-
1
-
-
60349111972
-
-
N.F.P. 46-1, Data encryption standard, National Burean of Standards, U.S. Department of Commerce, 1988.
-
N.F.P. 46-1, Data encryption standard, National Burean of Standards, U.S. Department of Commerce, 1988.
-
-
-
-
2
-
-
60349095676
-
-
I. 9797, Data cryptographic techniques-data integrity mechanism using a cryptographic check function employing a block cipher algorithm, Internal Organization for Standardization.
-
I. 9797, Data cryptographic techniques-data integrity mechanism using a cryptographic check function employing a block cipher algorithm, Internal Organization for Standardization.
-
-
-
-
3
-
-
2142759434
-
End-to-end security protocol for mobile communications with end-user identification/authentication
-
Chang C.C., Chen K.L., and Hwang M.S. End-to-end security protocol for mobile communications with end-user identification/authentication. Wireless Personal Communications 28 2 (2004) 95-106
-
(2004)
Wireless Personal Communications
, vol.28
, Issue.2
, pp. 95-106
-
-
Chang, C.C.1
Chen, K.L.2
Hwang, M.S.3
-
4
-
-
0027804845
-
Using smart cards to authenticate passwords
-
Ottawa, Canada, October
-
C.C. Chang, R.J. Hwang, J.B. Daniel, Using smart cards to authenticate passwords, in: Proceedings of IEEE International Carnahan Conference on Security Technology, Ottawa, Canada, October 1993.
-
(1993)
Proceedings of IEEE International Carnahan Conference on Security Technology
-
-
Chang, C.C.1
Hwang, R.J.2
Daniel, J.B.3
-
6
-
-
0029514088
-
Remote scheme for password authentication based on theory of quadratic residues
-
Chang C.C., Tsu S.M., and Chen C.Y. Remote scheme for password authentication based on theory of quadratic residues. Computer Communications 18 12 (1995) 936-942
-
(1995)
Computer Communications
, vol.18
, Issue.12
, pp. 936-942
-
-
Chang, C.C.1
Tsu, S.M.2
Chen, C.Y.3
-
9
-
-
0016092372
-
A user authentication scheme not requiring secrecy in the computer
-
Evans A.J., Kantrowitz W., and Weiss E. A user authentication scheme not requiring secrecy in the computer. Communications of the ACM 17 8 (1974) 437-442
-
(1974)
Communications of the ACM
, vol.17
, Issue.8
, pp. 437-442
-
-
Evans, A.J.1
Kantrowitz, W.2
Weiss, E.3
-
10
-
-
0005010894
-
-
FIPS, Proposed federal information processing standard for secure hash standard
-
FIPS, Proposed federal information processing standard for secure hash standard, Federal Register 57(21) (1992) 3747-3749.
-
(1992)
Federal Register
, vol.57
, Issue.21
, pp. 3747-3749
-
-
-
11
-
-
0000270009
-
Password authentication without using password table
-
Horng G. Password authentication without using password table. Information Processing Letters 55 5 (1995) 247-250
-
(1995)
Information Processing Letters
, vol.55
, Issue.5
, pp. 247-250
-
-
Horng, G.1
-
12
-
-
0000694693
-
A remote password authentication scheme based on the digital signature method
-
Hwang M.S. A remote password authentication scheme based on the digital signature method. International Journal of Computer Mathematics 70 4 (1999) 657-666
-
(1999)
International Journal of Computer Mathematics
, vol.70
, Issue.4
, pp. 657-666
-
-
Hwang, M.S.1
-
13
-
-
0034140374
-
A new remote user authentication scheme using smart cards
-
Hwang M.S., and Li L.H. A new remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics 46 1 (2000) 28-30
-
(2000)
IEEE Transactions on Consumer Electronics
, vol.46
, Issue.1
, pp. 28-30
-
-
Hwang, M.S.1
Li, L.H.2
-
15
-
-
33845950814
-
A novel deniable authentication protocol using generalized Elgamal signature scheme
-
Lee W.B., Wu C.C., and Tsaur W.J. A novel deniable authentication protocol using generalized Elgamal signature scheme. Information Sciences 177 6 (2007) 1376-1381
-
(2007)
Information Sciences
, vol.177
, Issue.6
, pp. 1376-1381
-
-
Lee, W.B.1
Wu, C.C.2
Tsaur, W.J.3
-
17
-
-
0035506864
-
A remote password authentication scheme for multi-server architecture using neural networks
-
Li L.H., Lin I.C., and Hwang M.S. A remote password authentication scheme for multi-server architecture using neural networks. IEEE Transactions on Neural Networks 12 6 (2001) 1498-1504
-
(2001)
IEEE Transactions on Neural Networks
, vol.12
, Issue.6
, pp. 1498-1504
-
-
Li, L.H.1
Lin, I.C.2
Hwang, M.S.3
-
18
-
-
38149111391
-
A time-stamping proxy signature scheme using time-stamping service
-
Lu E.J.L., and Huang C.J. A time-stamping proxy signature scheme using time-stamping service. International Journal of Network Security 2 1 (2006) 43-51
-
(2006)
International Journal of Network Security
, vol.2
, Issue.1
, pp. 43-51
-
-
Lu, E.J.L.1
Huang, C.J.2
-
19
-
-
33846342359
-
A hash-based strong password authentication protocol with user anonymity
-
Mangipudi K., and Katti R. A hash-based strong password authentication protocol with user anonymity. International Journal of Network Security 2 3 (2006) 205-209
-
(2006)
International Journal of Network Security
, vol.2
, Issue.3
, pp. 205-209
-
-
Mangipudi, K.1
Katti, R.2
-
21
-
-
0025545583
-
A fast software one-way hash function
-
Merkle R.C. A fast software one-way hash function. Journal of Cryptology 3 1 (1990) 43-58
-
(1990)
Journal of Cryptology
, vol.3
, Issue.1
, pp. 43-58
-
-
Merkle, R.C.1
-
23
-
-
0018543411
-
Password security: a case history
-
Morris R., and Thompson K. Password security: a case history. Communications of the ACM 22 11 (1979) 594-597
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 594-597
-
-
Morris, R.1
Thompson, K.2
-
24
-
-
33845941453
-
Security weakness in a three-party pairing-based protocol for password authenticated key exchange
-
Nam J., Lee Y., Kim S., and Merkle D.W.C. Security weakness in a three-party pairing-based protocol for password authenticated key exchange. Information Sciences 177 6 (2007) 1364-1375
-
(2007)
Information Sciences
, vol.177
, Issue.6
, pp. 1364-1375
-
-
Nam, J.1
Lee, Y.2
Kim, S.3
Merkle, D.W.C.4
-
25
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
Needham R.M., and Schroeder M.D. Using encryption for authentication in large networks of computers. Communications of the ACM 21 12 (1978) 993-999
-
(1978)
Communications of the ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.M.1
Schroeder, M.D.2
-
27
-
-
60349084068
-
-
N.I. of Standards, N. Technology, Digital Signature Standard, Technical Report NIST FIPS PUB 186, U.S. Department of Commerce, May 1994.
-
N.I. of Standards, N. Technology, Digital Signature Standard, Technical Report NIST FIPS PUB 186, U.S. Department of Commerce, May 1994.
-
-
-
-
28
-
-
33645890580
-
Enforcing the security of a time-bound hierarchical key assignment scheme
-
Santis A.D., Ferrara A.L., and Masucci B. Enforcing the security of a time-bound hierarchical key assignment scheme. Information Sciences 176 12 (2006) 1684-1694
-
(2006)
Information Sciences
, vol.176
, Issue.12
, pp. 1684-1694
-
-
Santis, A.D.1
Ferrara, A.L.2
Masucci, B.3
-
32
-
-
0029696153
-
A simple scheme to make passwords based on one-way function much harder to crack
-
Udi M. A simple scheme to make passwords based on one-way function much harder to crack. Computers & Security 15 2 (1996) 171-176
-
(1996)
Computers & Security
, vol.15
, Issue.2
, pp. 171-176
-
-
Udi, M.1
-
33
-
-
0029710130
-
Smart card based secure password authentication scheme
-
Wang S.J., and Chang J.F. Smart card based secure password authentication scheme. Computers & Security 15 3 (1996) 231-237
-
(1996)
Computers & Security
, vol.15
, Issue.3
, pp. 231-237
-
-
Wang, S.J.1
Chang, J.F.2
-
34
-
-
0029535942
-
Remote login authentication scheme based on a geometric approach
-
Wu T.C. Remote login authentication scheme based on a geometric approach. Computer Communications 18 12 (1995) 959-963
-
(1995)
Computer Communications
, vol.18
, Issue.12
, pp. 959-963
-
-
Wu, T.C.1
-
35
-
-
0000612396
-
Authentication passwords over an insecure channel
-
Wu T.C., and Sung H.S. Authentication passwords over an insecure channel. Computers & Security 15 5 (1996) 431-439
-
(1996)
Computers & Security
, vol.15
, Issue.5
, pp. 431-439
-
-
Wu, T.C.1
Sung, H.S.2
-
37
-
-
13544276811
-
Formal analysis of modern security protocols
-
Yasinsac A., and Childs J. Formal analysis of modern security protocols. Information Sciences 171 1-3 (2005) 189-211
-
(2005)
Information Sciences
, vol.171
, Issue.1-3
, pp. 189-211
-
-
Yasinsac, A.1
Childs, J.2
|