-
1
-
-
33947392992
-
A secure YS-like user authentication scheme
-
Chen, T.H, Horng, G. and K.C. Wu (2007). A secure YS-like user authentication scheme. Informatica, 18(1), 27-36.
-
(2007)
Informatica
, vol.18
, Issue.1
, pp. 27-36
-
-
Chen, T.H.1
Horng, G.2
Wu, K.C.3
-
2
-
-
42149157246
-
Public key authentication schemes for local area networks
-
Chen, T.H, Horng, G. and C.S. Yang (2008). Public key authentication schemes for local area networks, Informatica, 19(1), 3-16.
-
(2008)
Informatica
, vol.19
, Issue.1
, pp. 3-16
-
-
Chen, T.H.1
Horng, G.2
Yang, C.S.3
-
3
-
-
0017018484
-
New directions in cryptography
-
Diffie, W., and M. Hellman (1976). New directions in cryptography. IEEE Trans. Inf. Theory, IT-22(6), 644-654.
-
(1976)
IEEE Trans. Inf. Theory
, vol.IT-22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.2
-
4
-
-
6944222739
-
Secure communication between set-top box and smart card in DTV broadcasting
-
Jiang, T., Hou, Y. and S. Zheng (2004). Secure communication between set-top box and smart card in DTV broadcasting. IEEE Trans. Consum. Electr., 50(3), 882-886.
-
(2004)
IEEE Trans. Consum. Electr
, vol.50
, Issue.3
, pp. 882-886
-
-
Jiang, T.1
Hou, Y.2
Zheng, S.3
-
5
-
-
1942423668
-
Key distribution based on hierarchical access control for conditional access system in DTV broadcast
-
Jiang, T., Zheng, S. and B. Liu (2004). Key distribution based on hierarchical access control for conditional access system in DTV broadcast. IEEE Trans. Consum. Electr., 50(1), 225-230.
-
(2004)
IEEE Trans. Consum. Electr
, vol.50
, Issue.1
, pp. 225-230
-
-
Jiang, T.1
Zheng, S.2
Liu, B.3
-
6
-
-
0035245703
-
Conditonal access system interoperability through software downloading
-
Kamperman, F., and B.V. Rijnsoever (2001). Conditonal access system interoperability through software downloading. IEEE Trans. on Consumer Electronics, 47(1), 47-53.
-
(2001)
IEEE Trans. on Consumer Electronics
, vol.47
, Issue.1
, pp. 47-53
-
-
Kamperman, F.1
Rijnsoever, B.V.2
-
9
-
-
0037282439
-
A password authentication scheme with secure password updating
-
Lin, C.L., and T. Hwang (2003). A password authentication scheme with secure password updating. Computers & Security, 22(1), 68-72.
-
(2003)
Computers & Security
, vol.22
, Issue.1
, pp. 68-72
-
-
Lin, C.L.1
Hwang, T.2
-
10
-
-
84936892450
-
Cryptology for digital TV broadcasting
-
Macq, B., and J. Quisquater (1995). Cryptology for digital TV broadcasting, In Proceedings of the IEEE, 83(6). pp. 944-957.
-
(1995)
Proceedings of the IEEE
, vol.83
, Issue.6
, pp. 944-957
-
-
Macq, B.1
Quisquater, J.2
-
12
-
-
33947396398
-
Key agreement protocol (KAP) using conjugacy and discrete logarithm problems in group representation level
-
Sakalauskas, E., Tvarijonas, P. and A. Raulynaitis (2007). Key agreement protocol (KAP) using conjugacy and discrete logarithm problems in group representation level. Informatica, 18(1), 115-124.
-
(2007)
Informatica
, vol.18
, Issue.1
, pp. 115-124
-
-
Sakalauskas, E.1
Tvarijonas, P.2
Raulynaitis, A.3
-
13
-
-
0000537828
-
Efficient identification and signatures for smart cards
-
Crypto'89
-
Schnorr C.P. (1990). Efficient identification and signatures for smart cards, In Crypto'89, LNCS 435. pp. 235-251.
-
(1990)
LNCS
, vol.435
, pp. 235-251
-
-
Schnorr, C.P.1
-
14
-
-
0002839106
-
Refinement and extension of encrypted key exchange
-
Steiner, M., Tsudik, G. and M. Waidner (1995). Refinement and extension of encrypted key exchange. ACM Operating Systems Review, 29(3), 22-30.
-
(1995)
ACM Operating Systems Review
, vol.29
, Issue.3
, pp. 22-30
-
-
Steiner, M.1
Tsudik, G.2
Waidner, M.3
-
15
-
-
33947405259
-
An efficient two-party identity-based key exchange protocol
-
Tseng, Y.M. (2007). An efficient two-party identity-based key exchange protocol, Informatica, 18(1), 125-136.
-
(2007)
Informatica
, vol.18
, Issue.1
, pp. 125-136
-
-
Tseng, Y.M.1
-
16
-
-
47949104161
-
A pairing-based user authentication scheme for wireless clients with smart cards
-
Tseng, Y.M., Wu, T.Y. and J.D. Wu (2008). A pairing-based user authentication scheme for wireless clients with smart cards. Informatica, 19(2), 285-302.
-
(2008)
Informatica
, vol.19
, Issue.2
, pp. 285-302
-
-
Tseng, Y.M.1
Wu, T.Y.2
Wu, J.D.3
-
17
-
-
0032626528
-
On key distribution management for conditional access system on pay-TV system
-
Tu, F.K., Laih, C.S. and H.H. Tung (1999). On key distribution management for conditional access system on pay-TV system. IEEE Trans. Consum. Electr., 45, 151-158.
-
(1999)
IEEE Trans. Consum. Electr
, vol.45
, pp. 151-158
-
-
Tu, F.K.1
Laih, C.S.2
Tung, H.H.3
-
18
-
-
0142007845
-
-
Yang, C.C., T.Y. Chang, T.Y. and J.W. Li (2003). Security enhancement for protecting password transmission. IEICE Transactions on Communications. E86-B(7). pp. 2178-2181.
-
Yang, C.C., T.Y. Chang, T.Y. and J.W. Li (2003). Security enhancement for protecting password transmission. IEICE Transactions on Communications. E86-B(7). pp. 2178-2181.
-
-
-
|