-
1
-
-
0019634370
-
Password authentication with insecure communication
-
L. Lamport. Password authentication with insecure communication. Communication of ACM 24(1981). pp.28-30.
-
(1981)
Communication of ACM
, vol.24
, pp. 28-30
-
-
Lamport, L.1
-
2
-
-
44849118543
-
Cryptanalysis of simple three-party key exchange protocol
-
March
-
H. Guo, Z. Li, Y. Mu, X. Zhang, Cryptanalysis of simple three-party key exchange protocol, Computers&Security, Vol.27, No.1-2, pp. 16-21, March 2008.
-
(2008)
Computers&Security
, vol.27
, Issue.1-2
, pp. 16-21
-
-
Guo, H.1
Li, Z.2
Mu, Y.3
Zhang, X.4
-
3
-
-
64249125305
-
An improved smart card based password authentication scheme with provable security
-
doi:10.1016/j.csi.2008.09.006
-
J. Xu, W.-T. Zhu, D.-G. Feng, An improved smart card based password authentication scheme with provable security, Computer Standards&Interfaces doi:10.1016/j.csi.2008.09.006.
-
Computer Standards&Interfaces
-
-
Xu, J.1
Zhu, W.-T.2
Feng, D.-G.3
-
4
-
-
43649083106
-
Cryptanalysis of a password authentication scheme over insecure networks
-
August
-
T. Xiang, K. Wong, X. Liao, "Cryptanalysis of a password authentication scheme over insecure networks", Computer and System Sciences, Vol.74, No.5, pp. 657-661,August 2008.
-
(2008)
Computer and System Sciences
, vol.74
, Issue.5
, pp. 657-661
-
-
Xiang, T.1
Wong, K.2
Liao, X.3
-
5
-
-
0742268499
-
Security of Chien et al.'s remote user authentication scheme using smart cards
-
C.L. Hsu, Security of Chien et al.'s remote user authentication scheme using smart cards, Computer Standards&Interfaces 26 (3) (2004) 167-169.
-
(2004)
Computer Standards&Interfaces
, vol.26
, Issue.3
, pp. 167-169
-
-
Hsu, C.L.1
-
6
-
-
33748126252
-
A password authentication scheme over insecure networks
-
June
-
I. E. Liao, C. C. Lee, M. S. Hwang, "A password authentication scheme over insecure networks", Journal of Computer and System Sciences, Vol.72, No.4, pp. 727-740, June 2006.
-
(2006)
Journal of Computer and System Sciences
, vol.72
, Issue.4
, pp. 727-740
-
-
Liao, I.E.1
Lee, C.C.2
Hwang, M.S.3
-
7
-
-
9544227377
-
Improvement of Chien et al.'s remote user authentication scheme using smart cards
-
S.W. Lee, H.S. Kim, K.Y. Yoo, Improvement of Chien et al.'s remote user authentication scheme using smart cards, Computer Standards&Interfaces 27(2) (2005) 181-183.
-
(2005)
Computer Standards&Interfaces
, vol.27
, Issue.2
, pp. 181-183
-
-
Lee, S.W.1
Kim, H.S.2
Yoo, K.Y.3
-
8
-
-
47249106837
-
Vulnerabilities in a remote agent authentication scheme using smart cards
-
April
-
Y. Lee, J. Nam, D. Won, "Vulnerabilities in a Remote Agent Authentication Scheme Using Smart Cards", LNCS: AMSTA, Vol.4953, pp. 850-857, April 2008.
-
(2008)
LNCS: AMSTA
, vol.4953
, pp. 850-857
-
-
Lee, Y.1
Nam, J.2
Won, D.3
-
9
-
-
35448940560
-
Security enhancement for a three-party encrypted key exchange protocol against undetectable on-line password guessing attacks
-
January
-
H. B. Chen, T. H. Chen, W. B. Lee, C. C. Chang, "Security enhancement for a three-party encrypted key exchange protocol against undetectable on-line password guessing attacks", Computer Standards&Interfaces, Vol.30, No. 1- 2, pp. 95-99, January 2008.
-
(2008)
Computer Standards&Interfaces
, vol.30
, Issue.1-2
, pp. 95-99
-
-
Chen, H.B.1
Chen, T.H.2
Lee, W.B.3
Chang, C.C.4
-
10
-
-
44549088413
-
Improvement of the peyravian-jeffries's user authentication protocol and password change protocol
-
June
-
M. Hölbl, T. Welzer, B. Brumen, "Improvement of the Peyravian-Jeffries's user authentication protocol and password change protocol", Computer Communications, Vol.31, No.10, pp. 1945-1951, June 2008.
-
(2008)
Computer Communications
, vol.31
, Issue.10
, pp. 1945-1951
-
-
Hölbl, M.1
Welzer, T.2
Brumen, B.3
-
11
-
-
33144456748
-
Secure remote user access over insecure networks
-
March
-
M. Peyravian, C. Jeffries, "Secure remote user access over insecure networks",Computer Communications, Vol.29, No.5, pp. 660-667, March 2006.
-
(2006)
Computer Communications
, vol.29
, Issue.5
, pp. 660-667
-
-
Peyravian, M.1
Jeffries, C.2
-
12
-
-
0007029111
-
The effects of logistics capabilities and strategy on firm performance
-
Daniel F.Lynch, Scott B.Keller, John Ozment (2000). "The effects of logistics capabilities and strategy on firm performance". Journal of Business Logistics, Vol.21, No.2, pp.47-67.
-
(2000)
Journal of Business Logistics
, vol.21
, Issue.2
, pp. 47-67
-
-
Lynch, D.F.1
Keller, S.B.2
Ozment, J.3
-
13
-
-
28044451335
-
Robust remote authentication scheme with smart cards
-
C.I. Fan, Y.C. Chan, Z.K. Zhang, Robust remote authentication scheme with smart cards, Computers&Security 24 (8) (2005) 619-628.
-
(2005)
Computers&Security
, vol.24
, Issue.8
, pp. 619-628
-
-
Fan, C.I.1
Chan, Y.C.2
Zhang, Z.K.3
-
14
-
-
33751167604
-
Improving the security of 'a flexible biometrics remote user authentication scheme'
-
DOI 10.1016/j.csi.2006.01.002, PII S0920548906000122
-
M.K. Khan, J. Zhang, Improving the security of a flexible biometrics remote user authentication scheme, Computer Standards&Interfaces 29 (1) (2007),82-85. (Pubitemid 44773789)
-
(2007)
Computer Standards and Interfaces
, vol.29
, Issue.1
, pp. 82-85
-
-
Khan, M.K.1
Zhang, J.2
|