-
1
-
-
0025474612
-
Smart cards provide very high security and flexibility in subscribers management
-
P. Peyret, G. Lisimaque, T.Y. Chua, "Smart cards provide very high security and flexibility in subscribers management," IEEE Transactions on Consumer Electronics, Vol. 36, No. 3, pp. 744-752, 1990.
-
(1990)
IEEE Transactions on Consumer Electronics
, vol.36
, Issue.3
, pp. 744-752
-
-
Peyret, P.1
Lisimaque, G.2
Chua, T.Y.3
-
2
-
-
0040545605
-
The future is in the pc cards
-
D. Sternglass, "The future is in the pc cards," IEEE Spectrum, Vol. 29, No. 6, pp. 46-50, 1992.
-
(1992)
IEEE Spectrum
, vol.29
, Issue.6
, pp. 46-50
-
-
Sternglass, D.1
-
3
-
-
0019634370
-
Password authentication with insecure communication
-
L. Lamport, "Password authentication with insecure communication," Communications of the ACM, Vol. 24, pp. 770-772, 1981.
-
(1981)
Communications of the ACM
, vol.24
, pp. 770-772
-
-
Lamport, L.1
-
4
-
-
0034318245
-
An efficient remote user authentication scheme using smart cards
-
November
-
H.M. Sun, "An efficient remote user authentication scheme using smart cards," IEEE Transactions on Consumer Electronics, Vol. 46, No. 4, pp. 958-961, November 2000.
-
(2000)
IEEE Transactions on Consumer Electronics
, vol.46
, Issue.4
, pp. 958-961
-
-
Sun, H.M.1
-
5
-
-
0036302680
-
An efficient and practical solution to remote authentication: Smart card
-
H.Y. Chien, J.K. Jan, Y.H. Tseng, "An efficient and practical solution to remote authentication: smart card," Computers and Security. Vol. 21, No. 4, pp. 372-375, 2002.
-
(2002)
Computers and Security
, vol.21
, Issue.4
, pp. 372-375
-
-
Chien, H.Y.1
Jan, J.K.2
Tseng, Y.H.3
-
6
-
-
0742268499
-
Security of Chien et al's remote user authentication scheme using smart card
-
C.L. Hsu, "Security of Chien et al's remote user authentication scheme using smart card," Computer Standards and Interfaces, Vol. 26, pp. 167-169, 2004.
-
(2004)
Computer Standards and Interfaces
, vol.26
, pp. 167-169
-
-
Hsu, C.L.1
-
7
-
-
1542335451
-
Efficient password authenticated key agreement using smart cards
-
W.S. Juang, "Efficient password authenticated key agreement using smart cards," Computers and Security, Vol. 23, pp. 167-173, 2004.
-
(2004)
Computers and Security
, vol.23
, pp. 167-173
-
-
Juang, W.S.1
-
8
-
-
32444434862
-
Efficient remote mutual authentication and key agreement
-
W.G. Shieh, J.M. Wang, "Efficient remote mutual authentication and key agreement," Computers and Security, Vol. 25, pp. 72-77, 2006.
-
(2006)
Computers and Security
, vol.25
, pp. 72-77
-
-
Shieh, W.G.1
Wang, J.M.2
-
9
-
-
33646477537
-
An efficient and complete remote user authentication scheme using smart cards
-
H.T. Liaw, J.F. Lin, W.C. Wu, "An efficient and complete remote user authentication scheme using smart cards," Mathematical and Computer Modelling, vol. 44, pp. 223-228, 2006.
-
(2006)
Mathematical and Computer Modelling
, vol.44
, pp. 223-228
-
-
Liaw, H.T.1
Lin, J.F.2
Wu, W.C.3
-
10
-
-
34247505487
-
-
T.F. Cheng, J.S. Lee, C.C. Chang, "Security enhancement of an IC-card-based remote login mechanism Computer Networks," Vol. 51, No. 9, pp. 2280-2287, 2007.
-
(2007)
Security Enhancement of An IC-card-based Remote Login Mechanism Computer Networks
, vol.51
, Issue.9
, pp. 2280-2287
-
-
Cheng, T.F.1
Lee, J.S.2
Chang, C.C.3
-
11
-
-
34248666700
-
Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards
-
DOI 10.1016/j.csi.2006.11.005, PII S0920548906001322
-
X.M. Wang, W.F. Zhang, J.S. Zhang, M.K. Khan, "Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards," Computer Standards & Interfaces, Vol. 29, No. 5, pp. 507-512, 2007. (Pubitemid 46771122)
-
(2007)
Computer Standards and Interfaces
, vol.29
, Issue.5
, pp. 507-512
-
-
Wang, X.-M.1
Zhang, W.-F.2
Zhang, J.-S.3
Khan, M.K.4
-
12
-
-
52949137008
-
Two-factor mutual authentication based on smart cards and passwords
-
G. Yang, D.S. Wong, H. Wang, X. Deng, "Two-factor mutual authentication based on smart cards and passwords," Journal of Computer and System Sciences, Vol. 74, No. 7, pp. 1160-1172, 2008.
-
(2008)
Journal of Computer and System Sciences
, vol.74
, Issue.7
, pp. 1160-1172
-
-
Yang, G.1
Wong, D.S.2
Wang, H.3
Deng, X.4
-
13
-
-
64249125305
-
An improved smart card based password authentication scheme with provable security
-
J. Xu, W.T. Zhu, D.G. Feng, "An improved smart card based password authentication scheme with provable security," Computer Standards & Interfaces, Vol. 31, pp. 723-728, 2009.
-
(2009)
Computer Standards & Interfaces
, vol.31
, pp. 723-728
-
-
Xu, J.1
Zhu, W.T.2
Feng, D.G.3
-
15
-
-
29144444418
-
Vulnerabilities of Wu-Chieu's improved password authentication scheme using smart cards
-
November
-
W.C. Ku, H.M. Chuang, M.J. Tsaur, "Vulnerabilities of Wu-Chieu's improved password authentication scheme using smart cards," IEICE Trans. Fundamentals, Vol. E88-A, No. 11, pp. 3241-3243, November 2005.
-
(2005)
IEICE Trans. Fundamentals
, vol.E88-A
, Issue.11
, pp. 3241-3243
-
-
Ku, W.C.1
Chuang, H.M.2
Tsaur, M.J.3
-
16
-
-
52249090059
-
Two security problems of efficient remote mutual authentication and key agreement
-
Jeju, Korea
-
E.J. Yoon, K.Y. Yoo, "Two security problems of efficient remote mutual authentication and key agreement," IEEE Proceedings of Future Generation Communication And Networking (FGCN'07), Vol. 2, pp. 66-70, Jeju, Korea, 2007.
-
(2007)
IEEE Proceedings of Future Generation Communication and Networking (FGCN'07)
, vol.2
, pp. 66-70
-
-
Yoon, E.J.1
Yoo, K.Y.2
-
17
-
-
85015402934
-
Uses of elliptic curves in cryptography
-
Santa Barbara, USA
-
V. Miller, "Uses of elliptic curves in cryptography," Proceedings of Crypto'85, Santa Barbara, USA, pp. 417-426, 1986.
-
(1986)
Proceedings of Crypto'85
, pp. 417-426
-
-
Miller, V.1
-
18
-
-
84968503742
-
Elliptic curve cryptosystems
-
N. Koblitz, "Elliptic Curve Cryptosystems," Mathematics of Computation, Vol. 48, pp. 203-209, 1987.
-
(1987)
Mathematics of Computation
, vol.48
, pp. 203-209
-
-
Koblitz, N.1
-
19
-
-
0002956095
-
CM-curves with good cryptographic properties
-
Santa Barbara, USA
-
N. Koblitz, "CM-curves with good cryptographic properties," Proceedings of Crypto'91, Santa Barbara, USA, 1992.
-
(1992)
Proceedings of Crypto'91
-
-
Koblitz, N.1
-
20
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
R.M. Needham, M.D. Schroeder, "Using encryption for authentication in large networks of computers," Communications of the ACM, Vol. 21, No. 12, pp. 993-999, 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.M.1
Schroeder, M.D.2
-
21
-
-
79955422068
-
-
Certicom Research Standard for efficient cryptography, SEC 1: EC Cryptography, Ver.1.0, 2000
-
Certicom Research, Standard for efficient cryptography, SEC 1: EC Cryptography, Ver. 1.0, 2000.
-
-
-
-
23
-
-
0017018484
-
New directions in cryptography
-
W. Diffie, M. Hellman, "New directions in cryptography," IEEE Transaction on Information Theory, Vol. IT-22, No. 6, 1976. 644-654
-
(1976)
IEEE Transaction on Information Theory
, vol.IT-22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.2
-
25
-
-
0027662341
-
Reducing elliptic curve logarithms to logarithms in a finite field
-
A. Menezes, T. Okamoto, S. Vanstone, "Reducing elliptic curve logarithms to logarithms in a finite field," IEEE Transactions on Information Theory, Vol. 39, pp. 1639-1646, 1993.
-
(1993)
IEEE Transactions on Information Theory
, vol.39
, pp. 1639-1646
-
-
Menezes, A.1
Okamoto, T.2
Vanstone, S.3
-
26
-
-
84968502759
-
A remark concerning m-divisibility and the discrete logarithm in the divisor class group of curves
-
G. Frey, H. Ruck, "A remark concerning m-divisibility and the discrete logarithm in the divisor class group of curves," Mathematics of Computation, Vol. 62, pp. 865-874, 1994.
-
(1994)
Mathematics of Computation
, vol.62
, pp. 865-874
-
-
Frey, G.1
Ruck, H.2
|