-
2
-
-
84946833891
-
How to leak a secret
-
Advances in Cryptology ASIACRYPT' 01, Springer-Verlag, Berlin Heidelberg New York
-
Rivest,R., Shamir,A., Tauman,Y.: How to leak a secret. Advances in Cryptology ASIACRYPT' 01, LNCS, Vol. 2248,Springer-Verlag, Berlin Heidelberg New York (2001) 552-565
-
(2001)
LNCS
, vol.2248
, pp. 552-565
-
-
Rivest, R.1
Shamir, A.2
Tauman, Y.3
-
3
-
-
85024290278
-
Group signatures
-
Advances in Cryptology EUROCRYPT' 91, Berlin: Spring-Verlag
-
Chaum,D., Heyst,E.V.: Group signatures. Advances in Cryptology EUROCRYPT' 91, LNCS, Vol. 547,Berlin: Spring-Verlag,(1991) 257-265
-
(1991)
LNCS
, vol.547
, pp. 257-265
-
-
Chaum, D.1
Heyst, E.V.2
-
4
-
-
33646844820
-
Anonymous password-based authenticated key exchange
-
Advances in Cryptology INDOCRYPT 2005, Berlin: Spring-Verlag
-
Viet,D.Q., Yamamura,A., Tanaka.,H.: Anonymous password-based authenticated key exchange, Advances in Cryptology INDOCRYPT 2005, LNCS,Vol. 3797, Berlin: Spring-Verlag, (2005) 244-257
-
(2005)
LNCS
, vol.3797
, pp. 244-257
-
-
Viet, D.Q.1
Yamamura, A.2
Tanaka, H.3
-
5
-
-
20544465052
-
Anonymous secure routing in mobile ad-hoc networks
-
Bo,Z., Wan,Z.G., Kankanhalli,M.S., Feng,B., Deng,R.H.: Anonymous secure routing in mobile ad-hoc networks, Local Computer Networks, 2004. 29th Annual IEEE International Conference on 16-18 Nov. (2004) 102-108
-
(2004)
Local Computer Networks, 2004. 29th Annual IEEE International Conference on 16-18 Nov.
, pp. 102-108
-
-
Bo, Z.1
Wan, Z.G.2
Kankanhalli, M.S.3
Feng, B.4
Deng, R.H.5
-
6
-
-
35048854233
-
Anonymous identification in ad hoc groups
-
Advances in Cryptology - EUROCRYPT 2004, Berlin: Spring-Verlag
-
Dodis,Y., Kiayias,A., Nicolosi,A., Shoup,V.: Anonymous identification in ad hoc groups. Advances in Cryptology - EUROCRYPT 2004,LNCS Vol. 3027,Berlin: Spring-Verlag, (2001) 609-626
-
(2001)
LNCS
, vol.3027
, pp. 609-626
-
-
Dodis, Y.1
Kiayias, A.2
Nicolosi, A.3
Shoup, V.4
-
8
-
-
0036302680
-
An efficient and practical solution to remote authentication: Smart card
-
Chien,H.Y., Jan,J., Tseng,Y.: An efficient and practical solution to remote authentication: smart card. Computer Security. Vol. 21(4) (2002) 372-375
-
(2002)
Computer Security
, vol.21
, Issue.4
, pp. 372-375
-
-
Chien, H.Y.1
Jan, J.2
Tseng, Y.3
-
9
-
-
0742268499
-
Security of Chien et al.'s remote user authentication scheme using smart cards
-
Hsu,C.L.: Security of Chien et al.'s remote user authentication scheme using smart cards. Computer Standards and Inerfaces, 26(3) (2004) 167-169
-
(2004)
Computer Standards and Inerfaces
, vol.26
, Issue.3
, pp. 167-169
-
-
Hsu, C.L.1
-
10
-
-
33747860867
-
A self-encryption remote user anonymous authentication scheme using smart cards
-
Lu,R.X., Cao,Z.F., Su,R.W.: A self-encryption remote user anonymous authentication scheme using smart cards, Journal of Shanghai Jiaotong University, (2006)
-
(2006)
Journal of Shanghai Jiaotong University
-
-
Lu, R.X.1
Cao, Z.F.2
Su, R.W.3
-
11
-
-
0034140374
-
A new remote user authentication scheme using smart cards
-
Hwang,M.S., Li,L.H.: A new remote user authentication scheme using smart cards. IEEE Trans. Consum. Electron. Vol 46 (1)(2000)28-30
-
(2000)
IEEE Trans. Consum. Electron.
, vol.46
, Issue.1
, pp. 28-30
-
-
Hwang, M.S.1
Li, L.H.2
-
12
-
-
0019634370
-
Password authentication with insecure communication
-
Lamport,L.: Password authentication with insecure communication. Communication of ACM Vol 24 (11) (1981) 770-772
-
(1981)
Communication of ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
13
-
-
0033350090
-
Password authentication schemes with smart card
-
Yang,W.H., Shieh,S.P.: Password authentication schemes with smart card. Computer Security. Vol 18 (8) (1999) 727-733
-
(1999)
Computer Security
, vol.18
, Issue.8
, pp. 727-733
-
-
Yang, W.H.1
Shieh, S.P.2
-
14
-
-
0142007144
-
A user friendly remote authentication scheme with smart cards
-
Wu,S.T., Chieu,B.C.: A user friendly remote authentication scheme with smart cards, Computers & Security. Vol 22(6)(2003) 547-550
-
(2003)
Computers & Security
, vol.22
, Issue.6
, pp. 547-550
-
-
Wu, S.T.1
Chieu, B.C.2
-
15
-
-
0037285263
-
Stolen-verifier attack on two new strong-password authentication protocal
-
Chen,C.M., Ku,W.C., Stolen-verifier attack on two new strong-password authentication protocal. IEICE Transactions on Communications, Vol. E85-B,(11) (2002) 2519-2521
-
(2002)
IEICE Transactions on Communications
, vol.E85-B
, Issue.11
, pp. 2519-2521
-
-
Chen, C.M.1
Ku, W.C.2
-
16
-
-
84981199109
-
A design principle for hash functions
-
Advances in Cryptology, CRYPTO 89
-
Damgard,I.: A design principle for hash functions, in: Advances in Cryptology, CRYPTO 89, LNCS Vol. 435 (1989) 416-427
-
(1989)
LNCS
, vol.435
, pp. 416-427
-
-
Damgard, I.1
|