-
1
-
-
0019634370
-
Password authentication with insecure communication
-
L. Lamport, Password authentication with insecure communication, Communications of ACM, vol. 24, no. 11, pp. 770-772, 1981.
-
(1981)
Communications of ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
2
-
-
0034318245
-
An efficient remote user authentication scheme using smart cards
-
H. M. Sun, An efficient remote user authentication scheme using smart cards, IEEE Transactions on Consumer Electronics, vol. 46, no. 4, pp. 958-961, 2000.
-
(2000)
IEEE Transactions on Consumer Electronics
, vol.46
, Issue.4
, pp. 958-961
-
-
Sun, H.M.1
-
3
-
-
0034140374
-
A new remote user authentication scheme using smart cards
-
M. S. Hwang and L. H. Li, A new remote user authentication scheme using smart cards, IEEE Transactions on Consumer Electronics, vol. 46, no. 1, pp. 28-30, 2000.
-
(2000)
IEEE Transactions on Consumer Electronics
, vol.46
, Issue.1
, pp. 28-30
-
-
Hwang, M.S.1
Li, L.H.2
-
4
-
-
0036302680
-
An efficient and practical solution to remote authentication: Smart card
-
H. Y. Chien, J. K. Jan, and Y. M. Tseng, An efficient and practical solution to remote authentication: smart card, Computers & Security, vol. 21, no. 4, pp. 372-375, 2002.
-
(2002)
Computers & Security
, vol.21
, Issue.4
, pp. 372-375
-
-
Chien, H.Y.1
Jan, J.K.2
Tseng, Y.M.3
-
5
-
-
0037008805
-
A simple remote user authentication scheme
-
M. S. Hwang, C. C. Lee, and Y. L. Tang, A simple remote user authentication scheme, Mathematical and Computer Modelling, vol. 36, no. 1-2, pp. 103-107, 2002.
-
(2002)
Mathematical and Computer Modelling
, vol.36
, Issue.1-2
, pp. 103-107
-
-
Hwang, M.S.1
Lee, C.C.2
Tang, Y.L.3
-
6
-
-
1942423677
-
Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards
-
W. C. Ku and S. M. Chen, Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards, IEEE Transactions on Consumer Electronics, vol. 50, no. 1, pp. 204-207, 2004.
-
(2004)
IEEE Transactions on Consumer Electronics
, vol.50
, Issue.1
, pp. 204-207
-
-
Ku, W.C.1
Chen, S.M.2
-
7
-
-
32444434862
-
Efficient remote mutual authentication and key agreement
-
W. G. Shieh and J. M. Wang, Efficient remote mutual authentication and key agreement, Computers & Security, vol. 25, no. 1, pp. 72-77, 2006.
-
(2006)
Computers & Security
, vol.25
, Issue.1
, pp. 72-77
-
-
Shieh, W.G.1
Wang, J.M.2
-
8
-
-
51849111445
-
Efficient and complete remote authentication scheme with smart cards
-
Taipei, Taiwan, ROC
-
W. G. Shieh and W. B. Horng, Efficient and complete remote authentication scheme with smart cards, Proc. of the 2008 IEEE International Conference on Intelligence and Security Informatics, Taipei, Taiwan, ROC, pp. 122-127, 2008.
-
(2008)
Proc. of the 2008 IEEE International Conference on Intelligence and Security Informatics
, pp. 122-127
-
-
Shieh, W.G.1
Horng, W.B.2
-
9
-
-
77953894144
-
An improvement to Kim-Chung's authentication scheme
-
W. G. Shieh and M. T. Wang, An improvement to Kim-Chung's authentication scheme, ICIC Express Letters, vol. 3, no. 4, pp. 1215-1219, 2009.
-
(2009)
ICIC Express Letters
, vol.3
, Issue.4
, pp. 1215-1219
-
-
Shieh, W.G.1
Wang, M.T.2
-
10
-
-
33751167604
-
Improving the security of 'a flexible biometrics remote user authentication scheme'
-
DOI 10.1016/j.csi.2006.01.002, PII S0920548906000122
-
M. K. Khan and J. Zhang, Improving the security of a flexible biometrics remote user authentication scheme, Computer Standards & Interfaces, vol. 29, no. 1, pp. 82-85, 2007. (Pubitemid 44773789)
-
(2007)
Computer Standards and Interfaces
, vol.29
, Issue.1
, pp. 82-85
-
-
Khan, M.K.1
Zhang, J.2
-
11
-
-
28044451335
-
Robust remote authentication scheme with smart cards
-
C. I. Fan, Y. C. Chan, and Z. K. Zhang, Robust remote authentication scheme with smart cards, Computers & Security, vol. 24, no. 8, pp. 619-628, 2005.
-
(2005)
Computers & Security
, vol.24
, Issue.8
, pp. 619-628
-
-
Fan, C.I.1
Chan, Y.C.2
Zhang, Z.K.3
-
12
-
-
64249169230
-
Weaknesses and improvement of Wang et al.'s remote user password authentication scheme for resource-limited environments
-
H. R. Chung, W. C. Ku, and M. J. Tsaur, Weaknesses and improvement of Wang et al.'s remote user password authentication scheme for resource-limited environments, Computer Standards & Interfaces, vol. 31, no. 4, pp. 863-868, 2009.
-
(2009)
Computer Standards & Interfaces
, vol.31
, Issue.4
, pp. 863-868
-
-
Chung, H.R.1
Ku, W.C.2
Tsaur, M.J.3
-
13
-
-
54349125537
-
A remote user authentication scheme without using smart cards
-
H. S. Rhee, J. O. Kwon, and D. H. Lee, A remote user authentication scheme without using smart cards, Computer Standards & Interfaces, vol. 31, no. 1, pp. 6-13, 2009.
-
(2009)
Computer Standards & Interfaces
, vol.31
, Issue.1
, pp. 6-13
-
-
Rhee, H.S.1
Kwon, J.O.2
Lee, D.H.3
-
14
-
-
0003507850
-
-
Third Ed., Pearson, Upper Saddle River, NJ
-
W. Stallings, Network Security Essentials: Applications and Standards, Third Ed., Pearson, Upper Saddle River, NJ, 2007.
-
(2007)
Network Security Essentials: Applications and Standards
-
-
Stallings, W.1
-
15
-
-
84921068281
-
On the exact security of full domain hash
-
J. S. Coron, On the exact security of full domain hash, CRYPTO 2000 (LNCS 1880), pp. 229-235, 2000.
-
(2000)
CRYPTO 2000 (LNCS 1880)
, pp. 229-235
-
-
Coron, J.S.1
|