-
1
-
-
0019634370
-
Password authentication with insecure communication
-
Nov.
-
L. Lamport, "Password authentication with insecure communication," Commun. ACM, vol.24, no.11, pp. 770-772, Nov. 1981.
-
(1981)
Commun. ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
2
-
-
0033350090
-
Password authentication schemes with smart cards
-
W. Yang and S. Shieh, "Password authentication schemes with smart cards," Comput. Secur., vol.18, no.8, pp. 727-733, 1999.
-
(1999)
Comput. Secur.
, vol.18
, Issue.8
, pp. 727-733
-
-
Yang, W.1
Shieh, S.2
-
3
-
-
0026850091
-
Encrypted key exchange: Password-based protocols secure against dictionary attacks
-
S. Bellovin and M. Merritt, "Encrypted key exchange: Password-based protocols secure against dictionary attacks," in Proc. IEEE Symp. Secur. Privacy, 1992, pp. 72-84.
-
(1992)
Proc. IEEE Symp. Secur. Privacy
, pp. 72-84
-
-
Bellovin, S.1
Merritt, M.2
-
4
-
-
75449101718
-
-
[Online]. Available
-
IEEE P1363.2. [Online]. Available: http://grouper.ieee.org/groups/1363/ passwdPK/submissions.html
-
-
-
-
5
-
-
28044451335
-
Robust remote authentication scheme with smart cards
-
Nov.
-
C. Fan, Y. Chan, and Z. Zhang, "Robust remote authentication scheme with smart cards," Comput. Secur., vol.24, no.8, pp. 619-628, Nov. 2005.
-
(2005)
Comput. Secur.
, vol.24
, Issue.8
, pp. 619-628
-
-
Fan, C.1
Chan, Y.2
Zhang, Z.3
-
6
-
-
62549133356
-
Robust and efficient passwordauthenticated key agreement using smart cards
-
Jun.
-
W. Juang, S. Chen, and H. Liaw, "Robust and efficient passwordauthenticated key agreement using smart cards," IEEE Trans. Ind. Electron., vol.15, no.6, pp. 2551-2556, Jun. 2008.
-
(2008)
IEEE Trans. Ind. Electron.
, vol.15
, Issue.6
, pp. 2551-2556
-
-
Juang, W.1
Chen, S.2
Liaw, H.3
-
7
-
-
0034140374
-
A new remote user authentication scheme using smart cards
-
Feb.
-
M.-S. Hwang and L.-H. Li, "A new remote user authentication scheme using smart cards," IEEE Trans. Consum. Electron., vol.46, no.1, pp. 28-30, Feb. 2000.
-
(2000)
IEEE Trans. Consum. Electron.
, vol.46
, Issue.1
, pp. 28-30
-
-
Hwang, M.-S.1
Li, L.-H.2
-
8
-
-
0034318245
-
An efficient remote user authentication scheme using smart cards
-
Nov.
-
H. Sun, "An efficient remote user authentication scheme using smart cards," IEEE Trans. Consum. Electron., vol.46, no.4, pp. 958-961, Nov. 2000.
-
(2000)
IEEE Trans. Consum. Electron.
, vol.46
, Issue.4
, pp. 958-961
-
-
Sun, H.1
-
9
-
-
54949140749
-
A secure authentication scheme with anonymity for wireless communications
-
Oct.
-
C. Wu, W. Lee, and W. Tsaur, "A secure authentication scheme with anonymity for wireless communications," IEEE Commun. Lett., vol.12, no.10, pp. 722-723, Oct. 2008.
-
(2008)
IEEE Commun. Lett.
, vol.12
, Issue.10
, pp. 722-723
-
-
Wu, C.1
Lee, W.2
Tsaur, W.3
-
10
-
-
65649112157
-
Security analysis of the Song-Mitchell authentication protocol for low-cost RFID tags
-
Apr.
-
P. Rizomiliotis, E. Rekleitis, and S. Gritzalis, "Security analysis of the Song-Mitchell authentication protocol for low-cost RFID tags," IEEE Commun. Lett., vol.13, no.4, pp. 274-276, Apr. 2009.
-
(2009)
IEEE Commun. Lett.
, vol.13
, Issue.4
, pp. 274-276
-
-
Rizomiliotis, P.1
Rekleitis, E.2
Gritzalis, S.3
-
11
-
-
67649184080
-
Security flaw of authentication scheme with anonymity for wireless communications
-
May
-
J. Lee, J. Chang, and D. Lee, "Security flaw of authentication scheme with anonymity for wireless communications," IEEE Commun. Lett., vol.13, no.5, pp. 292-293, May 2009.
-
(2009)
IEEE Commun. Lett.
, vol.13
, Issue.5
, pp. 292-293
-
-
Lee, J.1
Chang, J.2
Lee, D.3
-
12
-
-
41149155794
-
Mobile privacy in wireless networks-revisited
-
Mar.
-
C. Tang and D. Wu, "Mobile privacy in wireless networks-revisited, " IEEE Trans. Wireless Commun., vol.7, no.3, pp. 1035-1042, Mar. 2008.
-
(2008)
IEEE Trans. Wireless Commun.
, vol.7
, Issue.3
, pp. 1035-1042
-
-
Tang, C.1
Wu, D.2
-
13
-
-
0344875575
-
Information hiding, anonymity and privacy: A modular approach
-
Jan.
-
D. Hughes and V. Shmatikov, "Information hiding, anonymity and privacy: A modular approach," J. Comput. Secur., vol.12, no.1, pp. 3-36, Jan. 2004.
-
(2004)
J. Comput. Secur.
, vol.12
, Issue.1
, pp. 3-36
-
-
Hughes, D.1
Shmatikov, V.2
-
16
-
-
2442510011
-
Efficient AES implementations for ARM based platforms
-
K. Atasu, L. Breveglieri, and M. Macchetti, "Efficient AES implementations for ARM based platforms," in Proc. ACM Symp. Appl. Comput., 2004, pp. 841-845.
-
(2004)
Proc. ACM Symp. Appl. Comput.
, pp. 841-845
-
-
Atasu, K.1
Breveglieri, L.2
MacChetti, M.3
-
17
-
-
58549119455
-
AES software implementations on ARM7TDMI
-
M. Darnall and D. Kuhlman, "AES software implementations on ARM7TDMI," in Proc. Indocrypt, 2006, pp. 424-435.
-
(2006)
Proc. Indocrypt
, pp. 424-435
-
-
Darnall, M.1
Kuhlman, D.2
-
18
-
-
70350368313
-
-
[Online]. Available: csrc.nist.gov/groups/ST/hash/ sha-3/Round1/Feb2009/ documents/ sha3-classification-forler.pdf
-
E. Fleischmann, C. Forler1, and M. Gorski, Classification of the SHA-3 candidates. [Online]. Available: csrc.nist.gov/groups/ST/hash/ sha-3/Round1/Feb2009/documents/ sha3-classification-forler.pdf
-
Classification of the SHA-3 Candidates
-
-
Fleischmann, E.1
Forlerl, C.2
Gorski, M.3
-
19
-
-
0025386404
-
A logic of authentication
-
Feb.
-
M. Burrow, M. Abadi, and R. Needham, "A logic of authentication," ACM Trans. Comput. Syst., vol.8, no.1, pp. 18-36, Feb. 1990.
-
(1990)
ACM Trans. Comput. Syst.
, vol.8
, Issue.1
, pp. 18-36
-
-
Burrow, M.1
Abadi, M.2
Needham, R.3
-
20
-
-
0002886232
-
Key agreement protocols and their security analysis
-
S. Blake-Wilson, D. Johnson, and A. Menezes, "Key agreement protocols and their security analysis," in Proc. 5th Annu. Workshop Sel. Areas Cryptography, 1998, pp. 30-45.
-
(1998)
Proc. 5th Annu. Workshop Sel. Areas Cryptography
, pp. 30-45
-
-
Blake-Wilson, S.1
Johnson, D.2
Menezes, A.3
-
21
-
-
74549221711
-
An efficient protocol for authenticated key agreement
-
Mar.
-
L. Law, A. Menezes, M. Qu, J. Solinas, and S. Vanstone, "An efficient protocol for authenticated key agreement," Designs Codes Cryptogr., vol.28, no.2, pp. 119-134, Mar. 2003.
-
(2003)
Designs Codes Cryptogr.
, vol.28
, Issue.2
, pp. 119-134
-
-
Law, L.1
Menezes, A.2
Qu, M.3
Solinas, J.4
Vanstone, S.5
-
24
-
-
67649386419
-
Improvements of Juang et al.'s password-authenticated key agreement scheme using smart cards
-
Jun.
-
D. Sun, J. Huai, J. Sun, J. Li, J. Zhang, and Z. Feng, "Improvements of Juang et al.'s password-authenticated key agreement scheme using smart cards," IEEE Trans. Ind. Electron., vol.56, no.6, pp. 2284-2291, Jun. 2009.
-
(2009)
IEEE Trans. Ind. Electron.
, vol.56
, Issue.6
, pp. 2284-2291
-
-
Sun, D.1
Huai, J.2
Sun, J.3
Li, J.4
Zhang, J.5
Feng, Z.6
|