-
2
-
-
0345764840
-
Attacks on the (enhanced) Yang-Shieh authentication
-
K.F. Chen, and S. Zhong Attacks on the (enhanced) Yang-Shieh authentication Computers and Security 22 8 2003 725 727
-
(2003)
Computers and Security
, vol.22
, Issue.8
, pp. 725-727
-
-
Chen, K.F.1
Zhong, S.2
-
3
-
-
0036302680
-
An efficient and practical solution to remote authentication: Smart card
-
H.Y. Chien, J.K. Jan, and Y.M. Tseng An efficient and practical solution to remote authentication: smart card Computers and Security 21 4 2002 372 375
-
(2002)
Computers and Security
, vol.21
, Issue.4
, pp. 372-375
-
-
Chien, H.Y.1
Jan, J.K.2
Tseng, Y.M.3
-
4
-
-
0016092372
-
A user authentication system not requiring secrecy in the computer
-
A.J. Evan, W. Kantrowitz, and E. Weiss A user authentication system not requiring secrecy in the computer Communications of ACM 17 1974 437 442
-
(1974)
Communications of ACM
, vol.17
, pp. 437-442
-
-
Evan, A.J.1
Kantrowitz, W.2
Weiss, E.3
-
5
-
-
1542542682
-
Security of two remote authentication schemes using smart cards
-
C.L. Hsu Security of two remote authentication schemes using smart cards IEEE Transactions on Consumer Electronics 49 4 2003 1196 1198
-
(2003)
IEEE Transactions on Consumer Electronics
, vol.49
, Issue.4
, pp. 1196-1198
-
-
Hsu, C.L.1
-
6
-
-
0034140374
-
A new remote user authentication scheme using smart cards
-
M.S. Hwang, and L.H. Li A new remote user authentication scheme using smart cards IEEE Transactions on Consumer Electronics 46 1 2000 28 30
-
(2000)
IEEE Transactions on Consumer Electronics
, vol.46
, Issue.1
, pp. 28-30
-
-
Hwang, M.S.1
Li, L.H.2
-
8
-
-
1542335451
-
Efficient password authenticated key agreement using smart cards
-
W.S. Juang Efficient password authenticated key agreement using smart cards Computers and Security 23 2 2004 167 173
-
(2004)
Computers and Security
, vol.23
, Issue.2
, pp. 167-173
-
-
Juang, W.S.1
-
11
-
-
1942423677
-
Weakness and improvements of an efficient password based remote user authentication scheme using smart cards
-
W.C. Ku, and S.H. Chen Weakness and improvements of an efficient password based remote user authentication scheme using smart cards IEEE Transactions on Consumer Electronics 50 1 2004 204 207
-
(2004)
IEEE Transactions on Consumer Electronics
, vol.50
, Issue.1
, pp. 204-207
-
-
Ku, W.C.1
Chen, S.H.2
-
12
-
-
0019634370
-
Password authentication with insecure communication
-
L. Lamport Password authentication with insecure communication Communications of ACM 24 1981 28 30
-
(1981)
Communications of ACM
, vol.24
, pp. 28-30
-
-
Lamport, L.1
-
13
-
-
0041698517
-
A flexible remote user authentication scheme using smart cards
-
C.C. Lee, M.S. Hwang, and W.P. Yang A flexible remote user authentication scheme using smart cards ACM Operating Systems Review 36 4 2002 23 29
-
(2002)
ACM Operating Systems Review
, vol.36
, Issue.4
, pp. 23-29
-
-
Lee, C.C.1
Hwang, M.S.2
Yang, W.P.3
-
15
-
-
23444455451
-
Security enhancement for optimal strong-password authentication protocol
-
C.W. Lin, J.J. Shen, and M.S. Hwang Security enhancement for optimal strong-password authentication protocol ACM Operating Systems Review 37 3 2003 12 16
-
(2003)
ACM Operating Systems Review
, vol.37
, Issue.3
, pp. 12-16
-
-
Lin, C.W.1
Shen, J.J.2
Hwang, M.S.3
-
17
-
-
0036566408
-
Examining smart card security under the threat of power analysis attacks
-
T.S. Messerges, E.A. Dabbish, and R.H. Sloan Examining smart card security under the threat of power analysis attacks IEEE Transactions on Computers 51 5 2002 541 552
-
(2002)
IEEE Transactions on Computers
, vol.51
, Issue.5
, pp. 541-552
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
-
18
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
R.M. Needham, and M.D. Schroeder Using encryption for authentication in large networks of computers Communications of the ACM 21 12 1978 993 999
-
(1978)
Communications of the ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.M.1
Schroeder, M.D.2
-
20
-
-
0022807029
-
A simple and fast probabilistic algorithm for computing square roots modulo a prime number
-
R.C. Peralta A simple and fast probabilistic algorithm for computing square roots modulo a prime number IEEE Transactions on Information Theory 32 6 1986 846 847
-
(1986)
IEEE Transactions on Information Theory
, vol.32
, Issue.6
, pp. 846-847
-
-
Peralta, R.C.1
-
21
-
-
0003614758
-
Digitalized signatures and public-key functions as intractable as factorizations
-
MIT Lab., Computer Science Cambridge, Mass
-
M.O. Rabin Digitalized signatures and public-key functions as intractable as factorizations Technical Report January 1979 MIT Lab., Computer Science Cambridge, Mass MIT/LCS/TR212
-
(1979)
Technical Report
-
-
Rabin, M.O.1
-
22
-
-
2742584770
-
An authentication protocol and key distribution system for open network system
-
S.P. Shieh, and W.H. Yang An authentication protocol and key distribution system for open network system ACM Operating Systems Review 30 2 1996 32 41
-
(1996)
ACM Operating Systems Review
, vol.30
, Issue.2
, pp. 32-41
-
-
Shieh, S.P.1
Yang, W.H.2
-
23
-
-
0034318245
-
An efficient remote user authentication scheme using smart cards
-
H.M. Sun An efficient remote user authentication scheme using smart cards IEEE Transactions on Consumer Electronics 46 4 2000 958 961
-
(2000)
IEEE Transactions on Consumer Electronics
, vol.46
, Issue.4
, pp. 958-961
-
-
Sun, H.M.1
-
24
-
-
0032676908
-
Remote password authentication scheme based on cross-product
-
K. Tan, and H. Zhu Remote password authentication scheme based on cross-product Computer Communications 22 4 1999 390 393
-
(1999)
Computer Communications
, vol.22
, Issue.4
, pp. 390-393
-
-
Tan, K.1
Zhu, H.2
-
25
-
-
0029710130
-
Smart card based secure password authentication scheme
-
S.J. Wang, and J.F. Chang Smart card based secure password authentication scheme Computers and Security 15 3 1996 231 237
-
(1996)
Computers and Security
, vol.15
, Issue.3
, pp. 231-237
-
-
Wang, S.J.1
Chang, J.F.2
-
26
-
-
0042697291
-
Yet another log-in authentication using N-dimensional construction based on circle property
-
S.J. Wang Yet another log-in authentication using N-dimensional construction based on circle property IEEE Transactions on Consumer Electronics 49 2 2003 337 341
-
(2003)
IEEE Transactions on Consumer Electronics
, vol.49
, Issue.2
, pp. 337-341
-
-
Wang, S.J.1
-
27
-
-
0029535942
-
Remote login authentication scheme based on a geometric
-
T.C. Wu Remote login authentication scheme based on a geometric Computer Communications 18 12 1995 959 963
-
(1995)
Computer Communications
, vol.18
, Issue.12
, pp. 959-963
-
-
Wu, T.C.1
-
28
-
-
0142007144
-
A user friendly remote authentication scheme with smart cards
-
S.T. Wu, and B.C. Chieu A user friendly remote authentication scheme with smart cards Computers and Security 22 6 2003 547 550
-
(2003)
Computers and Security
, vol.22
, Issue.6
, pp. 547-550
-
-
Wu, S.T.1
Chieu, B.C.2
-
29
-
-
0033350090
-
Password authentication schemes with smart cards
-
W.H. Yang, and S.P. Shieh Password authentication schemes with smart cards Computers and Security 18 8 1999 727 733
-
(1999)
Computers and Security
, vol.18
, Issue.8
, pp. 727-733
-
-
Yang, W.H.1
Shieh, S.P.2
-
30
-
-
3042731523
-
Cryptanalysis of a user friendly remote authentication scheme with smart cards
-
C.C. Yang, and R.C. Wang Cryptanalysis of a user friendly remote authentication scheme with smart cards Computers and Security 23 5 2004 425 427
-
(2004)
Computers and Security
, vol.23
, Issue.5
, pp. 425-427
-
-
Yang, C.C.1
Wang, R.C.2
-
31
-
-
0035508197
-
Security analysis of the generalized key agreement and password authentication protocol
-
H.T. Yeh, H.M. Sun, and T. Hwang Security analysis of the generalized key agreement and password authentication protocol IEEE Communications Letters 5 11 2001 462 463
-
(2001)
IEEE Communications Letters
, vol.5
, Issue.11
, pp. 462-463
-
-
Yeh, H.T.1
Sun, H.M.2
Hwang, T.3
-
32
-
-
0003256983
-
Shared authentication token secure against replay and weak key attacks
-
S.M. Yen, and K.H. Liao Shared authentication token secure against replay and weak key attacks Information Processing Letters 62 2 1997 78 80
-
(1997)
Information Processing Letters
, vol.62
, Issue.2
, pp. 78-80
-
-
Yen, S.M.1
Liao, K.H.2
|