-
1
-
-
58149094171
-
-
Anti-Phishing Working Group (http://www.antiphishing.org).
-
Group
-
-
-
2
-
-
0027617333
-
Systematic design of a family of attack-resistant authentication protocols
-
R. Bird, I. Gopal, A. Herzberg, P. A. Janson, S. Kutten, R. Molva, and M. Yung. Systematic design of a family of attack-resistant authentication protocols. IEEE Journal on Selected Areas in Communications, 11(5):679-693, 1993.
-
(1993)
IEEE Journal on Selected Areas in Communications
, vol.11
, Issue.5
, pp. 679-693
-
-
Bird, R.1
Gopal, I.2
Herzberg, A.3
Janson, P.A.4
Kutten, S.5
Molva, R.6
Yung, M.7
-
4
-
-
38049131767
-
A novel key agreement scheme in a multiple server environment
-
7th International Workshop, Workshop on Information Security Applications WISA 2006
-
C.-C. Chang and C.-C. Wu. A novel key agreement scheme in a multiple server environment. 7th International Workshop, Workshop on Information Security Applications (WISA 2006), LNCS, 4298:187-197, 2007.
-
(2007)
LNCS
, vol.4298
, pp. 187-197
-
-
Chang, C.-C.1
Wu, C.-C.2
-
6
-
-
0036302680
-
An efficient and practical solution to remote authentication: Smart card
-
H.-Y. Chien, J.-K. Jan, and Y.-M. Tseng. An efficient and practical solution to remote authentication: smart card. Computers & Security, 21(4):372-375, 2002.
-
(2002)
Computers & Security
, vol.21
, Issue.4
, pp. 372-375
-
-
Chien, H.-Y.1
Jan, J.-K.2
Tseng, Y.-M.3
-
8
-
-
1542593353
-
Authentication and authenticated key exchange
-
W. Diffie, P. C. van Oorschot, and M. J. Wiener. Authentication and authenticated key exchange. Designs, Codes and Cryptography, 2(2): 107-125, 1992.
-
(1992)
Designs, Codes and Cryptography
, vol.2
, Issue.2
, pp. 107-125
-
-
Diffie, W.1
van Oorschot, P.C.2
Wiener, M.J.3
-
9
-
-
0742268499
-
-
C.-L. Hsu. Security of chien et al.'s remote user authentication scheme using smart cards. Computer Standards & Interfaces, 26(3):167-169, 2004.
-
C.-L. Hsu. Security of chien et al.'s remote user authentication scheme using smart cards. Computer Standards & Interfaces, 26(3):167-169, 2004.
-
-
-
-
10
-
-
0742268499
-
-
M.-S. Hwang and L.-H. Li. Security of chien et al.'s remote user authentication scheme using smart cards. Computer Standards & Interfaces, 26(3):167-169, 2004.
-
M.-S. Hwang and L.-H. Li. Security of chien et al.'s remote user authentication scheme using smart cards. Computer Standards & Interfaces, 26(3):167-169, 2004.
-
-
-
-
11
-
-
58149084708
-
-
M.-S. Hwang, L.-H. Li, and Y.-L. Tang. A simple remote user authentication
-
M.-S. Hwang, L.-H. Li, and Y.-L. Tang. A simple remote user authentication.
-
-
-
-
12
-
-
33746019294
-
An extension of secure group communication using key graph
-
Z. Jun, Z. Yu, M. Fanyuan, G. Dawu, and B. Yingcai. An extension of secure group communication using key graph. Information Sciences, 176(20):3060-3078, 2006.
-
(2006)
Information Sciences
, vol.176
, Issue.20
, pp. 3060-3078
-
-
Jun, Z.1
Yu, Z.2
Fanyuan, M.3
Dawu, G.4
Yingcai, B.5
-
13
-
-
35248878854
-
Scalable protocols for authenticated group key exchange
-
Proceedings of Advances in Cryptology CRYPTO 2003
-
J. Katz and M. Yung. Scalable protocols for authenticated group key exchange. Proceedings of Advances in Cryptology (CRYPTO 2003), LNCS, 2729(20):110-125, 2003.
-
(2003)
LNCS
, vol.2729
, Issue.20
, pp. 110-125
-
-
Katz, J.1
Yung, M.2
-
15
-
-
26044463804
-
Weaknesses of a remote user authentication scheme using smart cards for multi-server architecture
-
E88-B(8):3451-3454
-
W.-C. Ku, S.-T. Chang, and M.-H. Chiang. Weaknesses of a remote user authentication scheme using smart cards for multi-server architecture. IEICE Trans. on Commmunications, E88-B(8):3451-3454, 2005.
-
(2005)
IEICE Trans. on Commmunications
-
-
Ku, W.-C.1
Chang, S.-T.2
Chiang, M.-H.3
-
16
-
-
0019634370
-
Password authentication with insecure communication
-
L. Lamport. Password authentication with insecure communication. Communications of the ACM, 24(11):770-772, 1981.
-
(1981)
Communications of the ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
17
-
-
0035506864
-
A remote password authentication scheme for multi-server architecture using neural networks
-
L.-H. Li, I.-C. Lin, and M.-S. Hwang. A remote password authentication scheme for multi-server architecture using neural networks. IEEE Trans. on Neural Networks, 12(6), 2001.
-
(2001)
IEEE Trans. on Neural Networks
, vol.12
, Issue.6
-
-
Li, L.-H.1
Lin, I.-C.2
Hwang, M.-S.3
-
18
-
-
0037211327
-
A new remote user authentication scheme for multi-server internet environments
-
I.-C. Lin, M.-S. Hwang, and L.-H. Li. A new remote user authentication scheme for multi-server internet environments. Future Generation Computer System, 19:13-22, 2003.
-
(2003)
Future Generation Computer System
, vol.19
, pp. 13-22
-
-
Lin, I.-C.1
Hwang, M.-S.2
Li, L.-H.3
-
20
-
-
28144456308
-
An attack on the needham-schroeder public-key authentication protocol
-
G. Lowe. An attack on the needham-schroeder public-key authentication protocol. Information Processing Letters, 56(3):131-133, 1995.
-
(1995)
Information Processing Letters
, vol.56
, Issue.3
, pp. 131-133
-
-
Lowe, G.1
-
21
-
-
0036566408
-
Examining smart card security under the threat of power analysis attacks
-
T.-S. Messerges, E.-A. Dabbish, and R.-H. Sloan. Examining smart card security under the threat of power analysis attacks. IEEE Trans. on Computers, 51(5):541-552, 2002.
-
(2002)
IEEE Trans. on Computers
, vol.51
, Issue.5
, pp. 541-552
-
-
Messerges, T.-S.1
Dabbish, E.-A.2
Sloan, R.-H.3
-
22
-
-
33845941453
-
Security weakness in a three-party pairing-based protocol for password authenticated key exchange
-
J. Nam, Y. Lee, S. Kim, and D. Won. Security weakness in a three-party pairing-based protocol for password authenticated key exchange. Information Sciences, 177(6): 1364-1375, 2007.
-
(2007)
Information Sciences
, vol.177
, Issue.6
, pp. 1364-1375
-
-
Nam, J.1
Lee, Y.2
Kim, S.3
Won, D.4
-
23
-
-
33751229614
-
Cryptanalysis of tripartite and multi-party authenticated key agreement protocols
-
K.-A. Shim and S. Woo. Cryptanalysis of tripartite and multi-party authenticated key agreement protocols. Information Sciences, 177(4): 1143-1151, 2007.
-
(2007)
Information Sciences
, vol.177
, Issue.4
, pp. 1143-1151
-
-
Shim, K.-A.1
Woo, S.2
-
24
-
-
0034318245
-
An efficient remote user authentication scheme using smart cards
-
H.-M. Sun. An efficient remote user authentication scheme using smart cards. IEEE Trans. on Consumer Electronics, 46(4):958-961, 2000.
-
(2000)
IEEE Trans. on Consumer Electronics
, vol.46
, Issue.4
, pp. 958-961
-
-
Sun, H.-M.1
-
25
-
-
33847710813
-
Improved efficient remote user authentication schemes
-
X. Tian, R. W. Zhu, and D. S. Wong. Improved efficient remote user authentication schemes. International Journal of Network Security, 4(2):149-154, 2007.
-
(2007)
International Journal of Network Security
, vol.4
, Issue.2
, pp. 149-154
-
-
Tian, X.1
Zhu, R.W.2
Wong, D.S.3
-
26
-
-
4043171870
-
A smart card-based remote scheme for password authentication in multi-server internet services
-
W.-J. Tsaur, C.-C. Wu, and W.-B. Lee. A smart card-based remote scheme for password authentication in multi-server internet services. Computer Standards & Interfaces, 27:39-51, 2004.
-
(2004)
Computer Standards & Interfaces
, vol.27
, pp. 39-51
-
-
Tsaur, W.-J.1
Wu, C.-C.2
Lee, W.-B.3
-
27
-
-
0033350090
-
Password authentication schemes with smart card
-
W.-H. Yang and S.-R Shieh. Password authentication schemes with smart card. Computers & Security, 18(8):727-733, 1999.
-
(1999)
Computers & Security
, vol.18
, Issue.8
, pp. 727-733
-
-
Yang, W.-H.1
Shieh, S.-R.2
-
28
-
-
26844467695
-
Security enhancement for password authentication schemes with smart cards
-
Proceedings of the 2nd International Conference on Trust, Privacy, and Security in Digital Business TrustBus 2005
-
E.-J. Yoon, W.-H. Kim, and K.-Y. Yoo. Security enhancement for password authentication schemes with smart cards. Proceedings of the 2nd International Conference on Trust, Privacy, and Security in Digital Business (TrustBus 2005), LNCS, 3592:90-99, 2005.
-
(2005)
LNCS
, vol.3592
, pp. 90-99
-
-
Yoon, E.-J.1
Kim, W.-H.2
Yoo, K.-Y.3
-
29
-
-
15744404005
-
An improvement of hwang-lee-tang's simple remote user authentication scheme
-
E.-J. Yoon, E.-K. Ryu, and K.-Y. Yoo. An improvement of hwang-lee-tang's simple remote user authentication scheme. Computers & Security, 24(l):50-56, 2005.
-
(2005)
Computers & Security
, vol.24
, Issue.L
, pp. 50-56
-
-
Yoon, E.-J.1
Ryu, E.-K.2
Yoo, K.-Y.3
|