-
2
-
-
0025386404
-
A logic of authentication
-
Burrow, M., Abadi, M. and Needham, R. (1990) 'A logic of authentication', ACM Trans. Comput. Syst., Vol. 8, pp. 18-36.
-
(1990)
ACM Trans. Comput. Syst
, vol.8
, pp. 18-36
-
-
Burrow, M.1
Abadi, M.2
Needham, R.3
-
3
-
-
17644390205
-
Efficient authentication protocols of GSM
-
Chang, C., Lee, J. and Chang, Y. (2005) 'Efficient authentication protocols of GSM', Computer Communications, Vol. 28, pp. 921-928.
-
(2005)
Computer Communications
, vol.28
, pp. 921-928
-
-
Chang, C.1
Lee, J.2
Chang, Y.3
-
5
-
-
64149119241
-
-
GSM (2001) 'Digital Cellular Telecommunications System (Phase 2+)', Security Related Network Functions (GSM 03.20 version 8.1.0 release 1999), ESTI TS 100 929 V8.1.0.
-
GSM (2001) 'Digital Cellular Telecommunications System (Phase 2+)', Security Related Network Functions (GSM 03.20 version 8.1.0 release 1999), ESTI TS 100 929 V8.1.0.
-
-
-
-
6
-
-
1942455353
-
Efficient multi-server password authenticated key agreement using smart cards
-
Juang, W. (2004a) 'Efficient multi-server password authenticated key agreement using smart cards', IEEE Trans. on Consumer Electronics, Vol. 50, No. 1, pp. 251-255.
-
(2004)
IEEE Trans. on Consumer Electronics
, vol.50
, Issue.1
, pp. 251-255
-
-
Juang, W.1
-
7
-
-
1542335451
-
Efficient password authentication key agreement using smart cards
-
Juang, W. (2004b) 'Efficient password authentication key agreement using smart cards', Computer and Security, Vol. 23, pp. 167-173.
-
(2004)
Computer and Security
, vol.23
, pp. 167-173
-
-
Juang, W.1
-
8
-
-
33745904732
-
Efficient user authentication and key agreement in ubiquitous computing
-
Proceeding of the 2006 International Conference Computational Science and Its Applications
-
Juang, W. (2006) 'Efficient user authentication and key agreement in ubiquitous computing', Proceeding of the 2006 International Conference Computational Science and Its Applications, Lecture Notes in Computer Science 3983, pp. 396-405.
-
(2006)
Lecture Notes in Computer Science
, vol.3983
, pp. 396-405
-
-
Juang, W.1
-
9
-
-
58049197989
-
Two efficient two-factor authenticated key exchange protocols in public wireless LANs
-
Juang, W. and Wu, J. (2009) 'Two efficient two-factor authenticated key exchange protocols in public wireless LANs', Computers & Electrical Engineering, Vol. 35, No. 1, pp. 33-40.
-
(2009)
Computers & Electrical Engineering
, vol.35
, Issue.1
, pp. 33-40
-
-
Juang, W.1
Wu, J.2
-
10
-
-
4544330565
-
Extension of authentication protocol for GSM
-
Lee, C., Hwang, M. and Yang, W. (2003) 'Extension of authentication protocol for GSM', IEE Proceedings of Communications, Vol. 150, pp. 91-95.
-
(2003)
IEE Proceedings of Communications
, vol.150
, pp. 91-95
-
-
Lee, C.1
Hwang, M.2
Yang, W.3
-
11
-
-
4544286919
-
Privacy and authentication protocol providing anonymous channels in GSM
-
Peinado, A. (2004) 'Privacy and authentication protocol providing anonymous channels in GSM', Computer Communications, Vol. 27, pp. 1709-1715.
-
(2004)
Computer Communications
, vol.27
, pp. 1709-1715
-
-
Peinado, A.1
-
13
-
-
0032658583
-
Simple authenticated key agreement algorithm
-
Seo, D. and Sweeney, P. (1999) 'Simple authenticated key agreement algorithm', Electronics Letters, Vol. 35, pp. 1073-1074.
-
(1999)
Electronics Letters
, vol.35
, pp. 1073-1074
-
-
Seo, D.1
Sweeney, P.2
-
15
-
-
64149102436
-
A robust authentication scheme with user anonymity for wireless environments
-
Wang, R., Juang, W. and Lei, C. (2009) 'A robust authentication scheme with user anonymity for wireless environments', International Journal of Innovative Computing, Information and Control, Vol. 5, No. 4, pp. 1-12.
-
(2009)
International Journal of Innovative Computing, Information and Control
, vol.5
, Issue.4
, pp. 1-12
-
-
Wang, R.1
Juang, W.2
Lei, C.3
-
16
-
-
4243165683
-
Cryptanalysis of simple authenticated key agreement protocols
-
Yang, C., Chang, T. and Hwang, M. (2004) 'Cryptanalysis of simple authenticated key agreement protocols', IEICE Trans. Fundamentals, Vol. E87-A, No. 8, pp. 2174-2176.
-
(2004)
IEICE Trans. Fundamentals
, vol.E87-A
, Issue.8
, pp. 2174-2176
-
-
Yang, C.1
Chang, T.2
Hwang, M.3
-
17
-
-
17144430885
-
Security analysis and enhanced of 3GPP authentication and key agreement protocol
-
Zhang, M. and Fang, Y. (2005) 'Security analysis and enhanced of 3GPP authentication and key agreement protocol', IEEE Trans. on Wireless Commun., Vol. 4, No. 2, pp. 734-742.
-
(2005)
IEEE Trans. on Wireless Commun
, vol.4
, Issue.2
, pp. 734-742
-
-
Zhang, M.1
Fang, Y.2
|