-
1
-
-
0034318245
-
An efficient remote user authentication scheme using smart cards
-
H. M. Sun, "An efficient remote user authentication scheme using smart cards", IEEE Transactions on Consumer Electronics, Vol 46, No. 4, pp. 958-961, 2000.
-
(2000)
IEEE Transactions on Consumer Electronics
, vol.46
, Issue.4
, pp. 958-961
-
-
Sun, H.M.1
-
2
-
-
27144545000
-
Weakness and improvement on Wang-Li-Tie's user-friendly remote authentication scheme
-
D. Z. Sun, J. D. Zhong, and Y. Sun, "Weakness and improvement on Wang-Li-Tie's user-friendly remote authentication scheme", Applied Mathematics and Computation, Vol 170, No. 2, pp. 1185-1193, 2005.
-
(2005)
Applied Mathematics and Computation
, vol.170
, Issue.2
, pp. 1185-1193
-
-
Sun, D.Z.1
Zhong, J.D.2
Sun, Y.3
-
3
-
-
0036302680
-
An efficient and practical solution to remote authentication: Smart card
-
H. Y. Chien, J. K. Jan, and Y. M. Tseng, "An efficient and practical solution to remote authentication: smart card", Computer and Security, Vol 21, No. 4, pp. 372-375, 2002.
-
(2002)
Computer and Security
, vol.21
, Issue.4
, pp. 372-375
-
-
Chien, H.Y.1
Jan, J.K.2
Tseng, Y.M.3
-
4
-
-
26944497206
-
Improvement of Lee-Kim-Yoo's remote user authentication scheme using smart cards
-
Fuzzy Systems and Knowledge Discovery: Second International Conference, FSKD, Changsha, China, August 27-29, pp
-
D. Z. Sun, and Z. F. Cao, "Improvement of Lee-Kim-Yoo's remote user authentication scheme using smart cards", Fuzzy Systems and Knowledge Discovery: Second International Conference, FSKD 2005, LNAI 3614, Changsha, China, August 27-29, pp. 596-599, 2005.
-
(2005)
LNAI
, vol.3614
, pp. 596-599
-
-
Sun, D.Z.1
Cao, Z.F.2
-
5
-
-
1642578172
-
User authentication scheme using smart cards for multi-server environments
-
L. Fan, C. X. Xu, and J. H. Li, "User authentication scheme using smart cards for multi-server environments", Chinese Journal of Electronics, Vol 13, No. 1, pp. 179-181, 2004.
-
(2004)
Chinese Journal of Electronics
, vol.13
, Issue.1
, pp. 179-181
-
-
Fan, L.1
Xu, C.X.2
Li, J.H.3
-
6
-
-
1542593353
-
Authentication and authenticated key exchanges
-
W. Diffie, P. C. van Oorschot, and M. J. Wiener, "Authentication and authenticated key exchanges", Designs, Codes and Cryptography, Vol 2, No. 2, pp. 107-125, 1992.
-
(1992)
Designs, Codes and Cryptography
, vol.2
, Issue.2
, pp. 107-125
-
-
Diffie, W.1
van Oorschot, P.C.2
Wiener, M.J.3
-
7
-
-
0025386404
-
A logic of authentication
-
M. Burrows, M. Abadi, and R. Needham, "A logic of authentication", ACM Transactions on Computer Systems, Vol 8, No. 1, pp. 18-36, 1990.
-
(1990)
ACM Transactions on Computer Systems
, vol.8
, Issue.1
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
8
-
-
0025771853
-
Applying a formal analysis technique to the CCITT X.509 strong two-way authentication protocol
-
K. Gaarder, and E. Snekkenes, "Applying a formal analysis technique to the CCITT X.509 strong two-way authentication protocol", Journal of Cryptology, Vol 3, No. 2, pp. 81-98, 1991.
-
(1991)
Journal of Cryptology
, vol.3
, Issue.2
, pp. 81-98
-
-
Gaarder, K.1
Snekkenes, E.2
-
9
-
-
71849087704
-
Public-key cryptography and password protocols
-
S. Halevi, and H. Krawczyk, "Public-key cryptography and password protocols", ACM Transactions on Information and System Security, Vol 2, No. 3, pp. 230-268, 1999.
-
(1999)
ACM Transactions on Information and System Security
, vol.2
, Issue.3
, pp. 230-268
-
-
Halevi, S.1
Krawczyk, H.2
|