-
1
-
-
0034317895
-
Cryptanalysis of a remote user authentication scheme using smart cards
-
Chan C.K., and Cheng L.M. Cryptanalysis of a remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics 46 4 (2000) 992-993
-
(2000)
IEEE Transactions on Consumer Electronics
, vol.46
, Issue.4
, pp. 992-993
-
-
Chan, C.K.1
Cheng, L.M.2
-
2
-
-
0035124983
-
Remarks on Wang-Chang's password authentication scheme
-
Chan C.K., and Cheng L.M. Remarks on Wang-Chang's password authentication scheme. IEEE Electronics Letter 37 1 (2001) 22-23
-
(2001)
IEEE Electronics Letter
, vol.37
, Issue.1
, pp. 22-23
-
-
Chan, C.K.1
Cheng, L.M.2
-
3
-
-
0036302680
-
An efficient and practical solution to remote authentication: smart card
-
Chien H.Y., Jan J.K., and Tseng Y.M. An efficient and practical solution to remote authentication: smart card. Computers and Security 21 4 (2002) 372-375
-
(2002)
Computers and Security
, vol.21
, Issue.4
, pp. 372-375
-
-
Chien, H.Y.1
Jan, J.K.2
Tseng, Y.M.3
-
5
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
ElGamal T. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory 31 4 (1985) 469-472
-
(1985)
IEEE Transactions on Information Theory
, vol.31
, Issue.4
, pp. 469-472
-
-
ElGamal, T.1
-
7
-
-
0034140374
-
A new remote user authentication scheme using smart cards
-
Hwang M.S., and Li L.H. A new remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics 46 1 (2000) 28-30
-
(2000)
IEEE Transactions on Consumer Electronics
, vol.46
, Issue.1
, pp. 28-30
-
-
Hwang, M.S.1
Li, L.H.2
-
8
-
-
24144494609
-
Impersonation attack on a dynamic id-based remote user authentication scheme using smart cards
-
Ku W.-C., and Chang S.-T. Impersonation attack on a dynamic id-based remote user authentication scheme using smart cards. IEICE Transactions on Communications E88-B 5 (2005) 2165-2167
-
(2005)
IEICE Transactions on Communications
, vol.E88-B
, Issue.5
, pp. 2165-2167
-
-
Ku, W.-C.1
Chang, S.-T.2
-
9
-
-
15544370112
-
Further cryptanalysis of a fingerprint-based remote user authentication scheme using smart cards
-
Ku W.-C., Chang S.-T., and Chiang M.-H. Further cryptanalysis of a fingerprint-based remote user authentication scheme using smart cards. IEE Electronics Letters 41 5 (2005) 240-241
-
(2005)
IEE Electronics Letters
, vol.41
, Issue.5
, pp. 240-241
-
-
Ku, W.-C.1
Chang, S.-T.2
Chiang, M.-H.3
-
10
-
-
33646469746
-
Weaknesses of Yoon-Ryu-Yoo's hash-based password authentication scheme
-
Ku W.-C., Chiang M.-H., and Chang S.-T. Weaknesses of Yoon-Ryu-Yoo's hash-based password authentication scheme. ACM Operating Systems Review 39 1 (2005) 85-89
-
(2005)
ACM Operating Systems Review
, vol.39
, Issue.1
, pp. 85-89
-
-
Ku, W.-C.1
Chiang, M.-H.2
Chang, S.-T.3
-
11
-
-
0019634370
-
Password authentication with insecure communication
-
Lamport L. Password authentication with insecure communication. Communications of the ACM 24 (1981) 770-772
-
(1981)
Communications of the ACM
, vol.24
, pp. 770-772
-
-
Lamport, L.1
-
13
-
-
0034318245
-
An efficient remote user authentication scheme using smart cards
-
Sun H.M. An efficient remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics 46 4 (2000) 958-961
-
(2000)
IEEE Transactions on Consumer Electronics
, vol.46
, Issue.4
, pp. 958-961
-
-
Sun, H.M.1
-
14
-
-
33646480658
-
-
H.M. Sun, Cryptanalysis of password authentication schemes with smart cards, in: Information Security Conference 2001, May 2001, pp. 221-223
-
-
-
-
15
-
-
0029710130
-
Smart card based secure password authentication scheme
-
Wang S.J., and Chang J.F. Smart card based secure password authentication scheme. Computers and Security 15 3 (1996) 231-237
-
(1996)
Computers and Security
, vol.15
, Issue.3
, pp. 231-237
-
-
Wang, S.J.1
Chang, J.F.2
-
16
-
-
0033350090
-
Password authentication schemes with smart cards
-
Yang W.H., and Shieh S.P. Password authentication schemes with smart cards. Computers and Security 18 8 (1999) 727-733
-
(1999)
Computers and Security
, vol.18
, Issue.8
, pp. 727-733
-
-
Yang, W.H.1
Shieh, S.P.2
|