-
1
-
-
0031257939
-
An authentication technique based on distributed security management for the global mobility network
-
S. Suzukiz and K. Nakada, "An authentication technique based on distributed security management for the global mobility network," IEEE Journal on Selected Areas in Communications, vol. 15, no. 8, pp.1608-1617, 1997.
-
(1997)
IEEE Journal on Selected Areas in Communications
, vol.15
, Issue.8
, pp. 1608-1617
-
-
Suzukiz, S.1
Nakada, K.2
-
2
-
-
0033907037
-
Extensions to an authentication technique proposed for the global mobility network
-
L. Buttyan, C. Gbaguidi, S. Staamann, and U. Wilhelm, "Extensions to an authentication technique proposed for the global mobility network," IEEE Transactions on Communications, vol. 48, no. 3, pp.373-376, 2000.
-
(2000)
IEEE Transactions on Communications
, vol.48
, Issue.3
, pp. 373-376
-
-
Buttyan, L.1
Gbaguidi, C.2
Staamann, S.3
Wilhelm, U.4
-
3
-
-
1942487780
-
A new authentication scheme with anonymity for wireless environments
-
J. Zhu and J. Ma, "A new authentication scheme with anonymity for wireless environments," IEEE Transactions on Consumer Electronics, vol. 50, no. 1, pp.230-234, 2004.
-
(2004)
IEEE Transactions on Consumer Electronics
, vol.50
, Issue.1
, pp. 230-234
-
-
Zhu, J.1
Ma, J.2
-
4
-
-
33750133438
-
Security enhancement on a new authentication scheme with anonymity for wireless environments
-
C. C. Lee, M. S. Hwang, and I. E. Liao, "Security enhancement on a new authentication scheme with anonymity for wireless environments," IEEE Transactions on Consumer Electronics, vol. 53, no. 5, pp.1683-1687, 2006.
-
(2006)
IEEE Transactions on Consumer Electronics
, vol.53
, Issue.5
, pp. 1683-1687
-
-
Lee, C.C.1
Hwang, M.S.2
Liao, I.E.3
-
5
-
-
54949140749
-
A secure authentication scheme with anonymity for wireless communications
-
C. C. Wu, W. B. Lee, and W. J. Tsaur, "A secure authentication scheme with anonymity for wireless communications," IEEE Communication Letter, vol. 12, no. 10, pp.722-723, 2008.
-
(2008)
IEEE Communication Letter
, vol.12
, Issue.10
, pp. 722-723
-
-
Wu, C.C.1
Lee, W.B.2
Tsaur, W.J.3
-
6
-
-
63649131787
-
On the anonymity of some authentication schemes for wireless communications
-
P. Zeng, Z. Cao, K-K. R. Choo, and S. Wang, "On the anonymity of some authentication schemes for wireless communications," IEEE Communication Letter, vol. 13, no. 3, pp.170-171, 2009.
-
(2009)
IEEE Communication Letter
, vol.13
, Issue.3
, pp. 170-171
-
-
Zeng, P.1
Cao, Z.2
Choo, K.-K.R.3
Wang, S.4
-
7
-
-
67649184080
-
Security flaw of authentication scheme with anonymity for wireless communications
-
J.-S. Lee, J. H. Chang, and D. H. Lee, "Security flaw of authentication scheme with anonymity for wireless communications," IEEE Communication Letter, vol. 13, no. 5, pp.292-293, 2009.
-
(2009)
IEEE Communication Letter
, vol.13
, Issue.5
, pp. 292-293
-
-
Lee, J.-S.1
Chang, J.H.2
Lee, D.H.3
-
8
-
-
59649101587
-
Enhanced authentication scheme with anonymity for roaming service in global mobility networks
-
C.-C. Chang, C.-Y. Lee, and Y.-C. Chiu, "Enhanced authentication scheme with anonymity for roaming service in global mobility networks," Computer Communications, vol. 32, no. 4, pp.611-618, 2009.
-
(2009)
Computer Communications
, vol.32
, Issue.4
, pp. 611-618
-
-
Chang, C.-C.1
Lee, C.-Y.2
Chiu, Y.-C.3
-
9
-
-
54449094667
-
A secure dynamic ID based remote user authentication scheme for multi-server environment
-
Y.-P. Liao and S.-S. Wang, "A secure dynamic ID based remote user authentication scheme for multi-server environment," Computer Standards & Interfaces, vol. 31, pp. 24-29, 2009.
-
(2009)
Computer Standards & Interfaces
, vol.31
, pp. 24-29
-
-
Liao, Y.-P.1
Wang, S.-S.2
-
10
-
-
68849128250
-
Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment
-
H.-C. Hsiang and W.-K. Shih, "Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment," Computer Standards & Interfaces, vol. 31, no. 6, pp. 1118-1123, 2009.
-
(2009)
Computer Standards & Interfaces
, vol.31
, Issue.6
, pp. 1118-1123
-
-
Hsiang, H.-C.1
Shih, W.-K.2
-
11
-
-
84855586177
-
Design and validation of an efficient authentication scheme with anonymity for roaming service in global mobility networks
-
DOI: 10.1007/s11277-010-0033-5
-
D. He, S. Chan, C. Chen, J. Bu, R. Fan, "Design and validation of an efficient authentication scheme with anonymity for roaming service in global mobility networks," Wireless Personal Communications, 2010, DOI: 10.1007/s11277-010-0033-5.
-
(2010)
Wireless Personal Communications
-
-
He, D.1
Chan, S.2
Chen, C.3
Bu, J.4
Fan, R.5
-
12
-
-
64249125305
-
An improved smart card based password authentication scheme with provable security
-
J. Xu, W.-T. Zhu, and D.-G. Feng, "An improved smart card based password authentication scheme with provable security," Computer Standards & Interfaces, vol. 31, no. 4, pp.723-728, 2009.
-
(2009)
Computer Standards & Interfaces
, vol.31
, Issue.4
, pp. 723-728
-
-
Xu, J.1
Zhu, W.-T.2
Feng, D.-G.3
-
13
-
-
84939573910
-
Differential power analysis
-
P. Kocher, J. Jaffe, and B. Jun, "Differential power analysis, "In Proc. Advances in Cryptology (CRYPTO'99), pp.388-397, 1999.
-
(1999)
Proc. Advances in Cryptology (CRYPTO'99)
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
14
-
-
0036566408
-
Examining smart-card security under the threat of power analysis attacks
-
T. S. Messerges, E. A. Dabbish, and R. H. Sloan, "Examining smart-card security under the threat of power analysis attacks," IEEE Transactions on Computer, vol. 51, no. 5, pp. 541-552, 2002.
-
(2002)
IEEE Transactions on Computer
, vol.51
, Issue.5
, pp. 541-552
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
-
15
-
-
0003629990
-
-
National Institute of Standards and Technology, U.S. Department of Commerce, "," U.S. Federal Information Processing Standard Publication 180-2
-
National Institute of Standards and Technology, U.S. Department of Commerce, "Secure Hash Standard," U.S. Federal Information Processing Standard Publication 180-2, 2002.
-
(2002)
Secure Hash Standard
-
-
-
16
-
-
33845214903
-
Cryptanalysis of a flexible remote user authentication scheme using smart cards
-
W.-C. Ku and S.-M. Chen, "Cryptanalysis of a flexible remote user authentication scheme using smart cards," ACM Operating Systems Review, vol.39, no. 1, pp. 90-96, 2005.
-
(2005)
ACM Operating Systems Review
, vol.39
, Issue.1
, pp. 90-96
-
-
Ku, W.-C.1
Chen, S.-M.2
-
17
-
-
67649354423
-
Design and verification of enhanced secure localization scheme in wireless sensor networks
-
D. He, L. Cui, H. Huang, and M. Ma, "Design and verification of enhanced secure localization scheme in wireless sensor networks," IEEE Transactions on Parallel and Distributed Systems, vol. 20, no. 7, pp. 1050-1058, 2009.
-
(2009)
IEEE Transactions on Parallel and Distributed Systems
, vol.20
, Issue.7
, pp. 1050-1058
-
-
He, D.1
Cui, L.2
Huang, H.3
Ma, M.4
-
18
-
-
68949121318
-
Secure and efficient localization scheme in ultra-wideband sensor networks
-
D. He, L. Cui, H. Huang, and M. Ma, "Secure and efficient localization scheme in ultra-wideband sensor networks," Wireless Personal Communications, vol. 50, no. 4, pp. 545-561, 2009.
-
(2009)
Wireless Personal Communications
, vol.50
, Issue.4
, pp. 545-561
-
-
He, D.1
Cui, L.2
Huang, H.3
Ma, M.4
-
19
-
-
78650459565
-
An enhanced two-factor user authentication scheme in wireless sensor networks
-
to appear
-
D. He, Y. Gao, S. Chan, C. Chen, and J. Bu, "An enhanced two-factor user authentication scheme in wireless sensor networks," Ad Hoc & Sensor Wireless Networks, to appear, 2010.
-
(2010)
Ad Hoc & Sensor Wireless Networks
-
-
He, D.1
Gao, Y.2
Chan, S.3
Chen, C.4
Bu, J.5
-
20
-
-
0017018484
-
New directions in cryptography
-
W. Diffie and M. Hellman, "New directions in cryptography," IEEE Transactions on Information Theory, vol. 22, no. 6, pp.644-654, 1976.
-
(1976)
IEEE Transactions on Information Theory
, vol.22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.2
-
21
-
-
0042913090
-
A secure and efficient conference scheme for mobile communications
-
X. Yi, C. K. Siew, and C. H. Tan, "A secure and efficient conference scheme for mobile communications," IEEE Transactions on Vehicular Technology, vol. 52, no. 4, pp.784-793, 2003.
-
(2003)
IEEE Transactions on Vehicular Technology
, vol.52
, Issue.4
, pp. 784-793
-
-
Yi, X.1
Siew, C.K.2
Tan, C.H.3
-
22
-
-
0003614758
-
Digital signature and public key functions as intractable as factorization
-
M. O. Rabin, "Digital signature and public key functions as intractable as factorization," MIT Laboratory Computer Science, MIT/LCS/TR-212, 1979.
-
(1979)
MIT Laboratory Computer Science, MIT/LCS/TR-212
-
-
Rabin, M.O.1
-
23
-
-
0019080452
-
A modification of the RSA public key encryption procedure
-
H. C.Williams, "A modification of the RSA public key encryption procedure," IEEE Transactions on Information Theory, vol. 26, no. 6, pp. 726-729, 1980.
-
(1980)
IEEE Transactions on Information Theory
, vol.26
, Issue.6
, pp. 726-729
-
-
Williams, H.C.1
-
24
-
-
0041619709
-
Integer factoring
-
Mar.
-
A. K. Lenstra, "Integer factoring, "Design, Code and Cryptography, vol. 19, no. 2/3, pp. 101-128, Mar. 2000.
-
(2000)
Design, Code and Cryptography
, vol.19
, Issue.2-3
, pp. 101-128
-
-
Lenstra, A.K.1
-
25
-
-
84956985315
-
Recent progress and prospects for integer factorization algorithm
-
Sydney, Australia, July
-
R. P. Brent, 'Recent progress and prospects for integer factorization algorithm," In Proc. COCOON2000, Sydney, Australia, pp. 3-22, July 2000.
-
(2000)
Proc. COCOON2000
, pp. 3-22
-
-
Brent, R.P.1
-
26
-
-
78650450336
-
-
"OpenSSL," http://www.openssl.org.
-
OpenSSL
-
-
|