-
1
-
-
0346895307
-
Authentication protocol providing user anonymity and untraceability in wireless mobile communication systems
-
C.-S. Park Authentication protocol providing user anonymity and untraceability in wireless mobile communication systems Computer Networks 44 2004 267 273
-
(2004)
Computer Networks
, vol.44
, pp. 267-273
-
-
Park, C.-S.1
-
2
-
-
0036302680
-
An efficient and practical solution to remote authentication: Smart card
-
H.-Y. Chien, J.-K. Jan, and Y.-M. Tseng An efficient and practical solution to remote authentication: smart card Computers & Security 21 4 2002 372 375
-
(2002)
Computers & Security
, vol.21
, Issue.4
, pp. 372-375
-
-
Chien, H.-Y.1
Jan, J.-K.2
Tseng, Y.-M.3
-
3
-
-
33750133438
-
Security enhancement on a new authentication scheme with anonymity for wireless environments
-
C.C. Lee, M.S. Hwang, and I.E. Liao Security enhancement on a new authentication scheme with anonymity for wireless environments IEEE Transactions on Consumer Electronics 53 5 2006 1683 1687
-
(2006)
IEEE Transactions on Consumer Electronics
, vol.53
, Issue.5
, pp. 1683-1687
-
-
Lee, C.C.1
Hwang, M.S.2
Liao, I.E.3
-
4
-
-
54949140749
-
A secure authentication scheme with anonymity for wireless communications
-
C.C. Wu, W.B. Lee, and W.J. Tsaur A secure authentication scheme with anonymity for wireless communications IEEE Communication Letter 12 10 2008 722 723
-
(2008)
IEEE Communication Letter
, vol.12
, Issue.10
, pp. 722-723
-
-
Wu, C.C.1
Lee, W.B.2
Tsaur, W.J.3
-
5
-
-
63649131787
-
On the anonymity of some authentication schemes for wireless communications
-
P. Zeng, Z. Cao, K.-K.R. Choo, and S. Wang On the anonymity of some authentication schemes for wireless communications IEEE Communication Letter 13 3 2009 170 171
-
(2009)
IEEE Communication Letter
, vol.13
, Issue.3
, pp. 170-171
-
-
Zeng, P.1
Cao, Z.2
Choo, K.-K.R.3
Wang, S.4
-
6
-
-
67649184080
-
Security flaw of authentication scheme with anonymity for wireless communications
-
J.-S. Lee, J.H. Chang, and D.H. Lee Security flaw of authentication scheme with anonymity for wireless communications IEEE Communication Letter 13 5 2009 292 293
-
(2009)
IEEE Communication Letter
, vol.13
, Issue.5
, pp. 292-293
-
-
Lee, J.-S.1
Chang, J.H.2
Lee, D.H.3
-
7
-
-
68949149518
-
Security flaws in authentication protocols with anonymity for wireless environments
-
J. Xu, and D. Feng Security flaws in authentication protocols with anonymity for wireless environments ETRI Journal 31 4 2009 460 462
-
(2009)
ETRI Journal
, vol.31
, Issue.4
, pp. 460-462
-
-
Xu, J.1
Feng, D.2
-
8
-
-
49849096355
-
Efficient multi-server authentication scheme based on one-way hash function without verification table
-
J.-L. Tsai Efficient multi-server authentication scheme based on one-way hash function without verification table Computers & Security 27 3-4 2008 115 121
-
(2008)
Computers & Security
, vol.27
, Issue.34
, pp. 115-121
-
-
Tsai, J.-L.1
-
9
-
-
54449094667
-
A secure dynamic ID based remote user authentication scheme for multi-server environment
-
Y.-P. Liao, and S.-S. Wang A secure dynamic ID based remote user authentication scheme for multi-server environment Computer Standards & Interfaces 31 1 2009 24 29
-
(2009)
Computer Standards & Interfaces
, vol.31
, Issue.1
, pp. 24-29
-
-
Liao, Y.-P.1
Wang, S.-S.2
-
10
-
-
68849128250
-
Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment
-
H.-C. Hsiang, and W.-K. Shih Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment Computer Standards & Interfaces 31 6 2009
-
(2009)
Computer Standards & Interfaces
, vol.31
, Issue.6
-
-
Hsiang, H.-C.1
Shih, W.-K.2
-
11
-
-
0036566408
-
Examining smart-card security under the threat of power analysis attacks
-
T.S. Messerges, E.A. Dabbish, and R.H. Sloan Examining smart-card security under the threat of power analysis attacks IEEE Transactions on Computer 51 5 2002 541 552
-
(2002)
IEEE Transactions on Computer
, vol.51
, Issue.5
, pp. 541-552
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
-
12
-
-
84939573910
-
Differential power analysis
-
P. Kocher, J. Jaffe, B. Jun, Differential power analysis, in: Proceeding of the Advances in Cryptology (CRYPTO'99), 1999, pp. 388-397.
-
(1999)
Proceeding of the Advances in Cryptology (CRYPTO'99)
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
13
-
-
78751642913
-
-
National Institute of Standards and Technology, US Department of Commerce, Secure Hash Standard, US Federal Information Processing Standard Publication 180-2, 2002
-
National Institute of Standards and Technology, US Department of Commerce, Secure Hash Standard, US Federal Information Processing Standard Publication 180-2, 2002.
-
-
-
-
15
-
-
33645091897
-
Sizzle: A standards-based end-to-end security architecture for the embedded Internet
-
V. Gupta, and M. Wurm Sizzle: a standards-based end-to-end security architecture for the embedded Internet Pervasive and Mobile Computing 1 4 2005 425 445
-
(2005)
Pervasive and Mobile Computing
, vol.1
, Issue.4
, pp. 425-445
-
-
Gupta, V.1
Wurm, M.2
-
17
-
-
85008955601
-
Efficient implementation of public key cryptosystems on mote sensors
-
H. Wang, Q. Li, Efficient implementation of public key cryptosystems on mote sensors, in: Proceeding of Eighth International Conference on Information and Communications Security (ICICS 2006), LNCS, vol. 4307, 2006, pp. 519-528.
-
(2006)
Proceeding of Eighth International Conference on Information and Communications Security (ICICS 2006), LNCS
, vol.4307
, pp. 519-528
-
-
Wang, H.1
Li, Q.2
|