-
2
-
-
0025386404
-
A logic of authentication
-
M. Burrows, M. Abadi and R. Needham, "A logic of authentication," ACM Trans. on Computer Systems, Vol. 8, No. 1, pp. 18-36, 1990.
-
(1990)
ACM Trans. on Computer Systems
, vol.8
, Issue.1
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
3
-
-
0036302680
-
An efficient and practical solution to remote authentication: Smart card
-
H. Chien, J. Jan, and Y. Tseng, "An efficient and practical solution to remote authentication: smart card," Computers and Security, Vol. 21, No. 4, pp. 372-375, 2002.
-
(2002)
Computers and Security
, vol.21
, Issue.4
, pp. 372-375
-
-
Chien, H.1
Jan, J.2
Tseng, Y.3
-
4
-
-
84870707379
-
A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack
-
Springer, New York
-
R. Cramer and V. Shoup, "A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack," Advances in Cryptology-Crypt'98, pp. 13-25, Springer, New York, 1998.
-
(1998)
Advances in Cryptology-Crypt'98
, pp. 13-25
-
-
Cramer, R.1
Shoup, V.2
-
5
-
-
0017018484
-
New directions in cryptography
-
W. Diffie and M. Hellman, "New directions in cryptography," IEEE Transactions on Information Theory, Vol. IT-22, No. 6, pp. 644-654, 1976.
-
(1976)
IEEE Transactions on Information Theory
, vol.IT-22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.2
-
6
-
-
0002805220
-
Undetectable on-line password guessing attacks
-
Y. Ding and P. Horster, "Undetectable on-line password guessing attacks," ACM Operating System Rev., Vol. 29, No. 4, pp. 77-86, 1995.
-
(1995)
ACM Operating System Rev.
, vol.29
, Issue.4
, pp. 77-86
-
-
Ding, Y.1
Horster, P.2
-
7
-
-
0034140374
-
A new remote user authentication scheme using smart cards
-
M. Hwang and L. Li, "A new remote user authentication scheme using smart cards," IEEE Trans. on Consumer Electronics, Vol. 46, No. 1, pp. 28-30, 2000.
-
(2000)
IEEE Trans. on Consumer Electronics
, vol.46
, Issue.1
, pp. 28-30
-
-
Hwang, M.1
Li, L.2
-
8
-
-
0000873739
-
Reparable key distribution protocols for internet environments
-
T. Hwang and W. Ku, "Reparable key distribution protocols for internet environments," IEEE Trans. On Communications, Vol. 43, No. 5, pp. 1947-1950, 1995.
-
(1995)
IEEE Trans. On Communications
, vol.43
, Issue.5
, pp. 1947-1950
-
-
Hwang, T.1
Ku, W.2
-
9
-
-
1542335451
-
Efficient password authenticated key agreement using smart cards
-
W. Juang, "Efficient password authenticated key agreement using smart cards," Computers and Security, Vol. 23, No. 2, pp. 167-173, 2004.
-
(2004)
Computers and Security
, vol.23
, Issue.2
, pp. 167-173
-
-
Juang, W.1
-
10
-
-
1942455353
-
Efficient multi-server password authenticated key agreement using smart cards
-
W. Juang, "Efficient multi-server password authenticated key agreement using smart cards," IEEE Trans. on Consumer Electronics, Vol. 50, No. 1, pp. 251-255, 2004.
-
(2004)
IEEE Trans. on Consumer Electronics
, vol.50
, Issue.1
, pp. 251-255
-
-
Juang, W.1
-
11
-
-
1942423677
-
Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards
-
W. Ku and S. Chen, "Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards," IEEE Trans on Consumer Electronics, Vol. 50, No. 1, pp. 204-207, 2004.
-
(2004)
IEEE Trans on Consumer Electronics
, vol.50
, Issue.1
, pp. 204-207
-
-
Ku, W.1
Chen, S.2
-
12
-
-
0008145442
-
Three-party encrypted key exchange: Attacks and a solution
-
C. Lin, H. Sun and T. Hwang, "Three-party encrypted key exchange: attacks and a solution," ACM Operating System Rev., Vol. 34, No. 4, pp. 12-20, 2000.
-
(2000)
ACM Operating System Rev.
, vol.34
, Issue.4
, pp. 12-20
-
-
Lin, C.1
Sun, H.2
Hwang, T.3
-
13
-
-
0035701459
-
Three-party encrypted key exchange without server public-keys
-
C. Lin, H. Sun, M. Steiner and T. Hwang, "Three-party encrypted key exchange without server public-keys," IEEE Communications Letters, Vol. 5, No. 12, pp. 497-499, 2001.
-
(2001)
IEEE Communications Letters
, vol.5
, Issue.12
, pp. 497-499
-
-
Lin, C.1
Sun, H.2
Steiner, M.3
Hwang, T.4
-
14
-
-
0031998958
-
Using smart cards in electronic commerce
-
D. Mcelroy and E. Turban, "Using smart cards in electronic commerce," International Journal of Information Management, Vol. 18, No. 1, pp. 61-72, 1998.
-
(1998)
International Journal of Information Management
, vol.18
, Issue.1
, pp. 61-72
-
-
Mcelroy, D.1
Turban, E.2
-
15
-
-
84937461306
-
One way hash functions and DES
-
Brassard, G. (ed.), Lecture Notes in Computer Science Springer, New York
-
R. Merkle, "One way hash functions and DES," In Brassard, G. (ed.), Advances in Cryptology-Crypt'89, Lecture Notes in Computer Science, 435, pp. 428-446, Springer, New York, 1989.
-
(1989)
Advances in Cryptology-Crypt'89
, vol.435
, pp. 428-446
-
-
Merkle, R.1
-
16
-
-
0003629990
-
-
NIST FIPS PUB 180, National Institute of Standards and Technology, U. S. Department of Commerce, DRAFT
-
NIST FIPS PUB 180, "Secure Hash Standard," National Institute of Standards and Technology, U. S. Department of Commerce, DRAFT, 1993.
-
(1993)
Secure Hash Standard
-
-
-
17
-
-
0037542969
-
-
NIST FIPS PUB 197 National Institute of Standards and Technology, U. S. Department of Commerce
-
NIST FIPS PUB 197, "Announcing the Advanced Encryption Standard(AES)," National Institute of Standards and Technology, U. S. Department of Commerce, 2001.
-
(2001)
Announcing the Advanced Encryption Standard(AES)
-
-
-
18
-
-
0017930809
-
A Method for obtaining digital signatures and public key cryptosystems
-
R. Rivest, A. Shamir and L. Adleman, "A Method for obtaining digital signatures and public key cryptosystems," Comm. of ACM, Vol. 21, No. 2, pp. 120-126, 1978.
-
(1978)
Comm. of ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
19
-
-
0003602325
-
-
RFC 1321, Internet Activities Board, Internet Privacy Task Force
-
R. Rivest, "The MD5 message-digest algorithm," RFC 1321, Internet Activities Board, Internet Privacy Task Force, 1992.
-
(1992)
The MD5 Message-Digest Algorithm
-
-
Rivest, R.1
-
21
-
-
0002839106
-
Refinement and extension of encrypted key exchange
-
M. Steiner, G. Tsudik and M. Waidner, "Refinement and extension of encrypted key exchange," ACM Operating System Rev., Vol. 29, No. 3, pp. 22-30, 1995.
-
(1995)
ACM Operating System Rev.
, vol.29
, Issue.3
, pp. 22-30
-
-
Steiner, M.1
Tsudik, G.2
Waidner, M.3
-
22
-
-
85016441190
-
Secure password-based cipher suite for TLS
-
M. Steiner, P. Buhler, T. Eirich and M. Waidner, "Secure password-based cipher suite for TLS," ACM Trans. Information and System Security, Vol. 4, No. 2, 2001.
-
(2001)
ACM Trans. Information and System Security
, vol.4
, Issue.2
-
-
Steiner, M.1
Buhler, P.2
Eirich, T.3
Waidner, M.4
-
23
-
-
0034318245
-
An efficient remote user authentication scheme using smart cards
-
H. Sun, "An efficient remote user authentication scheme using smart cards," IEEE Trans on Consumer Electronics, Vol. 46, No. 4, pp. 958-961, 2000.
-
(2000)
IEEE Trans on Consumer Electronics
, vol.46
, Issue.4
, pp. 958-961
-
-
Sun, H.1
|