-
1
-
-
0001784609
-
Using smart cards to authenticate remote passwords
-
Chang C.C., and Hwang S.J. Using smart cards to authenticate remote passwords. Comput Math Appl 26 7 (1993) 19-27
-
(1993)
Comput Math Appl
, vol.26
, Issue.7
, pp. 19-27
-
-
Chang, C.C.1
Hwang, S.J.2
-
2
-
-
0028405583
-
A remote password authentication scheme based upon ElGamal's signature scheme
-
Chang C.C., and Liao W.Y. A remote password authentication scheme based upon ElGamal's signature scheme. Comput Securit 13 2 (1994) 137-144
-
(1994)
Comput Securit
, vol.13
, Issue.2
, pp. 137-144
-
-
Chang, C.C.1
Liao, W.Y.2
-
3
-
-
0002063278
-
'Paramita wisdom' password authentication scheme without verification tables
-
Jan J.K., and Chen Y.Y. 'Paramita wisdom' password authentication scheme without verification tables. J Syst Software 42 (1998) 45-57
-
(1998)
J Syst Software
, vol.42
, pp. 45-57
-
-
Jan, J.K.1
Chen, Y.Y.2
-
4
-
-
0033350090
-
Password authentication schemes with smart cards
-
Yang W.H., and Shieh S.P. Password authentication schemes with smart cards. Comput Securit 18 (1999) 727-733
-
(1999)
Comput Securit
, vol.18
, pp. 727-733
-
-
Yang, W.H.1
Shieh, S.P.2
-
5
-
-
0034140374
-
A new remote user authentication scheme using smart cards
-
Hwang M.S., and Li L.H. A new remote user authentication scheme using smart cards. IEEE Trans Consumer Electron 46 1 (2000) 28-30
-
(2000)
IEEE Trans Consumer Electron
, vol.46
, Issue.1
, pp. 28-30
-
-
Hwang, M.S.1
Li, L.H.2
-
6
-
-
0037030525
-
Fingerprint-based remote user authentication scheme using smart cards
-
Lee J.K., Ryu S.R., and Yoo K.Y. Fingerprint-based remote user authentication scheme using smart cards. Electron Lett 38 12 (2002) 554-555
-
(2002)
Electron Lett
, vol.38
, Issue.12
, pp. 554-555
-
-
Lee, J.K.1
Ryu, S.R.2
Yoo, K.Y.3
-
7
-
-
0037211327
-
A new remote user authentication scheme for multi-server architecture
-
Lin I.C., Hwang M.S., and Li L.H. A new remote user authentication scheme for multi-server architecture. Future Generat Comput Syst 19 (2003) 13-22
-
(2003)
Future Generat Comput Syst
, vol.19
, pp. 13-22
-
-
Lin, I.C.1
Hwang, M.S.2
Li, L.H.3
-
8
-
-
0033704170
-
Methods for protecting password transmission
-
Peyravian M., and Zunic N. Methods for protecting password transmission. Comput Securit 19 5 (2000) 466-469
-
(2000)
Comput Securit
, vol.19
, Issue.5
, pp. 466-469
-
-
Peyravian, M.1
Zunic, N.2
-
9
-
-
0041698517
-
A remote user authentication scheme using hash functions
-
Lee C.C., Li L.H., and Hwang M.S. A remote user authentication scheme using hash functions. ACM SIGOPS Oper Syst Rev 36 4 (2002) 23-29
-
(2002)
ACM SIGOPS Oper Syst Rev
, vol.36
, Issue.4
, pp. 23-29
-
-
Lee, C.C.1
Li, L.H.2
Hwang, M.S.3
-
10
-
-
0019634370
-
Password authentication with insecure communication
-
Lamport L. Password authentication with insecure communication. Commun ACM 24 (1981) 28-30
-
(1981)
Commun ACM
, vol.24
, pp. 28-30
-
-
Lamport, L.1
-
11
-
-
36348950570
-
-
Haller NM. The S/Key (TM) one-time password system. In: Proceedings of the Internet society symposium on network and distributed system security, 1994. p. 151-8.
-
-
-
-
12
-
-
0034204951
-
Simple and secure password authentication protocol (SAS)
-
Sandirigama M., Shimizu A., and Noda M.T. Simple and secure password authentication protocol (SAS). IEICE Trans Commun E83-B 6 (2000) 1363-1365
-
(2000)
IEICE Trans Commun
, vol.E83-B
, Issue.6
, pp. 1363-1365
-
-
Sandirigama, M.1
Shimizu, A.2
Noda, M.T.3
-
14
-
-
0036556279
-
Improvement on Peyravian-Zunic's password authentication schemes
-
Hwang J.J., and Yeh T.C. Improvement on Peyravian-Zunic's password authentication schemes. IEICE Trans Commun E85-B 4 (2002) 823-825
-
(2002)
IEICE Trans Commun
, vol.E85-B
, Issue.4
, pp. 823-825
-
-
Hwang, J.J.1
Yeh, T.C.2
-
15
-
-
0037282439
-
A password authentication scheme with secure password updating
-
Lin C.L., and Hwang T. A password authentication scheme with secure password updating. Comput Securit 22 1 (2003) 68-72
-
(2003)
Comput Securit
, vol.22
, Issue.1
, pp. 68-72
-
-
Lin, C.L.1
Hwang, T.2
-
16
-
-
0142007845
-
Security enhancement for protecting password transmission
-
Yang C.C., Chang T.Y., Li J.W., and Hwang M.S. Security enhancement for protecting password transmission. IEICE Trans Commun E86-B 7 (2003) 2178-2181
-
(2003)
IEICE Trans Commun
, vol.E86-B
, Issue.7
, pp. 2178-2181
-
-
Yang, C.C.1
Chang, T.Y.2
Li, J.W.3
Hwang, M.S.4
-
17
-
-
0142007776
-
Cryptanalysis of a variant of Peyravian-Zunic's password authentication scheme
-
Ku W.C., Chen C.M., and Lee H.L. Cryptanalysis of a variant of Peyravian-Zunic's password authentication scheme. IEICE Trans Commun E86B 5 (2003) 1682-1684
-
(2003)
IEICE Trans Commun
, vol.E86B
, Issue.5
, pp. 1682-1684
-
-
Ku, W.C.1
Chen, C.M.2
Lee, H.L.3
-
18
-
-
26044444118
-
Weakness and solution of Yang et al.'s protected password changing scheme
-
Yoon E.J., and Yoo K.Y. Weakness and solution of Yang et al.'s protected password changing scheme. Appl Math Comput 168 2 (2005) 788-794
-
(2005)
Appl Math Comput
, vol.168
, Issue.2
, pp. 788-794
-
-
Yoon, E.J.1
Yoo, K.Y.2
-
19
-
-
0141518232
-
On the security of methods for protecting password transmission
-
Tseng Y.M., Jan J.K., and Chien H.Y. On the security of methods for protecting password transmission. Informatica 12 3 (2001) 469-477
-
(2001)
Informatica
, vol.12
, Issue.3
, pp. 469-477
-
-
Tseng, Y.M.1
Jan, J.K.2
Chien, H.Y.3
-
20
-
-
0742306164
-
Security of improvement on methods for protecting password transmission
-
Yang C.C., Chang T.Y., and Hwang M.S. Security of improvement on methods for protecting password transmission. Informatica 14 4 (2003) 551-558
-
(2003)
Informatica
, vol.14
, Issue.4
, pp. 551-558
-
-
Yang, C.C.1
Chang, T.Y.2
Hwang, M.S.3
-
21
-
-
7544250474
-
Password authentication without the server public key
-
Chang Y.F., Chang C.C., and Liu Y.L. Password authentication without the server public key. IEICE Trans Commun E87-B 10 (2004) 2178-2181
-
(2004)
IEICE Trans Commun
, vol.E87-B
, Issue.10
, pp. 2178-2181
-
-
Chang, Y.F.1
Chang, C.C.2
Liu, Y.L.3
-
22
-
-
33645790506
-
A secure user authentication scheme using hash functions
-
Yoon E.J., Ryu E.K., and Yoo K.Y. A secure user authentication scheme using hash functions. ACM SIGOPS Oper Syst Rev 38 2 (2004) 62-68
-
(2004)
ACM SIGOPS Oper Syst Rev
, vol.38
, Issue.2
, pp. 62-68
-
-
Yoon, E.J.1
Ryu, E.K.2
Yoo, K.Y.3
-
23
-
-
7644232640
-
Weaknesses of Lee-Li-Hwang's hash-based password authentication scheme
-
Ku W.C., Chen C.M., and Lee H.L. Weaknesses of Lee-Li-Hwang's hash-based password authentication scheme. ACM SIGOPS Oper Syst Rev 37 4 (2003) 19-25
-
(2003)
ACM SIGOPS Oper Syst Rev
, vol.37
, Issue.4
, pp. 19-25
-
-
Ku, W.C.1
Chen, C.M.2
Lee, H.L.3
-
24
-
-
33646469746
-
Weaknesses of Yoon-Ryu-Yoo's hash-based password authentication scheme
-
Ku W.C., Chiang M.H., and Chang S.T. Weaknesses of Yoon-Ryu-Yoo's hash-based password authentication scheme. ACM SIGOPS Oper Syst Rev 39 1 (2005) 85-89
-
(2005)
ACM SIGOPS Oper Syst Rev
, vol.39
, Issue.1
, pp. 85-89
-
-
Ku, W.C.1
Chiang, M.H.2
Chang, S.T.3
|