-
1
-
-
0036302680
-
An efficient and practical solution to remote authentication smart card
-
Chien, H., Jan, J., Tseng, Y.: An efficient and practical solution to remote authentication smart card. Computers & Security 21(4), 372-375 (2002)
-
(2002)
Computers & Security
, vol.21
, Issue.4
, pp. 372-375
-
-
Chien, H.1
Jan, J.2
Tseng, Y.3
-
3
-
-
38949096793
-
Security improvement on Chien et Al.' s remote user authentication scheme using smart cards
-
Duan, X., Liu, J., Zhang, Q.: Security improvement on Chien Et Al.'s remote user authentication scheme using smart cards. In: The 2006, IEEE International Conference on Computational Intelligence and Security (CIS 2006), vol. 2, pp. 1133-1135 (2006)
-
(2006)
The 2006 IEEE International Conference on Computational Intelligence and Security (CIS 2006)
, vol.2
, pp. 1133-1135
-
-
Duan, X.1
Liu, J.2
Zhang, Q.3
-
4
-
-
71849087704
-
Public-key cryptography and password protocols
-
Halevi, S., Krawczyk, H.: Public-key cryptography and password protocols. ACM Trans. Inf. Syst. Secur. 2(3), 230-268 (1999)
-
(1999)
ACM Trans. Inf. Syst. Secur.
, vol.2
, Issue.3
, pp. 230-268
-
-
Halevi, S.1
Krawczyk, H.2
-
5
-
-
59649086399
-
Weaknesses and improvements of the YoonRyuYoo remote user authentication scheme using smart cards
-
Hsiang, H., Shih, W.: Weaknesses and improvements of the YoonRyuYoo remote user authentication scheme using smart cards. Computer Communications 32(4), 649-652
-
Computer Communications
, vol.32
, Issue.4
, pp. 649-652
-
-
Hsiang, H.1
Shih, W.2
-
6
-
-
0034140374
-
A new remote user authentication scheme using smart card
-
Hwang, M., Li, L.: A new remote user authentication scheme using smart card. IEEE Transactions on Consumer Electronics 46(1), 28-30 (2000)
-
(2000)
IEEE Transactions on Consumer Electronics
, vol.46
, Issue.1
, pp. 28-30
-
-
Hwang, M.1
Li, L.2
-
7
-
-
0025877538
-
Non-interactive password authentication without password tables
-
September 1990
-
Hwang, T., Chen, Y., Laih, C.: Non-interactive password authentication without password tables. In: IEEE region 10 conference on computer and communication system, September 1990, vol. 1, pp. 429-431 (1990)
-
(1990)
IEEE Region 10 Conference on Computer and Communication System
, vol.1
, pp. 429-431
-
-
Hwang, T.1
Chen, Y.2
Laih, C.3
-
8
-
-
0000873739
-
Reparable key distribution protocols for Internet environments
-
Hwang, T., Ku, W.: Reparable key distribution protocols for Internet environments. IEEE Trans. Consum. Electron. 43(5), 1947-1949 (1995)
-
(1995)
IEEE Trans. Consum. Electron.
, vol.43
, Issue.5
, pp. 1947-1949
-
-
Hwang, T.1
Ku, W.2
-
9
-
-
23944461491
-
A one round protocol for tripartite Diffie-Hellman
-
DOI 10.1007/s00145-004-0312-y
-
Joux, A.: A One Round Protocol for Tripartite Diffie-Hellman. J. Cryptology 17, 263-276 (2004), doi:10.1007/s00145-004-0312-y (Pubitemid 41201459)
-
(2004)
Journal of Cryptology
, vol.17
, Issue.4
, pp. 263-276
-
-
Joux, A.1
-
10
-
-
1942423677
-
Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards
-
Ku, W., Chen, S.: Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics 50(1), 204-207 (2004)
-
(2004)
IEEE Transactions on Consumer Electronics
, vol.50
, Issue.1
, pp. 204-207
-
-
Ku, W.1
Chen, S.2
-
11
-
-
0142007776
-
Cryptanalysis of a variant of Peyravian-Zunic's password authentication scheme
-
Ku, W., Chen, C., Lee, H.: Cryptanalysis of a variant of Peyravian-Zunic's password authentication scheme. IEICE Transactions on Communication E86-B(5), 1682-1684 (2003)
-
(2003)
IEICE Transactions on Communication E86-B
, vol.5
, pp. 1682-1684
-
-
Ku, W.1
Chen, C.2
Lee, H.3
-
12
-
-
0019634370
-
Password authentication with insecure communication
-
Lamport, L.: Password authentication with insecure communication. Communications of the ACM 24(11), 770-772 (1981)
-
(1981)
Communications of the ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
13
-
-
0034225062
-
User identification and key distribution maintaining anonymity for distributed computer network
-
Lee, W., Chang, C.: User identification and key distribution maintaining anonymity for distributed computer network. Comput. Syst. Sci. 15(4), 211-214 (2000)
-
(2000)
Comput. Syst. Sci.
, vol.15
, Issue.4
, pp. 211-214
-
-
Lee, W.1
Chang, C.2
-
14
-
-
0019579253
-
Cryptographic authentication of time invariant quantities
-
Lennon, R., Matyas, S., Mayer, C.: Cryptographic authentication of time invariant quantities. IEEE Transactions on Communications 29(6), 773-777 (1981)
-
(1981)
IEEE Transactions on Communications
, vol.29
, Issue.6
, pp. 773-777
-
-
Lennon, R.1
Matyas, S.2
Mayer, C.3
-
15
-
-
33748126252
-
A password authentication scheme over insecure networks
-
Liao, I., Lee, C., Hwang, M.: A password authentication scheme over insecure networks. J. Comput. System Sci. 72(4), 727-740 (2006)
-
(2006)
J. Comput. System Sci.
, vol.72
, Issue.4
, pp. 727-740
-
-
Liao, I.1
Lee, C.2
Hwang, M.3
-
16
-
-
0024715186
-
Limitations of challenge-response entity authentication
-
Mitchell, C.: Limitations of challenge-response entity authentication. Electronic Letters 25(17), 1195-1196 (1989)
-
(1989)
Electronic Letters
, vol.25
, Issue.17
, pp. 1195-1196
-
-
Mitchell, C.1
-
17
-
-
0034318245
-
An efficient remote use authentication scheme using smart cards
-
Sun, H.: An efficient remote use authentication scheme using smart cards. IEEE Transactions on Consumer Electronics 46(4), 958-961 (2000)
-
(2000)
IEEE Transactions on Consumer Electronics
, vol.46
, Issue.4
, pp. 958-961
-
-
Sun, H.1
-
18
-
-
52949137008
-
Two-factor mutual authentication based on smart cards and passwords
-
May 15 (in press) (corrected Proof
-
Yang, G., Wong, D., Wang, H., Deng, X.: Two-factor mutual authentication based on smart cards and passwords. Journal of Computer and System Sciences (May 15, 2008) (in press) (corrected Proof)
-
(2008)
Journal of Computer and System Sciences
-
-
Yang, G.1
Wong, D.2
Wang, H.3
Deng, X.4
-
19
-
-
0003256983
-
Shared authentication token secure against replay and weak key attack
-
Yen, S., Liao, K.: Shared authentication token secure against replay and weak key attack. Information Processing Letters, 78-80 (1997)
-
(1997)
Information Processing Letters
, pp. 78-80
-
-
Yen, S.1
Liao, K.2
-
20
-
-
4043152192
-
Further improvement of an efficient password based remote user authentication scheme using smart cards
-
Yoon, E., Ryu, E., Yoo, K.: Further improvement of an efficient password based remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics 50(2), 612-614 (2004)
-
(2004)
IEEE Transactions on Consumer Electronics
, vol.50
, Issue.2
, pp. 612-614
-
-
Yoon, E.1
Ryu, E.2
Yoo, K.3
|