-
1
-
-
0037285263
-
Stolen-verifier attack on two new strong-password Authentication Protocols
-
C.M. Chen and W. C. Ku, "Stolen-verifier attack on two new strong-password Authentication Protocols," IEICE Trans. Commun., Vol.E85-B, No.11, pp. 2519-2521, 2002.
-
(2002)
IEICE Trans. Commun
, vol.E85-B
, Issue.11
, pp. 2519-2521
-
-
Chen, C.M.1
Ku, W.C.2
-
2
-
-
0037230409
-
Robust and simple authentication protocol
-
H. Y. Chien and J. K. Jan, "Robust and simple authentication protocol," Comput. Journal, Vol. 46, No.2, pp.193-201, 2003.
-
(2003)
Comput. Journal
, vol.46
, Issue.2
, pp. 193-201
-
-
Chien, H.Y.1
Jan, J.K.2
-
4
-
-
0032115203
-
Efficient and secure password-based authentication protocols against guessing attack
-
T. Kwon and J. Song, "Efficient and secure password-based authentication protocols against guessing attack," Computer Communications, Vol. 21, pp. 853-861, 1998.
-
(1998)
Computer Communications
, vol.21
, pp. 853-861
-
-
Kwon, T.1
Song, J.2
-
5
-
-
0019634370
-
Password authentication with insecure communication
-
L. Lamport, "Password authentication with insecure communication," Communications of ACM, Vol. 24, pp. 770-772, 1981.
-
(1981)
Communications of ACM
, vol.24
, pp. 770-772
-
-
Lamport, L.1
-
6
-
-
0035445093
-
Attacks and solutions on strong- password authentication
-
C. Lin, H. Sun, and T. Hwang, "Attacks and solutions on strong- password authentication," IEICE Trans. Commun., Vol.E84-B, No.9, pp. 2622-2627, 2001.
-
(2001)
IEICE Trans. Commun
, vol.E84-B
, Issue.9
, pp. 2622-2627
-
-
Lin, C.1
Sun, H.2
Hwang, T.3
-
7
-
-
0034204951
-
Simple and secure password authentication protocol (SAS)
-
M. Sandirigama, A. Shimizu, and M. T. Noda, "Simple and secure password authentication protocol (SAS)," IEICE Trans. Commun., Vol.E83-B, No.6, pp. 1363-1365, 2000.
-
(2000)
IEICE Trans. Commun
, vol.E83-B
, Issue.6
, pp. 1363-1365
-
-
Sandirigama, M.1
Shimizu, A.2
Noda, M.T.3
-
8
-
-
0025840878
-
A dynamic password authentication method by one-way function
-
July
-
A. Shimizu, "A dynamic password authentication method by one-way function," System. Comput. Jpn., Vol.22, No.7, pp.32-40, July 1991.
-
(1991)
System. Comput. Jpn
, vol.22
, Issue.7
, pp. 32-40
-
-
Shimizu, A.1
-
9
-
-
0032137355
-
-
A. Shimizu, T. Horioka, and H. Inagaki, A password authentication method for contents communication on the Internet, IEICE Trans. Commun., E8I-B, No.8, pp. 1666-1673, 1998.
-
A. Shimizu, T. Horioka, and H. Inagaki, "A password authentication method for contents communication on the Internet," IEICE Trans. Commun., Vol.E8I-B, No.8, pp. 1666-1673, 1998.
-
-
-
-
10
-
-
0141938442
-
An impersonation attack on one-time password authentication protocol OSPA
-
T. Tsuji and A. Shimizu, "An impersonation attack on one-time password authentication protocol OSPA," IEICE Trans. Commun., Vol.E86-B, No.7, pp. 2182-2185, 2003.
-
(2003)
IEICE Trans. Commun
, vol.E86-B
, Issue.7
, pp. 2182-2185
-
-
Tsuji, T.1
Shimizu, A.2
-
11
-
-
1642336780
-
One-time password authentication protocol against theft attacks
-
T. Tsuji and A. Shimizu, "One-time password authentication protocol against theft attacks," IEICE Trans. Commun., Vol.E87-B, No.3, pp. 523-529, 2004.
-
(2004)
IEICE Trans. Commun
, vol.E87-B
, Issue.3
, pp. 523-529
-
-
Tsuji, T.1
Shimizu, A.2
-
12
-
-
0029710130
-
Smart card based secure password authentication scheme
-
S.J. Wang, and Jin-Fu Chang, "Smart card based secure password authentication scheme," Computers & Security, Vol.15, No.3, pp. 231-237, 1996.
-
(1996)
Computers & Security
, vol.15
, Issue.3
, pp. 231-237
-
-
Wang, S.J.1
Chang, J.2
-
13
-
-
0003256983
-
Shared authentication token secure against replay and weak key attacks
-
S. M. Yen and K. U. Liao, "Shared authentication token secure against replay and weak key attacks," Information Processing Letters, Vol.62, pp.77-80, 1997.
-
(1997)
Information Processing Letters
, vol.62
, pp. 77-80
-
-
Yen, S.M.1
Liao, K.U.2
-
14
-
-
0033350090
-
Password authentication schemes with smart card
-
W. H. Yang, and S. P. Shieh, "Password authentication schemes with smart card," Computer & Security, Vol.18, No.8, pp.727-733, 1999.
-
(1999)
Computer & Security
, vol.18
, Issue.8
, pp. 727-733
-
-
Yang, W.H.1
Shieh, S.P.2
|