-
1
-
-
0034317895
-
Cryptanalysis of a remote user authentication scheme using smart cards
-
Chan C.-K., and Cheng L.M. Cryptanalysis of a remote user authentication scheme using smart cards. IEEE Trans. Consumer Electron. 46 (2000) 992-993
-
(2000)
IEEE Trans. Consumer Electron.
, vol.46
, pp. 992-993
-
-
Chan, C.-K.1
Cheng, L.M.2
-
2
-
-
0026153410
-
Remote password authentication with smart cards
-
Chang C.C., and Wu T.C. Remote password authentication with smart cards. IEE Proceedings-E 138 (1991) 165-168
-
(1991)
IEE Proceedings-E
, vol.138
, pp. 165-168
-
-
Chang, C.C.1
Wu, T.C.2
-
3
-
-
0037285263
-
Stolen-verifier attack on two new strong-password authentication protocols
-
Chen C.-M., and Ku W.-C. Stolen-verifier attack on two new strong-password authentication protocols. IEICE Trans. Commun. E85-B (2002) 2519-2521
-
(2002)
IEICE Trans. Commun. E85-B
, pp. 2519-2521
-
-
Chen, C.-M.1
Ku, W.-C.2
-
4
-
-
0036302680
-
An efficient and practical solution to remote authentication: Smart card
-
Chien H.-Y., Jan J.-K., and Tseng Y.-M. An efficient and practical solution to remote authentication: Smart card. Computers & Security 21 (2002) 372-375
-
(2002)
Computers & Security
, vol.21
, pp. 372-375
-
-
Chien, H.-Y.1
Jan, J.-K.2
Tseng, Y.-M.3
-
5
-
-
33748173666
-
Revisit of McCullagh-Barreto two-party id-based authenticated key agreement protocols
-
Choo K.-K.R. Revisit of McCullagh-Barreto two-party id-based authenticated key agreement protocols. Internat. J. Network Security 1 3 (2005) 154-160
-
(2005)
Internat. J. Network Security
, vol.1
, Issue.3
, pp. 154-160
-
-
Choo, K.-K.R.1
-
7
-
-
84874800178
-
A public-key cryptosystem and a signature scheme based on discrete logarithms
-
ElGamal T. A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inform. Theory 31 (1985) 469-472
-
(1985)
IEEE Trans. Inform. Theory
, vol.31
, pp. 469-472
-
-
ElGamal, T.1
-
8
-
-
0016092372
-
A user authentication scheme not requiring secrecy in the computer
-
Evans Jr. A., Kantrowitz W., and Weiss E. A user authentication scheme not requiring secrecy in the computer. Commun. ACM 17 (1974) 437-442
-
(1974)
Commun. ACM
, vol.17
, pp. 437-442
-
-
Evans Jr., A.1
Kantrowitz, W.2
Weiss, E.3
-
10
-
-
33748137641
-
-
N. Haller, The S/KEY one-time password system, RFC Technical Report 1760, February 1995
-
-
-
-
11
-
-
0032669728
-
Cryptanalysis of remote login authentication scheme
-
Hwang M.-S. Cryptanalysis of remote login authentication scheme. Comput. Commun. 22 8 (1999) 742-744
-
(1999)
Comput. Commun.
, vol.22
, Issue.8
, pp. 742-744
-
-
Hwang, M.-S.1
-
12
-
-
0000362936
-
An improvement of SPLICE/AS in WIDE against guessing attack
-
Hwang M.-S., Lee C.-C., and Tang Y.-L. An improvement of SPLICE/AS in WIDE against guessing attack. Internat. J. Inform. 12 2 (2001) 297-302
-
(2001)
Internat. J. Inform.
, vol.12
, Issue.2
, pp. 297-302
-
-
Hwang, M.-S.1
Lee, C.-C.2
Tang, Y.-L.3
-
14
-
-
0034140374
-
A new remote user authentication scheme using smart cards
-
Hwang M.-S., and Li L.-H. A new remote user authentication scheme using smart cards. IEEE Trans. Consumer Electron. 46 1 (2000) 28-30
-
(2000)
IEEE Trans. Consumer Electron.
, vol.46
, Issue.1
, pp. 28-30
-
-
Hwang, M.-S.1
Li, L.-H.2
-
15
-
-
0002063278
-
'Paramita wisdom' password authentication scheme without verification tables
-
Jan J.K., and Chen Y.Y. 'Paramita wisdom' password authentication scheme without verification tables. J. Syst. Softw. 42 (1998) 45-57
-
(1998)
J. Syst. Softw.
, vol.42
, pp. 45-57
-
-
Jan, J.K.1
Chen, Y.Y.2
-
16
-
-
0025384135
-
Identity authentication based on keystroke latencies
-
Joyce R., and Gupta G. Identity authentication based on keystroke latencies. Commun. ACM 33 (1990) 168-176
-
(1990)
Commun. ACM
, vol.33
, pp. 168-176
-
-
Joyce, R.1
Gupta, G.2
-
17
-
-
0029214744
-
Biometrics, is it a viable proposition for identity authentication and access control
-
Kim H.J. Biometrics, is it a viable proposition for identity authentication and access control. Comput. Secur. 14 (1995) 205-214
-
(1995)
Comput. Secur.
, vol.14
, pp. 205-214
-
-
Kim, H.J.1
-
18
-
-
33646236878
-
A simple attack on a recently introduced hash-based strong-password authentication scheme
-
Kim M., and Koc C.K. A simple attack on a recently introduced hash-based strong-password authentication scheme. Internat. J. Network Security 1 2 (2005) 77-80
-
(2005)
Internat. J. Network Security
, vol.1
, Issue.2
, pp. 77-80
-
-
Kim, M.1
Koc, C.K.2
-
19
-
-
0019634370
-
Password authentication with insecure communication
-
Lamport L. Password authentication with insecure communication. Commun. ACM 24 (1981) 770-772
-
(1981)
Commun. ACM
, vol.24
, pp. 770-772
-
-
Lamport, L.1
-
20
-
-
33645287503
-
Two attacks on the Wu-Hsu user identification scheme
-
Lee C.C. Two attacks on the Wu-Hsu user identification scheme. Internat. J. Network Security 1 3 (2005) 147-148
-
(2005)
Internat. J. Network Security
, vol.1
, Issue.3
, pp. 147-148
-
-
Lee, C.C.1
-
21
-
-
0035445093
-
Attacks and solutions on strong-password authentication
-
Lin C.L., Sun H.M., and Hwang T. Attacks and solutions on strong-password authentication. IEICE Trans. Commun. E84-B (2001) 2622-2627
-
(2001)
IEICE Trans. Commun. E84-B
, pp. 2622-2627
-
-
Lin, C.L.1
Sun, H.M.2
Hwang, T.3
-
22
-
-
0013456359
-
Comments on the S/KEY user authentication scheme
-
Mitchell C.J., and Chen L. Comments on the S/KEY user authentication scheme. ACM Operating Syst. Rev. 30 (1996) 12-16
-
(1996)
ACM Operating Syst. Rev.
, vol.30
, pp. 12-16
-
-
Mitchell, C.J.1
Chen, L.2
-
23
-
-
33748164338
-
-
National Bureau of Standards, Data Encryption Standards, NBS: FIPS, 1977
-
-
-
-
24
-
-
33748148555
-
-
NIST, Secure hash standard, Technical report FIPS 180-1, NIST, US Department of Commerce, April 1995
-
-
-
-
25
-
-
33748207261
-
-
NIST, Advanced encryption standard, Technical report FIPS 197, NIST, US Department of Commerce, November 2001
-
-
-
-
26
-
-
0016090968
-
A high security log-in procedure
-
Purdy G.B. A high security log-in procedure. Commun. ACM 17 (1974) 442-445
-
(1974)
Commun. ACM
, vol.17
, pp. 442-445
-
-
Purdy, G.B.1
-
27
-
-
33748194565
-
-
R. Rivest, The MD5 message digest algorithm, Technical report RFC 1321, IETF, April 1992
-
-
-
-
28
-
-
0017930809
-
A method for obtaining digital signatures and public key cryptosystems
-
Rivest R.L., Shamir A., and Adleman L. A method for obtaining digital signatures and public key cryptosystems. Commun. ACM 21 (1978) 120-126
-
(1978)
Commun. ACM
, vol.21
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
30
-
-
0042196051
-
A modified remote user authentication scheme using smart cards
-
Shen J.-J., Lin C.-W., and Hwang M.-S. A modified remote user authentication scheme using smart cards. IEEE Trans. Consumer Electron. 49 2 (2003) 414-416
-
(2003)
IEEE Trans. Consumer Electron.
, vol.49
, Issue.2
, pp. 414-416
-
-
Shen, J.-J.1
Lin, C.-W.2
Hwang, M.-S.3
-
31
-
-
0242552286
-
Security enhancement for the timestamp-based password authentication scheme using smart cards
-
Shen J.-J., Lin C.-W., and Hwang M.-S. Security enhancement for the timestamp-based password authentication scheme using smart cards. Comput. Secur. 22 7 (2003) 591-595
-
(2003)
Comput. Secur.
, vol.22
, Issue.7
, pp. 591-595
-
-
Shen, J.-J.1
Lin, C.-W.2
Hwang, M.-S.3
-
32
-
-
0001459651
-
A dynamic password authentication method by one-way function
-
Shimizu A. A dynamic password authentication method by one-way function. IEICE Trans. Inform. Syst. J73-D-I (1990) 630-636
-
(1990)
IEICE Trans. Inform. Syst. J73-D-I
, pp. 630-636
-
-
Shimizu, A.1
-
33
-
-
0032137355
-
A password authentication method for contents communication on the Internet
-
Shimizu A., Horioka T., and Inagaki H. A password authentication method for contents communication on the Internet. IEICE Trans. Commun. E81-B (1998) 1666-1763
-
(1998)
IEICE Trans. Commun. E81-B
, pp. 1666-1763
-
-
Shimizu, A.1
Horioka, T.2
Inagaki, H.3
-
34
-
-
0034318245
-
An efficient remote use authentication scheme using smart cards
-
Sun H.-M. An efficient remote use authentication scheme using smart cards. IEEE Trans. Consumer Electron. 46 4 (2000) 958-961
-
(2000)
IEEE Trans. Consumer Electron.
, vol.46
, Issue.4
, pp. 958-961
-
-
Sun, H.-M.1
-
35
-
-
0242552288
-
Cryptanalysis of an enhanced timestamp-based password authentication scheme
-
Wang B., Li J.H., and Tong Z.P. Cryptanalysis of an enhanced timestamp-based password authentication scheme. Comput. Secur. 22 7 (2003) 643-645
-
(2003)
Comput. Secur.
, vol.22
, Issue.7
, pp. 643-645
-
-
Wang, B.1
Li, J.H.2
Tong, Z.P.3
-
36
-
-
33645291303
-
Cryptanalysis of a secure one-time password authentication scheme with low-communication for mobile communications
-
Wu H.-C., Liu C.-Y., and Chiou S.-F. Cryptanalysis of a secure one-time password authentication scheme with low-communication for mobile communications. Internat. J. Network Security 1 2 (2005) 74-76
-
(2005)
Internat. J. Network Security
, vol.1
, Issue.2
, pp. 74-76
-
-
Wu, H.-C.1
Liu, C.-Y.2
Chiou, S.-F.3
-
37
-
-
0029535942
-
Remote login authentication scheme based on a geometric approach
-
Wu T.C. Remote login authentication scheme based on a geometric approach. Comput. Commun. 18 12 (1995) 959-963
-
(1995)
Comput. Commun.
, vol.18
, Issue.12
, pp. 959-963
-
-
Wu, T.C.1
-
39
-
-
0033350090
-
Password authentication schemes with smart cards
-
Yang W.H., and Shieh S.P. Password authentication schemes with smart cards. Comput. Secur. 18 8 (1999) 727-733
-
(1999)
Comput. Secur.
, vol.18
, Issue.8
, pp. 727-733
-
-
Yang, W.H.1
Shieh, S.P.2
-
40
-
-
33748196456
-
Man-in-the-middle attack on the authentication of the user from the remote autonomous object
-
Yang C.-Y., Lee C.-C., and Hsiao S.-Y. Man-in-the-middle attack on the authentication of the user from the remote autonomous object. Internat. J. Network Security 1 2 (2005) 81-83
-
(2005)
Internat. J. Network Security
, vol.1
, Issue.2
, pp. 81-83
-
-
Yang, C.-Y.1
Lee, C.-C.2
Hsiao, S.-Y.3
-
41
-
-
0037285305
-
A secure one-time password authentication scheme using smart cards
-
Yeh T.-C., Shen H.-Y., and Hwang J.-J. A secure one-time password authentication scheme using smart cards. IEICE Trans. Commun. E85-B (2002) 2515-2518
-
(2002)
IEICE Trans. Commun. E85-B
, pp. 2515-2518
-
-
Yeh, T.-C.1
Shen, H.-Y.2
Hwang, J.-J.3
|