-
1
-
-
7544250474
-
Password authenti-cation without the server public key
-
Y. Chang, C. Chang, Y. Liu, "Password authenti-cation without the server public key," IEICE Trans-actions on Communications, vol. E87-B, no. 10, pp. 3088-3091, 2004.
-
(2004)
IEICE Trans-actions on Communications
, vol.E87-B
, Issue.10
, pp. 3088-3091
-
-
Chang, Y.1
Chang, C.2
Liu, Y.3
-
2
-
-
84981199109
-
A design principle for hash functions
-
LNCS 1989
-
I. Damgard, "A design principle for hash functions," Advances in Cryptology, CRYPTO '89, LNCS 1989, no. 435, pp. 416-427, 1989.
-
(1989)
Advances in Cryptology, CRYPTO '89
, vol.435
, pp. 416-427
-
-
Damgard, I.1
-
4
-
-
0003918059
-
-
Open Grid Service Infrastructure WG, Global Grid Forum
-
I. Foster, C. Kesselman, J. Nick, and S. Tuecke, "The physiology of the grid: an open grid services archi-tecture for distributed systems integration," Open Grid Service Infrastructure WG, Global Grid Forum, 2002.
-
(2002)
The physiology of the grid: an open grid services archi-tecture for distributed systems integration
-
-
Foster, I.1
Kesselman, C.2
Nick, J.3
Tuecke, S.4
-
5
-
-
0035455653
-
The anatomy of the Grid: enabling scalable virtual or-ganizations
-
I. Foster, C. Kesselman, and S. Teucke, "The anatomy of the Grid: enabling scalable virtual or-ganizations," International Journal of High Perfor-mance Computing Applications, vol. 15, no. 3, pp. 200-222, 2001.
-
(2001)
International Journal of High Perfor-mance Computing Applications
, vol.15
, Issue.3
, pp. 200-222
-
-
Foster, I.1
Kesselman, C.2
Teucke, S.3
-
6
-
-
84968503742
-
Elliptic curve cryptosystems
-
N. Koblitz, "Elliptic curve cryptosystems," Mathe-matics of Computation, vol. 48, pp. 417-426, 1987.
-
(1987)
Mathe-matics of Computation
, vol.48
, pp. 417-426
-
-
Koblitz, N.1
-
7
-
-
0348003132
-
The state of elliptic curve cryptography, Designs
-
N. Koblitz, A. Menezes, S. Vanstone, "The state of elliptic curve cryptography," Designs, Codes and Cryptography, vol. 19, pp. 173-193, 2000.
-
(2000)
Codes and Cryptography
, vol.19
, pp. 173-193
-
-
Koblitz, N.1
Menezes, A.2
Vanstone, S.3
-
8
-
-
24344478593
-
Efficient remote user authentication scheme using smart card
-
R. Lu and Z. Cao, "Efficient remote user authentica-tion scheme using smart card," Computer Networks, vol. 49, pp. 535-540, 2005.
-
(2005)
Computer Networks
, vol.49
, pp. 535-540
-
-
Lu, R.1
Cao, Z.2
-
9
-
-
84937461306
-
One-way hash functions and DES
-
LNCS 435
-
R. Merkle, "One-way hash functions and DES," Ad-vances in Cryptography, CRYPTO'89, LNCS 435, pp. 428-446, 1989.
-
(1989)
Advances in Cryptography, CRYPTO'89
, pp. 428-446
-
-
Merkle, R.1
-
12
-
-
0034318245
-
An efficient remote user authentication scheme using smart cards
-
H. Sun, "An efficient remote user authentication scheme using smart cards," IEEE Transactions on Consumer Electronics, vol. 46, no. 4, pp. 958-961, 2000.
-
(2000)
IEEE Transactions on Consumer Electronics
, vol.46
, Issue.4
, pp. 958-961
-
-
Sun, H.1
-
13
-
-
0029710130
-
Smart Card Based Secure Password Authentication Scheme
-
S. Wang and J. Chang, Smart Card Based Secure Password Authentication Scheme, Computers and se-curity, vol. 15, no. 3, pp. 231-237, 1996.
-
(1996)
Computers and se-curity
, vol.15
, Issue.3
, pp. 231-237
-
-
Wang, S.1
Chang, J.2
-
14
-
-
0142007144
-
A User Friendly Remote Au-thentication Scheme with Smart cards
-
S. Wu and B. Chieu, A User Friendly Remote Au-thentication Scheme with Smart cards, Computers and Security, vol. 22, no. 6, pp. 547-550, 2003.
-
(2003)
Computers and Security
, vol.22
, Issue.6
, pp. 547-550
-
-
Wu, S.1
Chieu, B.2
-
15
-
-
2142711263
-
A new mutual authen-tication and key exchange protocol with balanced computational power for wireless settings
-
C. Yang, J. Li, M. Hwang, "A new mutual authen-tication and key exchange protocol with balanced computational power for wireless settings," European Transactions on Telecommunications, vol. 15, pp. 91-99, 2004.
-
(2004)
European Transactions on Telecommunications
, vol.15
, pp. 91-99
-
-
Yang, C.1
Li, J.2
Hwang, M.3
-
16
-
-
33646849220
-
An efficient password authen-tication schemes without using the server public key for grid computing"
-
LNCS 3795
-
E. Yoon and K. Yoo, "An efficient password authen-tication schemes without using the server public key for grid computing," GCC 2005, LNCS 3795, pp. 149-154, 2005.
-
(2005)
GCC 2005
, pp. 149-154
-
-
Yoon, E.1
Yoo, K.2
|