-
1
-
-
35048891868
-
-
Bellare, M., R. Canetti and H. Krawczyk (1996). Keying hash functions for message authentication. In N. Koblitz (Ed.), Proceedings of Advances in Cryptology - Crypto 96, Lecture Notes in Computer Science, 1109, Springer-Verlag.
-
Bellare, M., R. Canetti and H. Krawczyk (1996). Keying hash functions for message authentication. In N. Koblitz (Ed.), Proceedings of Advances in Cryptology - Crypto 96, Lecture Notes in Computer Science, 1109, Springer-Verlag.
-
-
-
-
2
-
-
0036167785
-
Cryptanalysis of timestamp-based password authentication scheme
-
Chan, C.K., and L.M. Cheng (2001). Cryptanalysis of timestamp-based password authentication scheme. Computers & Security, 21(1), 74-76.
-
(2001)
Computers & Security
, vol.21
, Issue.1
, pp. 74-76
-
-
Chan, C.K.1
Cheng, L.M.2
-
3
-
-
0345764840
-
Attacks on the (enhanced) Yang-Shieh authentication
-
Chen, K.F., and S. Zhong (2003). Attacks on the (enhanced) Yang-Shieh authentication. Computer & Security, 22(8), 725-727.
-
(2003)
Computer & Security
, vol.22
, Issue.8
, pp. 725-727
-
-
Chen, K.F.1
Zhong, S.2
-
4
-
-
0036429021
-
An enhancement of timestamp-based password authentication scheme
-
Fan, L., J.H. Li and H.W. Zhu (2002). An enhancement of timestamp-based password authentication scheme. Computers & Security, 21(7), 665-667.
-
(2002)
Computers & Security
, vol.21
, Issue.7
, pp. 665-667
-
-
Fan, L.1
Li, J.H.2
Zhu, H.W.3
-
5
-
-
23344449693
-
ID-based password authentication scheme using smart cards and fingerprints
-
Kim, H.S., S.W. Lee and K.Y. Yoo (2003). ID-based password authentication scheme using smart cards and fingerprints. ACM Operating Systems Review, 37(4), 32-41.
-
(2003)
ACM Operating Systems Review
, vol.37
, Issue.4
, pp. 32-41
-
-
Kim, H.S.1
Lee, S.W.2
Yoo, K.Y.3
-
6
-
-
0242552286
-
Security enhancement for the timestamp-based password authentication scheme using smart cards
-
Shen, J.J., C.W. Lin and M.S. Hwang (2003). Security enhancement for the timestamp-based password authentication scheme using smart cards. Computers & Security, 22(7), 591-595.
-
(2003)
Computers & Security
, vol.22
, Issue.7
, pp. 591-595
-
-
Shen, J.J.1
Lin, C.W.2
Hwang, M.S.3
-
7
-
-
4043178772
-
Further cryptanalysis of a password authentication scheme with smart cards
-
Sun, H.M., and H.T. Yeh (2003). Further cryptanalysis of a password authentication scheme with smart cards. IEICE Transactions on Communications, E86-B(4), 1412-1415.
-
(2003)
IEICE Transactions on Communications
, vol.E86-B
, Issue.4
, pp. 1412-1415
-
-
Sun, H.M.1
Yeh, H.T.2
-
8
-
-
12244291938
-
An improvement of the Yang-Shieh password authentication schemes
-
Yang, C.C., R.C. Wang and T.Y. Chang (2005). An improvement of the Yang-Shieh password authentication schemes. Applied Mathematics and Computation, 162(3), 1391-1396.
-
(2005)
Applied Mathematics and Computation
, vol.162
, Issue.3
, pp. 1391-1396
-
-
Yang, C.C.1
Wang, R.C.2
Chang, T.Y.3
-
9
-
-
0033350090
-
Password authentication schemes with smart cards
-
Yang, W.H., and S.P. Shieh (1999). Password authentication schemes with smart cards. Computers & Security, 18(8), 727-733.
-
(1999)
Computers & Security
, vol.18
, Issue.8
, pp. 727-733
-
-
Yang, W.H.1
Shieh, S.P.2
|