-
1
-
-
85027120504
-
-
Anti-Phishing Working Group (http://www.antiphishing.org).
-
Group
-
-
Working, A.1
-
2
-
-
0000874415
-
Limitations of the Kerberos authentication system
-
S.M. Bellovin and M. Merritt, "Limitations of the Kerberos authentication system," ACM Comput. Commun. Rev., vol.20, no.5, pp. 119-132, 1990.
-
(1990)
ACM Comput. Commun. Rev
, vol.20
, Issue.5
, pp. 119-132
-
-
Bellovin, S.M.1
Merritt, M.2
-
3
-
-
0027617333
-
Systematic design of a family of attack-resistant authentication protocols
-
R. Bird, I. Gopal, A. Herzberg, P.A. Janson, S. Kutten, R. Molva, and M. Yung, "Systematic design of a family of attack-resistant authentication protocols," IEEE J. Sel. Areas Commun., vol.11, no.5, pp.679-693, 1993.
-
(1993)
IEEE J. Sel. Areas Commun
, vol.11
, Issue.5
, pp. 679-693
-
-
Bird, R.1
Gopal, I.2
Herzberg, A.3
Janson, P.A.4
Kutten, S.5
Molva, R.6
Yung, M.7
-
4
-
-
35048860626
-
Analysis of key-exchange protocols and their use for building secure channels
-
Eurocrypt'01, Springer-Verlag
-
R. Canetti and H. Krawczyk, "Analysis of key-exchange protocols and their use for building secure channels," Eurocrypt'01, LNCS, vol.2045, pp.453-474, Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2045
, pp. 453-474
-
-
Canetti, R.1
Krawczyk, H.2
-
5
-
-
0026153410
-
Remote password authentication with smart cards
-
C.-C. Chang and T.-C. Wu, "Remote password authentication with smart cards," IEE Proc., Comput. Digit. Tech., vol.138, no.3, pp.165-168, 1991.
-
(1991)
IEE Proc., Comput. Digit. Tech
, vol.138
, Issue.3
, pp. 165-168
-
-
Chang, C.-C.1
Wu, T.-C.2
-
6
-
-
0036302680
-
An efficient and practical solution to remote authentication: Smart card
-
H.-Y. Chien, J.-K. Jan, and Y.-M. Tseng, "An efficient and practical solution to remote authentication: Smart card," Comput. Secur., vol.21, no.4, pp.372-375, 2002.
-
(2002)
Comput. Secur
, vol.21
, Issue.4
, pp. 372-375
-
-
Chien, H.-Y.1
Jan, J.-K.2
Tseng, Y.-M.3
-
7
-
-
1542593353
-
Authentication and authenticated key exchange
-
W. Diffie, P.C. van Oorschot, and M.J. Wiener, "Authentication and authenticated key exchange," Des. Codes Cryptogr., vol.2, no.2, pp.107-125, 1992.
-
(1992)
Des. Codes Cryptogr
, vol.2
, Issue.2
, pp. 107-125
-
-
Diffie, W.1
van Oorschot, P.C.2
Wiener, M.J.3
-
8
-
-
0003370741
-
A security risk of depending on synchronized clocks
-
L. Gong, "A security risk of depending on synchronized clocks," ACM SIGOPS Operating Systems Review, vol.26, no.1, pp.49-53, 1992.
-
(1992)
ACM SIGOPS Operating Systems Review
, vol.26
, Issue.1
, pp. 49-53
-
-
Gong, L.1
-
9
-
-
0034140374
-
A new remote user authentication scheme using smart cards
-
M.-S. Hwang and L.-H. Li, "A new remote user authentication scheme using smart cards," IEEE Trans. Consum. Electron., vol.46, no.1, pp.28-30, 2000.
-
(2000)
IEEE Trans. Consum. Electron
, vol.46
, Issue.1
, pp. 28-30
-
-
Hwang, M.-S.1
Li, L.-H.2
-
10
-
-
84939573910
-
Differential power analysis
-
Crypto'99, Springer-Verlag
-
P. Kocher, J. Jaffe, and B. Jun, "Differential power analysis," Crypto'99, LNCS, vol.1666, pp.388-397, Springer-Verlag, 1999.
-
(1999)
LNCS
, vol.1666
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
11
-
-
0019634370
-
Password authentication with insecure communication
-
L. Lamport, "Password authentication with insecure communication," Commun. ACM, vol.24, no.11, pp.770-772, 1981.
-
(1981)
Commun. ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
12
-
-
24944502757
-
Efficient nonce-based remote user authentication scheme using smart cards
-
S.-W. Lee, H.-S. Kim, and K.-Y. Yoo, "Efficient nonce-based remote user authentication scheme using smart cards," Appl. Math. Comput., vol.167, no.1, pp.355-361, 2005.
-
(2005)
Appl. Math. Comput
, vol.167
, Issue.1
, pp. 355-361
-
-
Lee, S.-W.1
Kim, H.-S.2
Yoo, K.-Y.3
-
13
-
-
0034318245
-
An efficient remote user authentication scheme using smart cards
-
H.-M. Sun, "An efficient remote user authentication scheme using smart cards," IEEE Trans. Consum. Electron., vol.46, no.4, pp.958-961, 2000.
-
(2000)
IEEE Trans. Consum. Electron
, vol.46
, Issue.4
, pp. 958-961
-
-
Sun, H.-M.1
-
14
-
-
0033350090
-
Password authentication schemes with smart card
-
W.-H. Yang and S.-P. Shieh, "Password authentication schemes with smart card," Comput. Secur., vol.18, no.8, pp.727-733, 1999.
-
(1999)
Comput. Secur
, vol.18
, Issue.8
, pp. 727-733
-
-
Yang, W.-H.1
Shieh, S.-P.2
-
15
-
-
15744404005
-
An improvement of Hwang-Lee-Tang's simple remote user authentication scheme
-
E.-J. Yoon, E.-K. Ryu, and K.-Y. Yoo, "An improvement of Hwang-Lee-Tang's simple remote user authentication scheme," Comput. Secur., vol.24, no.1, pp.50-56, 2005.
-
(2005)
Comput. Secur
, vol.24
, Issue.1
, pp. 50-56
-
-
Yoon, E.-J.1
Ryu, E.-K.2
Yoo, K.-Y.3
|