-
1
-
-
78049329614
-
Security enhan-cement on an improvement on two remote user authentication schemes using smart cards
-
April
-
T.H. Chen, H.C. Hsiang, W.K. Shih. Security enhan-cement on an improvement on two remote user authentication schemes using smart cards. Future Generation Computer Systems, 27(4), April, 2011, 377-380.
-
(2011)
Future Generation Computer Systems
, vol.27
, Issue.4
, pp. 377-380
-
-
Chen, T.H.1
Hsiang, H.C.2
Shih, W.K.3
-
2
-
-
0036302680
-
An efficient and practical solution to remote authentication: Smart card
-
H.Y. Chien, J.K. Jan, Y.M. Tseng. An efficient and practical solution to remote authentication: smart card. Computers and Security, 21(4), 2002, 372-375.
-
(2002)
Computers and Security
, vol.21
, Issue.4
, pp. 372-375
-
-
Chien, H.Y.1
Jan, J.K.2
Tseng, Y.M.3
-
3
-
-
0034140374
-
A new remote user authentica-tion scheme using smart cards
-
M.S. Hwang, L.H. Li. A new remote user authentica-tion scheme using smart cards, IEEE Transactions on Consumer Electronics, 46(1), 2000, 28-30.
-
(2000)
IEEE Transactions on Consumer Electronics
, vol.46
, Issue.1
, pp. 28-30
-
-
Hwang, M.S.1
Li, L.H.2
-
4
-
-
0742268499
-
Security of Chien et al.'s remote user authentication scheme using smart cards
-
C.L. Hsu. Security of Chien et al.'s remote user authentication scheme using smart cards, Computer Standards and Interfaces, 26(3), 2004, 167-169.
-
(2004)
Computer Standards and Interfaces
, vol.26
, Issue.3
, pp. 167-169
-
-
Hsu, C.L.1
-
5
-
-
0002063278
-
Paramita wisdom password authentication scheme without verification tables
-
J.K. Jan, Y.Y. Chen. "Paramita wisdom" password authentication scheme without verification tables. The Journal of Systems and Software, 42(1), 1998, 45-57.
-
(1998)
The Journal of Systems and Software
, vol.42
, Issue.1
, pp. 45-57
-
-
Jan, J.K.1
Chen, Y.Y.2
-
7
-
-
0019634370
-
Password authentication with insecure communication
-
L. Lamport. Password authentication with insecure communication. Communications of the ACM, 24(11), 1981, 770-772.
-
(1981)
Communications of the ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
8
-
-
79951813707
-
An extended certificate-based authentication and security protocol for mobile networks
-
C.C. Lee, I.E. Liao, M.S. Hwang. An extended certificate-based authentication and security protocol for mobile networks. Information Technology and Control, 38(1), 2009, 61-66.
-
(2009)
Information Technology and Control
, vol.38
, Issue.1
, pp. 61-66
-
-
Lee, C.C.1
Liao, I.E.2
Hwang, M.S.3
-
9
-
-
79957605527
-
An improvement of remote authentication and key agree-ment schemes
-
article in press
-
C.C. Lee, C.T. Li, K.Y. Huang, S.Y. Huang. An improvement of remote authentication and key agree-ment schemes. Journal of Circuits, Systems, and Com-puters, article in press, 2011.
-
(2011)
Journal of Circuits, Systems, and Com-puters
-
-
Lee, C.C.1
Li, C.T.2
Huang, K.Y.3
Huang, S.Y.4
-
10
-
-
77952689504
-
A key agree-ment scheme for satellite communications
-
C. C. Lee, T. C. Lin and M. S. Hwang. A key agree-ment scheme for satellite communications. Informa-tion Technology and Control, 39(1), 2010, 43-47.
-
(2010)
Informa-tion Technology and Control
, vol.39
, Issue.1
, pp. 43-47
-
-
Lee, C.C.1
Lin, T.C.2
Hwang, M.S.3
-
11
-
-
57049115409
-
Further improve-ment on a novel privacy preserving authentication and access control scheme for pervasive computing envi-ronments
-
C.T. Li, M.S. Hwang, Y.P. Chu. Further improve-ment on a novel privacy preserving authentication and access control scheme for pervasive computing envi-ronments. Computer Communications, 31(18), 2008, 4255-4258.
-
(2008)
Computer Communications
, vol.31
, Issue.18
, pp. 4255-4258
-
-
Li, C.T.1
Hwang, M.S.2
Chu, Y.P.3
-
12
-
-
46749099079
-
A secure and effi-cient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks
-
C.T. Li, M.S. Hwang, Y.P. Chu. A secure and effi-cient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks. Computer Communications, 31(12), 2008, 2803-2814.
-
(2008)
Computer Communications
, vol.31
, Issue.12
, pp. 2803-2814
-
-
Li, C.T.1
Hwang, M.S.2
Chu, Y.P.3
-
13
-
-
70349788391
-
An enhanced remote user authentication scheme providing mutual authentication and key agreement with smart cards
-
Li. An enhanced remote user authentication scheme providing mutual authentication and key agreement with smart cards. In Proceedings of The International Conference on Information Assurance and Security, IEEE CS, 2009, 517-529.
-
(2009)
In Proceedings of the International Conference on Information Assurance and Security, IEEE CS
, pp. 517-529
-
-
-
14
-
-
70349809938
-
Cryptanalysis of threshold pass-word authentication against guessing attacks in ad hoc networks
-
C.T. Li, Y.P. Chu. Cryptanalysis of threshold pass-word authentication against guessing attacks in ad hoc networks. International Journal of Network Security, 8(2), 2009, 166-168.
-
(2009)
International Journal of Network Security
, vol.8
, Issue.2
, pp. 166-168
-
-
Li, C.T.1
Chu, Y.P.2
-
15
-
-
69949155644
-
An efficient sensor-to-sensor authenticated path-key establishment scheme for secure communications in wireless sensor net-works
-
C.T. Li, M.S. Hwang, Y.P. Chu. An efficient sensor-to-sensor authenticated path-key establishment scheme for secure communications in wireless sensor net-works. International Journal of Innovative Computing, Information and Control, 5(8), 2009, 2107-2124.
-
(2009)
International Journal of Innovative Computing, Information and Control
, vol.5
, Issue.8
, pp. 2107-2124
-
-
Li, C.T.1
Hwang, M.S.2
Chu, Y.P.3
-
16
-
-
74349090986
-
A secure event update protocol for peer-to-peer massively multiplayer online games against masquerade attacks
-
C.T. Li, C.H. Wei, Y.H. Chin. A secure event update protocol for peer-to-peer massively multiplayer online games against masquerade attacks. International Jour-nal of Innovative Computing, Information and Cont-rol, 5(12(A)), 2009, 4715-4723.
-
(2009)
International Jour-nal of Innovative Computing, Information and Cont-rol
, vol.5
, Issue.12 A
, pp. 4715-4723
-
-
Li, C.T.1
Wei, C.H.2
Chin, Y.H.3
-
17
-
-
70349792182
-
An efficient biometrics-based remote user authentication scheme using smart cards
-
C.T. Li, M.S. Hwang. An efficient biometrics-based remote user authentication scheme using smart cards. Journal of Network and Computer Applications, 33(1), 2010, 1-5.
-
(2010)
Journal of Network and Computer Applications
, vol.33
, Issue.1
, pp. 1-5
-
-
Li, C.T.1
Hwang, M.S.2
-
18
-
-
77952997430
-
An online biometrics-based secret sharing scheme for multiparty cryptosystem using smart cards
-
C.T. Li, M.S. Hwang. An online biometrics-based secret sharing scheme for multiparty cryptosystem using smart cards. International Journal of Innovative Computing, Information and Control, 6(5), 2010, 2181-2188.
-
(2010)
International Journal of Innovative Computing, Information and Control
, vol.6
, Issue.5
, pp. 2181-2188
-
-
Li, C.T.1
Hwang, M.S.2
-
19
-
-
79957680480
-
A novel user authentication and privacy preserving scheme with smart cards for wire-less communications
-
C.T. Li, C.C. Lee. A novel user authentication and privacy preserving scheme with smart cards for wire-less communications. Mathematical and Computer Modelling, article in press, 2011.
-
(2011)
Mathematical and Computer Modelling, Article in Press
-
-
Li, C.T.1
Lee, C.C.2
-
20
-
-
0036566408
-
Exami-ning smart-card security under the threat of power analysis attacks
-
T.S. Messerges, E.A. Dabbish, R.H. Sloan. Exami-ning smart-card security under the threat of power analysis attacks. IEEE Transactions on Computers, 51(5), 2002, 541-552.
-
(2002)
IEEE Transactions on Computers
, vol.51
, Issue.5
, pp. 541-552
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
-
21
-
-
77955312905
-
Advanced smart card based password authentication protocol
-
R. Song. Advanced smart card based password authentication protocol. Computer Standards and In-terfaces, 32(5-6), 2010, 321-325.
-
(2010)
Computer Standards and In-terfaces
, vol.32
, Issue.5-6
, pp. 321-325
-
-
Song, R.1
-
22
-
-
33746686217
-
Password-based authentication and key distribution protocols with perfect forward secrecy
-
H.M. Sun, H.T. Yeh. Password-based authentication and key distribution protocols with perfect forward secrecy. Journal of Computer and System Sciences, 72(6), 2006, 1002-1011.
-
(2006)
Journal of Computer and System Sciences
, vol.72
, Issue.6
, pp. 1002-1011
-
-
Sun, H.M.1
Yeh, H.T.2
-
23
-
-
77952677593
-
Weaknesses and improvement of Hsu-Chuang's user identification scheme
-
J.L. Tsai. Weaknesses and improvement of Hsu-Chuang's user identification scheme. Information Technology and Control, 39(1), 2010, 48-50.
-
(2010)
Information Technology and Control
, vol.39
, Issue.1
, pp. 48-50
-
-
Tsai, J.L.1
-
24
-
-
34248666700
-
Cryptanalysis and improvement on two efficient re-mote user authentication scheme using smart cards
-
X.M. Wang, W.F. Zhang, J.S. Zhang, M.K. Khan. Cryptanalysis and improvement on two efficient re-mote user authentication scheme using smart cards, Computer Standards and Interfaces, 29(5), 2007, 507-512.
-
(2007)
Computer Standards and Interfaces
, vol.29
, Issue.5
, pp. 507-512
-
-
Wang, X.M.1
Zhang, W.F.2
Zhang, J.S.3
Khan, M.K.4
-
25
-
-
78751645363
-
Robust authenti-cation and key agreement scheme preserving the privacy of secret key
-
R.C. Wang, W.S. Juang, C.L. Lei. Robust authenti-cation and key agreement scheme preserving the privacy of secret key. Computer Communications, 34(3), 2011, 274-280.
-
(2011)
Computer Communications
, vol.34
, Issue.3
, pp. 274-280
-
-
Wang, R.C.1
Juang, W.S.2
Lei, C.L.3
|