-
2
-
-
46749113953
-
A new authentication protocol based on pointer forwarding for mobile communications
-
Lee C.C., Hwang M.S., Liao I.E. A new authentication protocol based on pointer forwarding for mobile communications. Wireless Communications and Mobile Computing 2008, 8(5):661-672.
-
(2008)
Wireless Communications and Mobile Computing
, vol.8
, Issue.5
, pp. 661-672
-
-
Lee, C.C.1
Hwang, M.S.2
Liao, I.E.3
-
4
-
-
59649101587
-
Enhanced authentication scheme with anonymity for roaming service in global networks
-
Chang C.C., Lee C.Y., Chiu Y.C. Enhanced authentication scheme with anonymity for roaming service in global networks. Computer Communications 2009, 32(4):611.
-
(2009)
Computer Communications
, vol.32
, Issue.4
, pp. 611
-
-
Chang, C.C.1
Lee, C.Y.2
Chiu, Y.C.3
-
5
-
-
78650860311
-
A strong user authentication scheme with smart cards for wireless communications
-
(in press).
-
D. He, M. Ma, Y. Zhang, C. Chen, J. Bu, A strong user authentication scheme with smart cards for wireless communications. Computer Communications, 2010 (in press).
-
(2010)
Computer Communications
-
-
He, D.1
Ma, M.2
Zhang, Y.3
Chen, C.4
Bu, J.5
-
6
-
-
33750133438
-
Security enhancement on a new authentication scheme with anonymity for wireless environments
-
Lee C.C., Hwang M.S., Liao I.E. Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE Transactions on Industrial Electronics 2006, 53(5):1683-1686.
-
(2006)
IEEE Transactions on Industrial Electronics
, vol.53
, Issue.5
, pp. 1683-1686
-
-
Lee, C.C.1
Hwang, M.S.2
Liao, I.E.3
-
7
-
-
67649184080
-
Security flaw of authentication scheme with anonymity for wireless communications
-
Lee J.S., Chang J.H., Lee D.H. Security flaw of authentication scheme with anonymity for wireless communications. IEEE Communications Letters 2009, 13(5):292-293.
-
(2009)
IEEE Communications Letters
, vol.13
, Issue.5
, pp. 292-293
-
-
Lee, J.S.1
Chang, J.H.2
Lee, D.H.3
-
8
-
-
54949140749
-
A secure authentication scheme with anonymity for wireless communications
-
Wu C.C., Lee W.B., Tsaur W.J. A secure authentication scheme with anonymity for wireless communications. IEEE Communications Letters 2008, 12(10):722-723.
-
(2008)
IEEE Communications Letters
, vol.12
, Issue.10
, pp. 722-723
-
-
Wu, C.C.1
Lee, W.B.2
Tsaur, W.J.3
-
9
-
-
68949149518
-
Security flaws in authentication protocols with anonymity for wireless communications
-
Xu J., Feng D. Security flaws in authentication protocols with anonymity for wireless communications. ETRI Journal 2009, 31(4):460-462.
-
(2009)
ETRI Journal
, vol.31
, Issue.4
, pp. 460-462
-
-
Xu, J.1
Feng, D.2
-
10
-
-
63649131787
-
On the anonymity of some authentication schemes for wireless communications
-
Zeng P., Cao Z., Choo K.K.R., Wang S. On the anonymity of some authentication schemes for wireless communications. IEEE Communications Letters 2009, 13(3):170-171.
-
(2009)
IEEE Communications Letters
, vol.13
, Issue.3
, pp. 170-171
-
-
Zeng, P.1
Cao, Z.2
Choo, K.K.R.3
Wang, S.4
-
11
-
-
1942487780
-
A new authentication scheme with anonymity for wireless environments
-
Zhu J., Ma J. A new authentication scheme with anonymity for wireless environments. IEEE Transactions on Consumer Electronics 2004, 51(1):230-234.
-
(2004)
IEEE Transactions on Consumer Electronics
, vol.51
, Issue.1
, pp. 230-234
-
-
Zhu, J.1
Ma, J.2
-
12
-
-
84855329586
-
On the anonymity of an enhanced authentication scheme for a roaming service in global mobility networks, International Journal of Secure Digital Information Age
-
(in press).
-
C.C. Lee, R.X. Chang, T. Williams, On the anonymity of an enhanced authentication scheme for a roaming service in global mobility networks, International Journal of Secure Digital Information Age, 2010 (in press).
-
(2010)
-
-
Lee, C.C.1
Chang, R.X.2
Williams, T.3
-
13
-
-
82755178201
-
An improvement of remote authentication and key agreement schemes, Journal of Circuits, Systems, and Computers
-
(in press).
-
C.C. Lee, C.T. Li, K.Y. Huang, S.Y. Huang, An improvement of remote authentication and key agreement schemes, Journal of Circuits, Systems, and Computers, 2010 (in press).
-
(2010)
-
-
Lee, C.C.1
Li, C.T.2
Huang, K.Y.3
Huang, S.Y.4
-
14
-
-
70349809938
-
Cryptanalysis of threshold password authentication against guessing attacks in ad hoc networks
-
Li C.T., Chu Y.P. Cryptanalysis of threshold password authentication against guessing attacks in ad hoc networks. International Journal of Network Security 2009, 8(2):166-168.
-
(2009)
International Journal of Network Security
, vol.8
, Issue.2
, pp. 166-168
-
-
Li, C.T.1
Chu, Y.P.2
-
15
-
-
70349792182
-
An efficient biometrics-based remote user authentication scheme using smart cards
-
Li C.T., Hwang M.S. An efficient biometrics-based remote user authentication scheme using smart cards. Journal of Network and Computer Applications 2010, 33(1):1-5.
-
(2010)
Journal of Network and Computer Applications
, vol.33
, Issue.1
, pp. 1-5
-
-
Li, C.T.1
Hwang, M.S.2
-
18
-
-
80052436479
-
A secure billing service with two-factor user authentication in wireless sensor networks, International Journal of Innovative Computing
-
(in press).
-
C.T. Li, C.C. Lee, L.J. Wang, C.J. Liu, A secure billing service with two-factor user authentication in wireless sensor networks, International Journal of Innovative Computing, Information and Control, 2010 (in press).
-
(2010)
Information and Control.
-
-
Li, C.T.1
Lee, C.C.2
Wang, L.J.3
Liu, C.J.4
-
19
-
-
77952310897
-
On the security enhancement of an efficient and secure event signature protocol for P2P MMOGs
-
The 2010 International Conference on Computational Science and Its Applications
-
Li C.T., Lee C.C., Wang L.J. On the security enhancement of an efficient and secure event signature protocol for P2P MMOGs. Lecture Notes in Computer Science 2010, vol. 6016:599-609.
-
(2010)
Lecture Notes in Computer Science
, vol.6016
, pp. 599-609
-
-
Li, C.T.1
Lee, C.C.2
Wang, L.J.3
-
20
-
-
77952308617
-
A two-factor user authentication scheme providing mutual authentication and key agreement over insecure channels
-
Li C.T., Lee C.C., Wang L.J. A two-factor user authentication scheme providing mutual authentication and key agreement over insecure channels. Journal of Information Assurance and Security 2010, 5(2):201-208.
-
(2010)
Journal of Information Assurance and Security
, vol.5
, Issue.2
, pp. 201-208
-
-
Li, C.T.1
Lee, C.C.2
Wang, L.J.3
-
21
-
-
74349090986
-
A secure event update protocol for peer-to-peer massively multiplayer online games against masquerade attacks
-
Li C.T., Wei C.H., Chin Y.H. A secure event update protocol for peer-to-peer massively multiplayer online games against masquerade attacks. International Journal of Innovative Computing, Information and Control 2009, 5(12(A)):4715-4723.
-
(2009)
International Journal of Innovative Computing, Information and Control
, vol.5
, Issue.12 A
, pp. 4715-4723
-
-
Li, C.T.1
Wei, C.H.2
Chin, Y.H.3
-
22
-
-
77952307691
-
A secure and undeniable billing protocol among charged parties for grid computing environments
-
Li C.T., Wei C.H., Lee C.C., Chin Y.H., Wang L.J. A secure and undeniable billing protocol among charged parties for grid computing environments. International Journal of Innovative Computing, Information and Control 2010, 6(11):5061-5076.
-
(2010)
International Journal of Innovative Computing, Information and Control
, vol.6
, Issue.11
, pp. 5061-5076
-
-
Li, C.T.1
Wei, C.H.2
Lee, C.C.3
Chin, Y.H.4
Wang, L.J.5
-
23
-
-
80053052870
-
An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks
-
(in press).
-
J. Xu, W.T. Zhu, D.G. Feng, An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks, Computer Communications, 2010 (in press).
-
(2010)
Computer Communications
-
-
Xu, J.1
Zhu, W.T.2
Feng, D.G.3
|