-
1
-
-
4043122631
-
A dynamic id-based remote user authentication scheme
-
May
-
M. L. Das, A. Saxena, and V. P. Gulati, "A dynamic id-based remote user authentication scheme," IEEE Transactions on Consumer Electronics, vol. 50, no. 2, May 2004, pp. 629-631.
-
(2004)
IEEE Transactions on Consumer Electronics
, vol.50
, Issue.2
, pp. 629-631
-
-
Das, M.L.1
Saxena, A.2
Gulati, V.P.3
-
2
-
-
33751197641
-
Comment on a dynamic id-based remote user authentication scheme
-
Aug
-
A. Awasthi, "Comment on a dynamic id-based remote user authentication scheme," Transactions on Cryptology, vol. 1, no. 2, Aug. 2004, pp. 15-17.
-
(2004)
Transactions on Cryptology
, vol.1
, Issue.2
, pp. 15-17
-
-
Awasthi, A.1
-
3
-
-
33845399962
-
Security enhancement for a dynamic id-based remote user authentication scheme
-
Aug
-
I. E. Liao, C. C. Lee, and M. S. Hwang, "Security enhancement for a dynamic id-based remote user authentication scheme," In Proceedings of the IEEE International Conference on Next Generation Web Services Practices (NWeSP 2005), Aug. 2005, pp. 22-26.
-
(2005)
Proceedings of the IEEE International Conference on Next Generation Web Services Practices (NWeSP 2005)
, pp. 22-26
-
-
Liao, I.E.1
Lee, C.C.2
Hwang, M.S.3
-
4
-
-
33744463927
-
-
C. Y. Lee, C. H. Lin, and C. C. Chang, An improved low computation cost user authentication scheme for mobile communication, In Proceedings of the IEEE International Conference on Advanced Information Networking and Applications (AINA 2005), 2, Mar. 2005, pp. 249-252.
-
C. Y. Lee, C. H. Lin, and C. C. Chang, "An improved low computation cost user authentication scheme for mobile communication," In Proceedings of the IEEE International Conference on Advanced Information Networking and Applications (AINA 2005), vol. 2, Mar. 2005, pp. 249-252.
-
-
-
-
5
-
-
0041698517
-
A remote user authentication scheme using hash functions
-
Oct
-
C. C. Lee, L. H. Li, and M. S. Hwang, "A remote user authentication scheme using hash functions," ACMSIGOPS Operating Systems Review, vol. 36, no. 4, Oct. 2002, pp. 23-29.
-
(2002)
ACMSIGOPS Operating Systems Review
, vol.36
, Issue.4
, pp. 23-29
-
-
Lee, C.C.1
Li, L.H.2
Hwang, M.S.3
-
6
-
-
0042196051
-
A modified remote user authentication scheme using smart cards
-
May
-
J. J. Shen, C. W. Lin, and M. S. Hwang, "A modified remote user authentication scheme using smart cards," IEEE Transactions on Consumer Electronics, vol. 49, no. 2, May 2003, pp. 414-416.
-
(2003)
IEEE Transactions on Consumer Electronics
, vol.49
, Issue.2
, pp. 414-416
-
-
Shen, J.J.1
Lin, C.W.2
Hwang, M.S.3
-
7
-
-
1542542636
-
Cryptanalysis of a modified remote user authentication scheme using smart cards
-
Nov
-
K. C. Leung, L. M. Cheng, A. S. Fong, and C. K. Chan, "Cryptanalysis of a modified remote user authentication scheme using smart cards," IEEE Transactions on Consumer Electronics, vol. 49, no. 4, Nov. 2003, pp. 1243-1245.
-
(2003)
IEEE Transactions on Consumer Electronics
, vol.49
, Issue.4
, pp. 1243-1245
-
-
Leung, K.C.1
Cheng, L.M.2
Fong, A.S.3
Chan, C.K.4
-
9
-
-
39349110195
-
-
Z. Benenson, F. Gartner, and D. Kesdogan, User authentication in sensor networks (extended abstract), In Proceedings of Informatik 2004, Workshop on Sensor Networks, Sept. 2004.
-
Z. Benenson, F. Gartner, and D. Kesdogan, "User authentication in sensor networks (extended abstract)," In Proceedings of Informatik 2004, Workshop on Sensor Networks, Sept. 2004.
-
-
-
-
10
-
-
33845458336
-
-
K. H. M. Wong, Y. Zheng, J. Cao, and S. Wang, A dynamic user authentication scheme for wireless sensor networks, In Proceedings of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC '06), 1, Jun. 2006, pp. 244-251.
-
K. H. M. Wong, Y. Zheng, J. Cao, and S. Wang, "A dynamic user authentication scheme for wireless sensor networks," In Proceedings of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC '06), vol. 1, Jun. 2006, pp. 244-251.
-
-
-
|