authentication scheme using smart cards", IEEE Trans. on Consumer Electron., vol. 49, no. 2, pp. 414-416, May 2003.
-
(2003)
IEEE Trans. on Consumer Electron.
, vol.49
, Issue.2
, pp. 414-416
-
-
Shen, J.J.1
Lin, C.W.2
Hwang, M.S.3
|