-
1
-
-
0019634370
-
Password authentication with insecure communication
-
Nov.
-
L. Lamport, "Password authentication with insecure communication," Commun. ACM, vol.24, no.11, pp.770-772, Nov. 1981.
-
(1981)
Commun. ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
2
-
-
0034140374
-
A new remote user authentication scheme using smart cards
-
M.S. Hwang and L.H. Li, "A new remote user authentication scheme using smart cards," IEEE Trans. Consum. Electron., vol.46, no.1, pp.28-30, 2000.
-
(2000)
IEEE Trans. Consum. Electron.
, vol.46
, Issue.1
, pp. 28-30
-
-
Hwang, M.S.1
Li, L.H.2
-
3
-
-
0036302680
-
An efficient and practical solution to remote authentication smart card
-
H.Y. Chien, J.K. Jan, and Y.M. Tseng, "An efficient and practical solution to remote authentication smart card," Comput. Secur., vol.21, no.4, pp.372-375, 2000.
-
(2000)
Comput. Secur.
, vol.21
, Issue.4
, pp. 372-375
-
-
Chien, H.Y.1
Jan, J.K.2
Tseng, Y.M.3
-
4
-
-
0742268499
-
Security of Chien et al.'s remote user authentication scheme using smart cards
-
C.L. Hsu, "Security of Chien et al.'s remote user authentication scheme using smart cards," Computer Standards & Interfaces, vol.26, no.3, pp.167-169, 2004.
-
(2004)
Computer Standards & Interfaces
, vol.26
, Issue.3
, pp. 167-169
-
-
Hsu, C.L.1
-
5
-
-
4043087111
-
Improved efficient remote user authentication scheme using smart cards
-
S.W. Lee, H.S. Kim, and K.Y. Yoo, "Improved efficient remote user authentication scheme using smart cards," IEEE Trans. Consum. Electron., vol.50, no.2, pp.565-567, 2004.
-
(2004)
IEEE Trans. Consum. Electron.
, vol.50
, Issue.2
, pp. 565-567
-
-
Lee, S.W.1
Kim, H.S.2
Yoo, K.Y.3
-
6
-
-
9544227377
-
Improvement of Chien et al.'s remote user authentication scheme using smart cards
-
S.W. Lee, H.S. Kim, and K.Y. Yoo, "Improvement of Chien et al.'s remote user authentication scheme using smart cards," Computer Standards & Interfaces, vol.27, no.2, pp.181-183, 2005.
-
(2005)
Computer Standards & Interfaces
, vol.27
, Issue.2
, pp. 181-183
-
-
Lee, S.W.1
Kim, H.S.2
Yoo, K.Y.3
-
7
-
-
23944444990
-
More efficient and secure remote user authentication scheme using smart cards
-
Proceedings - 11th International Conference on Parallel and Distributed Systems Workshops, ICPADS 2005
-
E. Yoon and K. Yoo, "More efficient and secure remote user authentication scheme using smart cards," Proc. 11th International Conference on Parallel and Distributed System, vol.2, pp.73-77, 2005. (Pubitemid 41190169)
-
(2005)
Proceedings of the International Conference on Parallel and Distributed Systems - ICPADS
, vol.2
, pp. 73-77
-
-
Yoon, E.-J.1
Yoo, K.-Y.2
-
8
-
-
61849096169
-
More secure remote user authentication scheme
-
S.K. Kim andM.G. Chung, "More secure remote user authentication scheme," Comput. Commun., vol.32, no.6, pp.1018-1021, 2009.
-
(2009)
Comput. Commun.
, vol.32
, Issue.6
, pp. 1018-1021
-
-
Kim, S.K.1
Chung, M.G.2
-
9
-
-
23044436725
-
Weaknesses and drawbacks of a password authentication scheme using neural networks for multiserver architecture
-
W.C. Ku, "Weaknesses and drawbacks of a password authentication scheme using neural networks for multiserver architecture," IEEE Trans. Neural Netw., vol.16, no.4, pp.1002-1005, 2005.
-
(2005)
IEEE Trans. Neural Netw.
, vol.16
, Issue.4
, pp. 1002-1005
-
-
Ku, W.C.1
-
10
-
-
29144514489
-
Cryptanalysis of improvement of password authenticated key exchange based on RSA for imbalanced wireless networks
-
Nov.
-
C.C. Yang and R.C. Wang, "Cryptanalysis of improvement of password authenticated key exchange based on RSA for imbalanced wireless networks," IEICE Trans. Commun., vol.E88-B, no.11, pp.4370-4372, Nov. 2005.
-
(2005)
IEICE Trans. Commun.
, vol.E88-B
, Issue.11
, pp. 4370-4372
-
-
Yang, C.C.1
Wang, R.C.2
-
11
-
-
33747596213
-
Cryptanalysis of two password authenticated key exchange protocols based on RSA
-
DOI 10.1109/LCOMM.2006.1665131
-
T. Cao and D. Lin, "Cryptanalysis of two password authenticated key exchange protocols based on RSA," IEEE Commun. Lett., vol.10, no.8, pp.623-625, 2006. (Pubitemid 44263640)
-
(2006)
IEEE Communications Letters
, vol.10
, Issue.8
, pp. 623-625
-
-
Cao, T.1
Lin, D.2
-
13
-
-
0037282439
-
A password authentication scheme with secure password updating
-
C.L. Lin and T. Hwang, "A password authentication scheme with secure password updating," Comput. Secur., vol.22, no.1, pp.68-72, 2003.
-
(2003)
Comput. Secur.
, vol.22
, Issue.1
, pp. 68-72
-
-
Lin, C.L.1
Hwang, T.2
-
14
-
-
0141642166
-
On the Security of Some Password Authentication Protocols
-
B.T. Hsieh, H.M. Sun, and T. Hwang, "On the security of some password authentication protocols," Informatica, vol.14, no.2, pp.195-204, 2003. (Pubitemid 37189280)
-
(2003)
Informatica
, vol.14
, Issue.2
, pp. 195-204
-
-
Hsieh, B.-T.1
Sun, H.-M.2
Hwang, T.3
-
15
-
-
0037282439
-
A password authentication scheme with secure password updating
-
C.L. Lin and T. Hwang, "A password authentication scheme with secure password updating," Comput. Secur., vol.22, no.1, pp.68-72, 2003.
-
(2003)
Comput. Secur.
, vol.22
, Issue.1
, pp. 68-72
-
-
Lin, C.L.1
Hwang, T.2
-
16
-
-
0027615231
-
Protecting poorly chosen secrets from guessing attacks
-
L. Gong, M.A. Lomas, R.M. Needham, and J.H. Saltzer, "Protecting poorly chosen secrets from guessing attacks," IEEE J. Sel. Areas Commun., vol.11, no.5, pp.648-656, 1993.
-
(1993)
IEEE J. Sel. Areas Commun.
, vol.11
, Issue.5
, pp. 648-656
-
-
Gong, L.1
Lomas, M.A.2
Needham, R.M.3
Saltzer, J.H.4
-
17
-
-
84939573910
-
Differential power analysis
-
P. Kocher, J. Jaffe, and B. Jun, "Differential power analysis," Proc. Advances in Cryptology (CRYPTO'99), pp.388-397, 1999.
-
(1999)
Proc. Advances in Cryptology (CRYPTO'99)
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
18
-
-
0036566408
-
Examining smart-card security under the threat of power analysis attacks
-
DOI 10.1109/TC.2002.1004593
-
T.S. Messerges, E.A. Dabbish, and R.H. Sloan, "Examining smartcard security under the threat of power analysis attacks," IEEE Trans. Comput., vol.51, no.5, pp.541-552, 2002. (Pubitemid 34550462)
-
(2002)
IEEE Transactions on Computers
, vol.51
, Issue.5
, pp. 541-552
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
-
20
-
-
84957018842
-
Low Cost Attacks on Tamper Resistant Devices
-
Security Protocols
-
R. Anderson and M. Kuhn, "Low cost attacks on tamper resistant devices," Proc. 5th International Workshop on Security Protocols, LNCS 1361, pp.125-136, April 1997. (Pubitemid 128023885)
-
(1998)
Lecture Notes in Computer Science
, Issue.1361
, pp. 125-136
-
-
Anderson, R.J.1
Kuhn, M.2
-
22
-
-
38049001489
-
Modeling of man-in-themiddle attack in the wireless networks
-
Z. Chen, S. Guo, K. Zheng, and Y. Yang, "Modeling of man-in-themiddle attack in the wireless networks," Proc. International Conference on Wireless Communications, Networking and Mobile Computing (WiCom'07), pp.2255-2258, 2007.
-
(2007)
Proc. International Conference on Wireless Communications, Networking and Mobile Computing (WiCom'07)
, pp. 2255-2258
-
-
Chen, Z.1
Guo, S.2
Zheng, K.3
Yang, Y.4
-
24
-
-
36849063206
-
Security services in group communications over wireless infrastructure mobile ad hoc, and wireless sensor networks
-
DOI 10.1109/MWC.2007.4396938
-
P. Sakarindr and N. Ansari, "Security services in group communications over wireless infrastructure, mobile ad hoc, and wireless sensor networks," IEEE Wirel. Commun., vol.14, no.5, pp.8-20, 2007. (Pubitemid 350231649)
-
(2007)
IEEE Wireless Communications
, vol.14
, Issue.5
, pp. 8-20
-
-
Sakarindr, P.1
Ansari, N.2
-
25
-
-
35048844178
-
Distributed CA-based PKI for mobile ad hoc networks using elliptic curve cryptography
-
C. Zouridaki, B.L. Mark, K. Gaj, and R.K. Thomas, "Distributed CA-based PKI for mobile ad hoc networks using elliptic curve cryptography," Lect. Notes Comput. Sci., 3093, pp.232-245, 2004.
-
(2004)
Lect. Notes Comput. Sci.
, vol.3093
, pp. 232-245
-
-
Zouridaki, C.1
Mark, B.L.2
Gaj, K.3
Thomas, R.K.4
-
26
-
-
0000523051
-
A logic of authentication
-
M. Burrows, M. Abadi, and R. Needham, "A logic of authentication," Proc. Royal Soc. London A, vol.426, pp.233-271, 1989.
-
(1989)
Proc. Royal Soc. London A
, vol.426
, pp. 233-271
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
|