-
1
-
-
84945119254
-
Entity authentication and key distribution
-
Springer p. 232-49
-
Bellare M., and Rogaway P. Entity authentication and key distribution. Crypto'93, LNCS 773 (1995), Springer p. 232-49
-
(1995)
Crypto'93, LNCS 773
-
-
Bellare, M.1
Rogaway, P.2
-
2
-
-
84873466407
-
Authenticated key exchange secure against dictionary attacks
-
Springer p. 139-55
-
Bellare M., Pointcheval D., and Rogaway P. Authenticated key exchange secure against dictionary attacks. Eurocrypt 2000, LNCS 1807 (2000), Springer p. 139-55
-
(2000)
Eurocrypt 2000, LNCS 1807
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
4
-
-
34548839108
-
Improved ID-based security framework for ad hoc network
-
Chien H.-Y., and Lin R.-Y. Improved ID-based security framework for ad hoc network. Ad Hoc Networks 6 1 (2008) 47-60
-
(2008)
Ad Hoc Networks
, vol.6
, Issue.1
, pp. 47-60
-
-
Chien, H.-Y.1
Lin, R.-Y.2
-
5
-
-
33744462119
-
-
Chien H-Y, Chen C-H. A remote authentication scheme preserving user anonymity. In: The IEEE first international workshop on information networking and applications-INA'2005. 2005. p. 245-8, ISBN 0-7695-2249-1.
-
Chien H-Y, Chen C-H. A remote authentication scheme preserving user anonymity. In: The IEEE first international workshop on information networking and applications-INA'2005. 2005. p. 245-8, ISBN 0-7695-2249-1.
-
-
-
-
6
-
-
85043791322
-
An identity-based identification scheme based on discrete logarithms modulo a composite number
-
Springer-Verlag p. 481-6
-
Girault M. An identity-based identification scheme based on discrete logarithms modulo a composite number. EUROCRYPT'90 (1991), Springer-Verlag p. 481-6
-
(1991)
EUROCRYPT'90
-
-
Girault, M.1
-
7
-
-
3342939443
-
An efficient user identification scheme based on ID-based cryptosystem
-
Hwang M.S., Lo J.W., and Lin S.C. An efficient user identification scheme based on ID-based cryptosystem. Computer Standards and Interfaces 26 6 (2004) 565-569
-
(2004)
Computer Standards and Interfaces
, vol.26
, Issue.6
, pp. 565-569
-
-
Hwang, M.S.1
Lo, J.W.2
Lin, S.C.3
-
8
-
-
0034225062
-
User identification and key distribution maintaining anonymity for distributed computer network
-
Lee W.B., and Chang C.C. User identification and key distribution maintaining anonymity for distributed computer network. Computer System Science 15 4 (2000) 113-116
-
(2000)
Computer System Science
, vol.15
, Issue.4
, pp. 113-116
-
-
Lee, W.B.1
Chang, C.C.2
-
9
-
-
3042551124
-
-
Tseng YM, Jan JK. ID-based cryptographic schemes using a non-interactive public-key distribution system. In: Proceedings of IEEE ACSAC98, Phoenix, Arizona. 1998. p. 237-43.
-
Tseng YM, Jan JK. ID-based cryptographic schemes using a non-interactive public-key distribution system. In: Proceedings of IEEE ACSAC98, Phoenix, Arizona. 1998. p. 237-43.
-
-
-
-
10
-
-
10644225185
-
New efficient user identification and key distribution scheme providing enhanced security
-
Yang Y., Wang S., Bao F., Wang J., and Deng R.H. New efficient user identification and key distribution scheme providing enhanced security. Computers and Security 23 8 (2004) 697-704
-
(2004)
Computers and Security
, vol.23
, Issue.8
, pp. 697-704
-
-
Yang, Y.1
Wang, S.2
Bao, F.3
Wang, J.4
Deng, R.H.5
-
12
-
-
34248678132
-
A secure anonymous routing protocol with authenticated key exchange for ad hoc networks
-
Lu R., Cao Z., Wang L., and Sun C. A secure anonymous routing protocol with authenticated key exchange for ad hoc networks. Computer Standards and Interfaces 29 (2007) 521-527
-
(2007)
Computer Standards and Interfaces
, vol.29
, pp. 521-527
-
-
Lu, R.1
Cao, Z.2
Wang, L.3
Sun, C.4
-
13
-
-
0002805220
-
Undetectable on-line password guessing attacks
-
Ding Y., and Horster P. Undetectable on-line password guessing attacks. ACM Operating Systems Review 29 (Apr 1995) 77-86
-
(1995)
ACM Operating Systems Review
, vol.29
, pp. 77-86
-
-
Ding, Y.1
Horster, P.2
-
14
-
-
0032218224
-
-
Halevi S, Krawczyk H. Public-key cryptography and password protocols. In: Proceedings of the 5th ACM conference on computer and communications security, San Francisco, USA. 1998. p. 122-31.
-
Halevi S, Krawczyk H. Public-key cryptography and password protocols. In: Proceedings of the 5th ACM conference on computer and communications security, San Francisco, USA. 1998. p. 122-31.
-
-
-
-
15
-
-
12844274508
-
Note on robust and simple authentication protocol
-
Chien H.Y., Wang R.C., and Yang C.C. Note on robust and simple authentication protocol. The Computer Journal 48 1 (2005) 27-29
-
(2005)
The Computer Journal
, vol.48
, Issue.1
, pp. 27-29
-
-
Chien, H.Y.1
Wang, R.C.2
Yang, C.C.3
|