-
1
-
-
0019634370
-
Password authentication with insecure communication
-
Lamport, L.: Password authentication with insecure communication. Communications of the ACM 24(11), 770-772 (1981)
-
(1981)
Communications of the ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
3
-
-
73149093942
-
Efficient user authentication and key agreement with user privacy protection
-
Juang, W.S., Wu, J.L.: Efficient user authentication and key agreement with user privacy protection. International Journal of Network Security 7, 120-129 (2008)
-
(2008)
International Journal of Network Security
, vol.7
, pp. 120-129
-
-
Juang, W.S.1
Wu, J.L.2
-
5
-
-
0742325040
-
Analysis of the SPEKE password-authenticated key exchange protocol
-
Zhang, M.: Analysis of the SPEKE password-authenticated key exchange protocol. IEEE Communications Letters 8(1), 63-65 (2004)
-
(2004)
IEEE Communications Letters
, vol.8
, Issue.1
, pp. 63-65
-
-
Zhang, M.1
-
7
-
-
79960344466
-
A security-enhanced remote platform integrity attestation scheme
-
Cheng, S., Bing, L., Yang, X., Yixian, Y., Zhongxian, L., Han, Y.: A security-enhanced remote platform integrity attestation scheme. In: Wireless Communications, Networking and Mobile Computing (WiCom 2009), vol. 4, pp. 24-26 (2009)
-
(2009)
Wireless Communications, Networking and Mobile Computing (WiCom 2009)
, vol.4
, pp. 24-26
-
-
Cheng, S.1
Bing, L.2
Yang, X.3
Yixian, Y.4
Zhongxian, L.5
Han, Y.6
-
8
-
-
79953218276
-
A robust integrity reporting protocol for remote attestation
-
Stumpf, F., Tafreschi, O., Röder, P., Eckert, C.: A robust integrity reporting protocol for remote attestation. In: Proceedings of the Workshop on Advances in Trusted Computing, WATC (2006)
-
Proceedings of the Workshop on Advances in Trusted Computing, WATC (2006)
-
-
Stumpf, F.1
Tafreschi, O.2
Röder, P.3
Eckert, C.4
-
9
-
-
0030261758
-
Strong password-only authenticated key exchange
-
Jablon, D.: Strong password-only authenticated key exchange. SIGCOMM Computing Communication 26(5) (1996)
-
(1996)
SIGCOMM Computing Communication
, vol.26
, Issue.5
-
-
Jablon, D.1
-
10
-
-
34548299804
-
Improved remote user authentication scheme preserving user anonymity
-
Hu, L., Yang, Y., Niu, X.: Improved remote user authentication scheme preserving user anonymity. In: Communication Networks and Services Research (CNSR 2007), pp. 323-328 (2007)
-
(2007)
Communication Networks and Services Research (CNSR 2007)
, pp. 323-328
-
-
Hu, L.1
Yang, Y.2
Niu, X.3
-
11
-
-
54449094667
-
A secure dynamic ID based remote user authentication scheme for multi-server environment
-
Liao, Y.P., Wang, S.-S.: A secure dynamic ID based remote user authentication scheme for multi-server environment. Computer Standards & Interfaces 31(1), 24-29 (2009)
-
(2009)
Computer Standards & Interfaces
, vol.31
, Issue.1
, pp. 24-29
-
-
Liao, Y.P.1
Wang, S.-S.2
-
12
-
-
33744462119
-
A remote authentication scheme preserving user anonymity
-
Chien, H.-Y., Chen, C.-H.: A remote authentication scheme preserving user anonymity. In: Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), Washington, USA, vol. 2, pp. 245-248 (2005)
-
(2005)
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), Washington, USA
, vol.2
, pp. 245-248
-
-
Chien, H.-Y.1
Chen, C.-H.2
-
13
-
-
33749681217
-
Efficient password-based authentication and key exchange scheme preserving user privacy
-
Cheng, X., Li, W., Znati, T. (eds.) WASA 2006. Springer, Heidelberg
-
Chai, Z., Cao, Z.-F., Lu, R.: Efficient password-based authentication and key exchange scheme preserving user privacy. In: Cheng, X., Li, W., Znati, T. (eds.) WASA 2006. LNCS, vol. 4138, pp. 467-477. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4138
, pp. 467-477
-
-
Chai, Z.1
Cao, Z.-F.2
Lu, R.3
-
14
-
-
21644486314
-
-
Trusted Computing Group: specification revision 1.4
-
Trusted Computing Group: TCG specification architecture overview, specification revision 1.4 (2007)
-
(2007)
TCG Specification Architecture Overview
-
-
-
15
-
-
79960342820
-
-
TrustedGrub
-
TrustedGrub, http://www.sirrix.com/content/pages/trustedgrub.htm
-
-
-
-
17
-
-
54249165796
-
-
IBM Press
-
Challener, D., Yoder, K., Catherman, R., Safford, D., Doorn, L.V.: A Practical Guide to Trusted Computing. IBM Press (2008)
-
(2008)
A Practical Guide to Trusted Computing
-
-
Challener, D.1
Yoder, K.2
Catherman, R.3
Safford, D.4
Doorn, L.V.5
-
18
-
-
38549157185
-
Trusted Computing - Special Aspects and Challenges
-
Geffert, V., Karhumäki, J., Bertoni, A., Preneel, B., Návrat, P., Bieliková, M. (eds.) SOFSEM 2008. Springer, Heidelberg
-
Sadeghi, A.-R.: Trusted Computing - Special Aspects and Challenges. In: Geffert, V., Karhumäki, J., Bertoni, A., Preneel, B., Návrat, P., Bieliková, M. (eds.) SOFSEM 2008. LNCS, vol. 4910, pp. 98-117. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4910
, pp. 98-117
-
-
Sadeghi, A.-R.1
|