-
2
-
-
1542647564
-
A remote user authentication scheme using smart cards with forward secrecy
-
Awasthi,A.K., Lal,S.: A remote user authentication scheme using smart cards with forward secrecy. IEEE Trans. Consum. Electron. Vol. 49 (4) (2003) 1246-1248
-
(2003)
IEEE Trans. Consum. Electron.
, vol.49
, Issue.4
, pp. 1246-1248
-
-
Awasthi, A.K.1
Lal, S.2
-
3
-
-
33645310462
-
A secure and efficient strong-password authentication protocol
-
Chang,Y.F., Chang,C.C.: A secure and efficient strong-password authentication protocol. ACM SIGOPS Operating Systems Review. Vol. 38(3)(2004)79-90
-
(2004)
ACM SIGOPS Operating Systems Review
, vol.38
, Issue.3
, pp. 79-90
-
-
Chang, Y.F.1
Chang, C.C.2
-
4
-
-
0034317895
-
Cryptanalysis of a remote user authentication scheme using smart cards
-
Chan,C.K., Cheng,L.M.: Cryptanalysis of a remote user authentication scheme using smart cards. IEEE Trans. Consum. Electron. 46 (4) (2000) 992-993
-
(2000)
IEEE Trans. Consum. Electron.
, vol.46
, Issue.4
, pp. 992-993
-
-
Chan, C.K.1
Cheng, L.M.2
-
6
-
-
0344197994
-
Some forgery attacks on a remote user authentication scheme using smart cards
-
Chan,C.C., Hwang,K.F.: Some forgery attacks on a remote user authentication scheme using smart cards. Informatics. Vol. 14 (3)(2003) 289-294
-
(2003)
Informatics
, vol.14
, Issue.3
, pp. 289-294
-
-
Chan, C.C.1
Hwang, K.F.2
-
7
-
-
0036302680
-
An efficient and practical solution to remote authentication: Smart card
-
Chien,H.Y., Jan,J., Tseng,Y.: An efficient and practical solution to remote authentication: smart card. Computer Security. Vol. 21 (4)(2002) 372-375
-
(2002)
Computer Security
, vol.21
, Issue.4
, pp. 372-375
-
-
Chien, H.Y.1
Jan, J.2
Tseng, Y.3
-
8
-
-
0742268499
-
Security of Chien et al.'s remote user authentication scheme using smart cards
-
Hsu,C.L.: Security of Chien et al.'s remote user authentication scheme using smart cards. Computer Standards and Inerfaces. Vol. 26(3) (2004) 167-169
-
(2004)
Computer Standards and Inerfaces
, vol.26
, Issue.3
, pp. 167-169
-
-
Hsu, C.L.1
-
9
-
-
9544227377
-
Improvement of Chien et al.'s remote user authentication scheme using smart cards
-
Lee,S.W., Kim,H.S., Yoo,K.Y.: Improvement of Chien et al.'s remote user authentication scheme using smart cards. Computer Standards and Inerfaces. Vol. 27 (2005)181-183
-
(2005)
Computer Standards and Inerfaces
, vol.27
, pp. 181-183
-
-
Lee, S.W.1
Kim, H.S.2
Yoo, K.Y.3
-
10
-
-
0026153410
-
Remote password authentication with smart cards
-
Chang,C.C., Wu,T.C.: Remote password authentication with smart cards,IEE Proceddings-E.Vol. 138 (3)(1993)165-168
-
(1993)
IEE Proceddings-E
, vol.138
, Issue.3
, pp. 165-168
-
-
Chang, C.C.1
Wu, T.C.2
-
11
-
-
4043122631
-
A dynamic ID-based remote user authentication scheme
-
Das,M.L., Saxena,A., Gulati,V.P.: A dynamic ID-based remote user authentication scheme. IEEE Trans. Consum. Electron. Vol. 50 (2)(2004)629-631
-
(2004)
IEEE Trans. Consum. Electron.
, vol.50
, Issue.2
, pp. 629-631
-
-
Das, M.L.1
Saxena, A.2
Gulati, V.P.3
-
12
-
-
0037008805
-
A simple remote user authentication scheme
-
Hwang,M.S., Lee,C.C., Tang,Y.L.: A simple remote user authentication scheme. Math.Comput.Model. Vol. 36(2002) 103-107
-
(2002)
Math.Comput.Model.
, vol.36
, pp. 103-107
-
-
Hwang, M.S.1
Lee, C.C.2
Tang, Y.L.3
-
13
-
-
0034140374
-
A new remote user authentication scheme using smart cards
-
Hwang,M.S., Li,L.H.: A new remote user authentication scheme using smart cards. IEEE Trans. Consuni. Electron. Vol. 46 (1)(2000)28-30
-
(2000)
IEEE Trans. Consuni. Electron.
, vol.46
, Issue.1
, pp. 28-30
-
-
Hwang, M.S.1
Li, L.H.2
-
14
-
-
0019634370
-
Password authentication with insecure communication
-
Lamport,L.: Password authentication with insecure communication. Communication of ACM Vol. 24 (11)(1981) 770-772
-
(1981)
Communication of ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
15
-
-
24344478593
-
Efficient remote user authentication scheme using smart card
-
Lu,R.X., Cao,Z.F.: Efficient remote user authentication scheme using smart card. Computer Networks. Vol. 49(4) (2005) 535-540
-
(2005)
Computer Networks
, vol.49
, Issue.4
, pp. 535-540
-
-
Lu, R.X.1
Cao, Z.F.2
-
16
-
-
1542542636
-
Cryptanalysis of a modified remote user authentication scheme using smart cards
-
Leung,K.C., Cheng,L.M., Fong,A.S., Chan,C.K.: Cryptanalysis of a modified remote user authentication scheme using smart cards. IEEE Trans. Consum. Electron. Vol. 49 (4) (2003) 1243-1245
-
(2003)
IEEE Trans. Consum. Electron.
, vol.49
, Issue.4
, pp. 1243-1245
-
-
Leung, K.C.1
Cheng, L.M.2
Fong, A.S.3
Chan, C.K.4
-
17
-
-
0034318245
-
An efficient remote user authentication scheme using smart cards
-
Sun,H.M.: An efficient remote user authentication scheme using smart cards. IEEE Trans. Consum. Electron. Vol. 46 (4)(2000) 958-961
-
(2000)
IEEE Trans. Consum. Electron.
, vol.46
, Issue.4
, pp. 958-961
-
-
Sun, H.M.1
-
18
-
-
0042196051
-
A modified remote user authentication scheme using smart cards
-
Shen,J.J., Lin,C.W., Hwang,M.S.: A modified remote user authentication scheme using smart cards. IEEE Trans. Consum. Electron. Vol. 49 (2)(2003) 414-416
-
(2003)
IEEE Trans. Consum. Electron.
, vol.49
, Issue.2
, pp. 414-416
-
-
Shen, J.J.1
Lin, C.W.2
Hwang, M.S.3
-
19
-
-
0033350090
-
Password authentication schemes with smart card
-
Yang,W.H., Shieh,S.P.: Password authentication schemes with smart card. Computer Security. Vol. 18 (8) (1999) 727-733
-
(1999)
Computer Security
, vol.18
, Issue.8
, pp. 727-733
-
-
Yang, W.H.1
Shieh, S.P.2
-
20
-
-
0036167785
-
Cryptanalysis of timestamp-based password authenticatin scheme
-
Chan,C.K., Cheng,L.M.: Cryptanalysis of timestamp-based password authenticatin scheme. Computers & Security. Vol. 21(1)(2002)74-76
-
(2002)
Computers & Security
, vol.21
, Issue.1
, pp. 74-76
-
-
Chan, C.K.1
Cheng, L.M.2
-
21
-
-
0036429021
-
An enhancement of timestamp-based password authenticatin scheme
-
Fan,L., Li,J.H., Zhu,H.W.: An enhancement of timestamp-based password authenticatin scheme. Computers & Security. Vol. 21(7)(2002)665-667
-
(2002)
Computers & Security
, vol.21
, Issue.7
, pp. 665-667
-
-
Fan, L.1
Li, J.H.2
Zhu, H.W.3
-
22
-
-
0242552286
-
Security enhancement for the timestamp-based password authentication scheme using smart cards
-
Shen,J.J., Lin,C.W., Hwang,M.S.: Security enhancement for the timestamp-based password authentication scheme using smart cards. Computers & Security. Vol. 22(7)(2003)591-595
-
(2003)
Computers & Security
, vol.22
, Issue.7
, pp. 591-595
-
-
Shen, J.J.1
Lin, C.W.2
Hwang, M.S.3
-
23
-
-
0142007144
-
A user friendly remote authentication scheme with smart cards
-
Wu,S.T., Chieu,B.C.: A user friendly remote authentication scheme with smart cards. Computers & Security. Vol. 22(6)(2003)547-550
-
(2003)
Computers & Security
, vol.22
, Issue.6
, pp. 547-550
-
-
Wu, S.T.1
Chieu, B.C.2
-
24
-
-
3042731523
-
Cryptanalysis of a user friendly remote authentication scheme with smart cards
-
Yang,C.C., Wang,R.C.: Cryptanalysis of a user friendly remote authentication scheme with smart cards. Computers & Security. Vol. 23(2004)425-427
-
(2004)
Computers & Security
, vol.23
, pp. 425-427
-
-
Yang, C.C.1
Wang, R.C.2
-
25
-
-
0037285263
-
Stolen-verifier attack on two new strong-password authentication protocal
-
Chen,C.M., Ku,W.C.: Stolen-verifier attack on two new strong-password authentication protocal. IEICE Transactions on Communications. Vol. E85-B,(11)(2002)2519-2521
-
(2002)
IEICE Transactions on Communications
, vol.E85-B
, Issue.11
, pp. 2519-2521
-
-
Chen, C.M.1
Ku, W.C.2
-
26
-
-
0032115203
-
Efficient and secure password-based authentication protocols against guessing atacks
-
Kwon,T., Song,J.: Efficient and secure password-based authentication protocols against guessing atacks. Computer Communications. 21(1998)853-861.
-
(1998)
Computer Communications
, vol.21
, pp. 853-861
-
-
Kwon, T.1
Song, J.2
-
27
-
-
84937438236
-
Threshold password-authentication key exchange
-
CRYPTO 2002. Berlin: Spring-Verlag
-
MacKenzie,P., Shrimpton,T., Jakobsson,M.: Threshold password- authentication key exchange, CRYPTO 2002, LNCS, Vol. 2442. Berlin: Spring-Verlag. 385-400.
-
LNCS
, vol.2442
, pp. 385-400
-
-
MacKenzie, P.1
Shrimpton, T.2
Jakobsson, M.3
-
28
-
-
35248822669
-
Provably secure threshold password authenticated key exchange
-
Eurocrypt 2003, Springer-Verlag
-
Raimonodo,M.D., Gennaro,R.: Provably secure threshold password authenticated key exchange. In: Eurocrypt 2003, LNCS, vol 2656, Springer-Verlag
-
LNCS
, vol.2656
-
-
Raimonodo, M.D.1
Gennaro, R.2
-
29
-
-
33750070723
-
Factoring-based proxy signature schemes with forward-security
-
CIS 2004, Shanghai
-
Chai,Z.C., Cao,Z.F.: Factoring-Based Proxy Signature Schemes with Forward-Security. CIS 2004, Shanghai, Lecture Notes in Computer Science, Vol. 3314, (2004) 1034-1040
-
(2004)
Lecture Notes in Computer Science
, vol.3314
, pp. 1034-1040
-
-
Chai, Z.C.1
Cao, Z.F.2
-
30
-
-
84969368443
-
An identity-based key-exchange protocol
-
Advances in Cryptology EUROCRYPT89, Berlin: Spring-Verlag
-
Gunther, C. G.: An Identity-based Key-exchange Protocol. Advances in Cryptology EUROCRYPT89, LNCS, Vol. 434,Berlin: Spring-Verlag,(1990) 29-37
-
(1990)
LNCS
, vol.434
, pp. 29-37
-
-
Gunther, C.G.1
-
31
-
-
84941159682
-
Forward-secure threshold signature scheme
-
Abdalla,M., Miner, S., et al.: Forward-secure Threshold Signature Scheme. RSA'01
-
RSA'01
-
-
Abdalla, M.1
Miner, S.2
-
33
-
-
79958074367
-
A forward-secure digital signature scheme
-
Advances in Cryptology Crypto'99 Proceedings, Wiener, M. ed., Springer-Verlag
-
Bellare, M., Miner, S.: A forward-secure digital signature scheme. Advances in Cryptology Crypto'99 Proceedings, Lecture Notes in Computer Science, Vol.1666, Wiener, M. ed., Springer-Verlag 1999
-
(1999)
Lecture Notes in Computer Science
, vol.1666
-
-
Bellare, M.1
Miner, S.2
-
34
-
-
84981199109
-
A design principle for hash functions
-
Advances in Cryptology, CRYPTO 89
-
Damgard,I.: A design principle for hash functions, in: Advances in Cryptology, CRYPTO 89, LNCS, Vol.435 (1989) 416-427
-
(1989)
LNCS
, vol.435
, pp. 416-427
-
-
Damgard, I.1
-
35
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Rivest,R.L., Shamir,A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM. Vol.21(2)(1978) 120-126
-
(1978)
Communications of the ACMVol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
36
-
-
84959165880
-
A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmisson and memory
-
Eurocrypt 88, springer-verlag
-
Guillou,L., Quisquater,J.: A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmisson and memory. Eurocrypt 88, LNCS, Vol. 330, springer-verlag, (1988) 123-128
-
(1988)
LNCS
, vol.330
, pp. 123-128
-
-
Guillou, L.1
Quisquater, J.2
-
37
-
-
4043135280
-
Comment on a remote user authentication scheme using smart cards with forward secrecy
-
Lee,S.W., Kim,H.S., Yoo,K.Y.: Comment on a remote user authentication scheme using smart cards with forward secrecy. IEEE Tran. on Consumer Electronics. Vol 50(2)(2004) 576-577
-
(2004)
IEEE Tran. on Consumer Electronics
, vol.50
, Issue.2
, pp. 576-577
-
-
Lee, S.W.1
Kim, H.S.2
Yoo, K.Y.3
-
38
-
-
4043118421
-
Some remarks on a remote user authentication scheme using smart cards with forward secrecy
-
Kumar,M.: Some remarks on a remote user authentication scheme using smart cards with forward secrecy. IEEE Tran. on Consumer Electronics. Vol. 50(2)(2004) 615-618
-
(2004)
IEEE Tran. on Consumer Electronics
, vol.50
, Issue.2
, pp. 615-618
-
-
Kumar, M.1
|