-
1
-
-
0019634370
-
Password Authentication with Insecure Communication
-
L. Lamport. Password Authentication with Insecure Communication. Communications of the ACM, 24(11), pp.770-772, 1981.
-
(1981)
Communications of the ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
4
-
-
0032137355
-
A Password Authentication Methods for Contents Communication on the Internet
-
A. Shimizu, T. Horioka and H. Inagaki. A Password Authentication Methods for Contents Communication on the Internet. IEICE Transactions on Communications, E81-B(8), pp.1666-1673, 1998.
-
(1998)
IEICE Transactions on Communications
, vol.E81-B
, Issue.8
, pp. 1666-1673
-
-
Shimizu, A.1
Horioka, T.2
Inagaki, H.3
-
5
-
-
0033704170
-
Methods for Protecting Password Transmission
-
M. Peyravian and N. Zunic. Methods for Protecting Password Transmission. Computers & Security, 19(5), pp.466-469, 2000.
-
(2000)
Computers & Security
, vol.19
, Issue.5
, pp. 466-469
-
-
Peyravian, M.1
Zunic, N.2
-
6
-
-
0036556279
-
Improvement on Peyravian-Zunic's Password Authentication Schemes
-
J. J. Hwang and T. C. Yeh. Improvement on Peyravian-Zunic's Password Authentication Schemes. IEICE Transactions on Communications, E85-B(4), pp.823-825, 2002.
-
(2002)
IEICE Transactions on Communications
, vol.E85-B
, Issue.4
, pp. 823-825
-
-
Hwang, J.J.1
Yeh, T.C.2
-
7
-
-
4043122631
-
A Dynamic ID-based Remote User Authentication Scheme
-
M. L. Das, A. Saxena and V. P. Gulati. A Dynamic ID-based Remote User Authentication Scheme. IEEE Transactions on Consumer Electronics, 50(2), pp.629-631, 2004.
-
(2004)
IEEE Transactions on Consumer Electronics
, vol.50
, Issue.2
, pp. 629-631
-
-
Das, M.L.1
Saxena, A.2
Gulati, V.P.3
-
9
-
-
44049095283
-
Draft D12. Standard Specifications for Password-based Public Key Cryptographic Techniques. IEEE P1363 working group,
-
IEEE P1363.2
-
IEEE P1363.2 Draft D12. Standard Specifications for Password-based Public Key Cryptographic Techniques. IEEE P1363 working group, 2003.
-
(2003)
-
-
-
10
-
-
0028405583
-
A Remote Password Authentication Scheme Based Upon ElGamal's Signature Scheme
-
C. C. Chang and W. Y. Liao. A Remote Password Authentication Scheme Based Upon ElGamal's Signature Scheme. Computers & Security, 13(2), pp.137-144, 1994.
-
(1994)
Computers & Security
, vol.13
, Issue.2
, pp. 137-144
-
-
Chang, C.C.1
Liao, W.Y.2
-
11
-
-
44049102124
-
Dynamic Remote User Authentication
-
India, pp
-
A. Saxena, M. L. Das, V. P. Gulati and D. B. Phatak. Dynamic Remote User Authentication. In: Proceedings of International Conference on Advanced Computing and Communications (ADCOM'04), India, pp.313-315, 2004.
-
(2004)
Proceedings of International Conference on Advanced Computing and Communications (ADCOM'04)
, pp. 313-315
-
-
Saxena, A.1
Das, M.L.2
Gulati, V.P.3
Phatak, D.B.4
-
12
-
-
62949179479
-
-
RSA SecureID. Secure Identity. http://www.rsa.com/node.aspx?id=1156.
-
Secure Identity
-
-
-
13
-
-
0034140374
-
A new Remote User Authentication Scheme Using Smart Cards
-
M. S. Hwang and L. H. Li. A new Remote User Authentication Scheme Using Smart Cards. IEEE Transactions on Consumer Electronics, 46(1), pp.28-30, 2000.
-
(2000)
IEEE Transactions on Consumer Electronics
, vol.46
, Issue.1
, pp. 28-30
-
-
Hwang, M.S.1
Li, L.H.2
-
14
-
-
0142007144
-
A User Friendly Remote Authentication Scheme with Smart Cards
-
S T. Wu, B. C. Chieu. A User Friendly Remote Authentication Scheme with Smart Cards. Computers & Security, 22(6), pp.547-550, 2003.
-
(2003)
Computers & Security
, vol.22
, Issue.6
, pp. 547-550
-
-
Wu, S.T.1
Chieu, B.C.2
-
15
-
-
33744776672
-
-
M. L. Das, A. Saxena, V. P. Gulati and D. B. Phatak. A Novel Remote User Authentication Scheme using Bilinear Pairings. Computers & Security, 25(3), pp.184-189, 2006.
-
M. L. Das, A. Saxena, V. P. Gulati and D. B. Phatak. A Novel Remote User Authentication Scheme using Bilinear Pairings. Computers & Security, 25(3), pp.184-189, 2006.
-
-
-
-
19
-
-
84939573910
-
Differential Power Analysis: Leaking Secrets
-
Proceedings of Advances in Cryptology-CRYPTO'99, Springer-Verlag, pp
-
P. C. Kocher, J. Jaffe and B. Jun. Differential Power Analysis: Leaking Secrets. In: Proceedings of Advances in Cryptology-CRYPTO'99, LNCS 1666, Springer-Verlag, pp.388-397, 1999.
-
(1666)
LNCS
, pp. 388-397
-
-
Kocher, P.C.1
Jaffe, J.2
Jun, B.3
|