-
1
-
-
62949130774
-
Two-factor user authentication in wireless sensor networks
-
M. L. Das, Two-factor user authentication in wireless sensor networks, IEEE Transactions on Wire-less Communications, vol.8, no.3, pp.1086-1090, 2009.
-
(2009)
IEEE Transactions On Wire-less Communications
, vol.8
, Issue.3
, pp. 1086-1090
-
-
Das, M.L.1
-
2
-
-
4043122631
-
A dynamic ID-based remote user authentication scheme
-
M. L. Das, A. Saxena and V. P. Gulati, A dynamic ID-based remote user authentication scheme, IEEE Transactions on Consumer Electronics, vol.50, no.2, pp.629-631, 2004.
-
(2004)
IEEE Transactions On Consumer Electronics
, vol.50
, Issue.2
, pp. 629-631
-
-
Das, M.L.1
Saxena, A.2
Gulati, V.P.3
-
4
-
-
62449290253
-
A novel dynamic user authentication scheme for wireless sensor networks
-
L. C. Ko, A novel dynamic user authentication scheme for wireless sensor networks, Proc. of IEEE ISWCS, pp.608-612, 2008.
-
(2008)
Proc. of IEEE ISWCS
, pp. 608-612
-
-
Ko, L.C.1
-
5
-
-
33750133438
-
Security enhancement on a new authentication scheme with anonymity for wireless environments
-
C. C. Lee, M. S. Hwang and I. E. Liao, Security enhancement on a new authentication scheme with anonymity for wireless environments, IEEE Transactions on Industrial Electronics, vol.53, no.5, pp.1683-1687, 2006.
-
(2006)
IEEE Transactions On Industrial Electronics
, vol.53
, Issue.5
, pp. 1683-1687
-
-
Lee, C.C.1
Hwang, M.S.2
Liao, I.E.3
-
6
-
-
46749099079
-
A secure and efficient communication scheme with authenticated key establishment and privacy preservation for vehicular ad hoc networks
-
C.-T. Li, M.-S. Hwang and Y.-P. Chu, A secure and efficient communication scheme with authenticated key establishment and privacy preservation for vehicular ad hoc networks, Computer Communications, vol.31, no.12, pp.2803-2814, 2008.
-
(2008)
Computer Com- Munications
, vol.31
, Issue.12
, pp. 2803-2814
-
-
Li, C.-T.1
Hwang, M.-S.2
Chu, Y.-P.3
-
7
-
-
44549085989
-
An electronic voting protocol with deniable authentication for mobile ad hoc networks
-
C.-T. Li, M.-S. Hwang and C.-Y. Liu, An electronic voting protocol with deniable authentication for mobile ad hoc networks, Computer Communications, vol.31, no.10, pp.2534-2540, 2008.
-
(2008)
Computer Communications
, vol.31
, Issue.10
, pp. 2534-2540
-
-
Li, C.-T.1
Hwang, M.-S.2
Liu, C.-Y.3
-
8
-
-
57049115409
-
Further improvement on a novel privacy preserving authenti-cation and access control scheme for pervasive computing environments
-
C.-T. Li, M.-S. Hwang and Y.-P. Chu, Further improvement on a novel privacy preserving authenti-cation and access control scheme for pervasive computing environments, Computer Communications, vol.31, no.18, pp.4255-4258, 2008.
-
(2008)
Computer Communications
, vol.31
, Issue.18
, pp. 4255-4258
-
-
Li, C.-T.1
Hwang, M.-S.2
Chu, Y.-P.3
-
9
-
-
49549085074
-
Improving the security of a secure anonymous routing protocol with authenticated key exchange for ad hoc networks
-
C.-T. Li, M.-S. Hwang and Y.-P. Chu, Improving the security of a secure anonymous routing protocol with authenticated key exchange for ad hoc networks, International Journal of Computer Systems Science and Engineering, vol.23, no.3, pp.227-234, 2008.
-
(2008)
International Journal of Computer Systems Science and Engineering
, vol.23
, Issue.3
, pp. 227-234
-
-
Li, C.-T.1
Hwang, M.-S.2
Chu, Y.-P.3
-
10
-
-
69949155644
-
An efficient sensor-to-sensor authenticated path-key estab-lishment scheme for secure communications in wireless sensor networks
-
C.-T. Li, M.-S. Hwang and Y.-P. Chu, An efficient sensor-to-sensor authenticated path-key estab-lishment scheme for secure communications in wireless sensor networks, International Journal of Innovative Computing, Information and Control, vol.5, no.8, pp.2107-2124, 2009.
-
(2009)
International Journal of Innovative Computing, Information and Control
, vol.5
, Issue.8
, pp. 2107-2124
-
-
Li, C.-T.1
Hwang, M.-S.2
Chu, Y.-P.3
-
11
-
-
70349809938
-
Cryptanalysis of threshold password authentication against guessing attacks in ad hoc networks
-
C.-T. Li and Y.-P. Chu, Cryptanalysis of threshold password authentication against guessing attacks in ad hoc networks, International Journal of Network Security, vol.8, no.2, pp.166-168, 2009.
-
(2009)
International Journal of Network Security
, vol.8
, Issue.2
, pp. 166-168
-
-
Li, C.-T.1
Chu, Y.-P.2
-
12
-
-
74349090986
-
A secure event update protocol for peer-to-peer massively mul-tiplayer online games against masquerade attacks
-
C.-T. Li, C. H. Wei and Y. H. Chin, A secure event update protocol for peer-to-peer massively mul-tiplayer online games against masquerade attacks, International Journal of Innovative Computing, Information and Control, vol.5, no.12(A), pp.4715-4723, 2009.
-
(2009)
International Journal of Innovative Computing, Information and Control
, vol.5
, Issue.12
, pp. 4715-4723
-
-
Li, C.-T.1
Wei, C.H.2
Chin, Y.H.3
-
13
-
-
77952997430
-
An online biometrics-based secret sharing scheme for multiparty cryptosystem using smart cards
-
C.-T. Li and M.-S. Hwang, An online biometrics-based secret sharing scheme for multiparty cryptosystem using smart cards, International Journal of Innovative Computing, Information and Control, vol.6, no.5, pp.2181-2188, 2010.
-
(2010)
International Journal of Innovative Computing, Information and Control
, vol.6
, Issue.5
, pp. 2181-2188
-
-
Li, C.-T.1
Hwang, M.-S.2
-
14
-
-
77952307259
-
An efficient and secure communication scheme for trusted computing environments
-
C.-T. Li, An efficient and secure communication scheme for trusted computing environments, Journal of Computers, vol.20, no.3, pp.17-24, 2009.
-
(2009)
Journal of Computers
, vol.20
, Issue.3
, pp. 17-24
-
-
Li, C.-T.1
-
15
-
-
77952314406
-
A batch verifying and detecting the illegal signatures
-
C.-T. Li, M.-S. Hwang and S.-M. Chen, A batch verifying and detecting the illegal signatures, International Journal of Innovative Computing, Information and Control, vol.6, no.12, pp.5311-5320, 2010.
-
(2010)
International Journal of Innovative Computing, Information and Control
, vol.6
, Issue.12
, pp. 5311-5320
-
-
Li, C.-T.1
Hwang, M.-S.2
Chen, S.-M.3
-
16
-
-
77952307691
-
A secure and undeniable billing protocol among charged parties for grid computing environments
-
C.-T. Li, C.-H. Wei, C.-C. Lee, Y.-H. Chin and L.-J. Wang, A secure and undeniable billing protocol among charged parties for grid computing environments, International Journal of Innovative Computing, Information and Control, vol.6, no.11, pp.5061-5076, 2010.
-
(2010)
International Journal of Innovative Computing, Information and Control
, vol.6
, Issue.11
, pp. 5061-5076
-
-
Li, C.-T.1
Wei, C.-H.2
Lee, C.-C.3
Chin, Y.-H.4
Wang, L.-J.5
-
17
-
-
70349792182
-
An efficient biometrics-based remote user authentication scheme using smart cards
-
C.-T. Li and M.-S. Hwang, An efficient biometrics-based remote user authentication scheme using smart cards, Journal of Network and Computer Applications, vol.33, no.1, pp.1-5, 2010.
-
(2010)
Journal of Network and Computer Applications
, vol.33
, Issue.1
, pp. 1-5
-
-
Li, C.-T.1
Hwang, M.-S.2
-
18
-
-
79957680480
-
A novel user authentication and privacy preserving scheme with smart cards for wireless communications
-
C.-T. Li and C.-C. Lee, A novel user authentication and privacy preserving scheme with smart cards for wireless communications, Mathematical and Computer Modelling, 2011.
-
(2011)
Mathematical and Computer Modelling
-
-
Li, C.-T.1
Lee, C.-C.2
-
19
-
-
77952308617
-
A two-factor user authentication scheme providing mutual authentication and key agreement over insecure channels
-
C.-T. Li, C.-C. Lee and L.-J. Wang, A two-factor user authentication scheme providing mutual authentication and key agreement over insecure channels, Journal of Information Assurance and Security, vol.5, no.2, pp.201-208, 2010.
-
(2010)
Journal of Information Assurance and Security
, vol.5
, Issue.2
, pp. 201-208
-
-
Li, C.-T.1
Lee, C.-C.2
Wang, L.-J.3
-
20
-
-
77952310897
-
On the security enhancement of an efficient and secure event signature protocol for P2P MMOGs
-
C.-T. Li, C.-C. Lee and L.-J. Wang, On the security enhancement of an efficient and secure event signature protocol for P2P MMOGs, The 2010 International Conference on Computational Science and Its Applications, LNCS, vol.6016, pp.599-609, 2010.
-
(2010)
The 2010 International Conference On Computational Science and Its Applications, LNCS
, vol.6016
, pp. 599-609
-
-
Li, C.-T.1
Lee, C.-C.2
Wang, L.-J.3
-
21
-
-
0017930809
-
A method for obtaining digital signatures and public key cryptosystems
-
R. L. Rivest, A. Shamir and L. Adleman, A method for obtaining digital signatures and public key cryptosystems, Communications of the ACM, vol.21, pp.120-126, 1978.
-
(1978)
Communications of the ACM
, vol.21
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
22
-
-
39349093196
-
An improved dynamic user authentication scheme for wireless sensor networks
-
H. R. Tseng, R. H. Jan and W. Yang, An improved dynamic user authentication scheme for wireless sensor networks, Proc. of IEEE Globecom, pp.986-990, 2007.
-
(2007)
Proc. of IEEE Globecom
, pp. 986-990
-
-
Tseng, H.R.1
Jan, R.H.2
Yang, W.3
-
23
-
-
14844304757
-
TinyPK: Securing sensor networks with public key technology
-
R. Watro, D. Kong, S. Cuti, C. Gardiner, C. Lynn and P. Kruus, TinyPK: Securing sensor networks with public key technology, Proc. of ACM Workshop on Security of Ad Hoc and Sensor Networks, pp.59-64, 2004.
-
(2004)
Proc. of ACM Workshop On Security of Ad Hoc and Sensor Networks
, pp. 59-64
-
-
Watro, R.1
Kong, D.2
Cuti, S.3
Gardiner, C.4
Lynn, C.5
Kruus, P.6
-
24
-
-
33845458336
-
A dynamic user authentication scheme for wireless sensor networks
-
K. Wong, Y. Zheng, J. Cao and S. Wang, A dynamic user authentication scheme for wireless sensor networks, Proc. of IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, pp.244-251, 2006.
-
(2006)
Proc. of IEEE International Conference On Sensor Networks, Ubiquitous, and Trustworthy Computing
, pp. 244-251
-
-
Wong, K.1
Zheng, Y.2
Cao, J.3
Wang, S.4
-
25
-
-
54949140749
-
A secure authentication scheme with anonymity for wireless communications
-
C. C. Wu, W. B. Lee and W. J. Tsaur, A secure authentication scheme with anonymity for wireless communications, IEEE Communicate Letters, vol.12, no.10, pp.722-723, 2008.
-
(2008)
IEEE Communicate Letters
, vol.12
, Issue.10
, pp. 722-723
-
-
Wu, C.C.1
Lee, W.B.2
Tsaur, W.J.3
-
26
-
-
63649131787
-
On the anonymity of some authentication schemes for wireless communications
-
P. Zeng, Z. Cao, K. K. R. Choo and S. Wang, On the anonymity of some authentication schemes for wireless communications, IEEE Communicate Letters, vol.13, no.3, pp.170-171, 2009.
-
(2009)
IEEE Communicate Letters
, vol.13
, Issue.3
, pp. 170-171
-
-
Zeng, P.1
Cao, Z.2
Choo, K.K.R.3
Wang, S.4
|