-
1
-
-
1942487780
-
A new authentication scheme with anonymity for wireless environments
-
Zhu, J. & Ma, J. (2004). A new authentication scheme with anonymity for wireless environments. IEEE Transactions on Consumer Electronics, 50(1), 230-234.
-
(2004)
IEEE Transactions on Consumer Electronics
, vol.50
, Issue.1
, pp. 230-234
-
-
Zhu, J.1
Ma, J.2
-
2
-
-
33750133438
-
Security enhancement on a new authentication scheme with anonymity for wireless environments
-
Lee, C. C., Hwang, M. S. & Liao, I. E. (2006). Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE Transactions on Consumer Electronics, 53(5), 1683-1687.
-
(2006)
IEEE Transactions on Consumer Electronics
, vol.53
, Issue.5
, pp. 1683-1687
-
-
Lee, C.C.1
Hwang, M.S.2
Liao, I.E.3
-
3
-
-
54949140749
-
A secure authentication scheme with anonymity for wireless communications
-
Wu, C. C., Lee, W. B. & Tsaur, W. J. (2008). A secure authentication scheme with anonymity for wireless communications. IEEE Communications Letters, 12(10), 722-723.
-
(2008)
IEEE Communications Letters
, vol.12
, Issue.10
, pp. 722-723
-
-
Wu, C.C.1
Lee, W.B.2
Tsaur, W.J.3
-
4
-
-
63649131787
-
On the anonymity of some authentication schemes for wireless communications
-
Zeng, P., Cao, Z., Choo, K-K. R. & Wang, S. (2009). On the anonymity of some authentication schemes for wireless communications. IEEE Communications Letters, 13(3), 170-171
-
(2009)
IEEE Communications Letters
, vol.13
, Issue.3
, pp. 170-171
-
-
Zeng, P.1
Cao, Z.2
Choo, K.-K.R.3
Wang, S.4
-
5
-
-
67649184080
-
Security flaw of authentication scheme with anonymity for wireless communications
-
Lee, J.-S., Chang, J. H. & Lee, D. H. (2009). Security flaw of authentication scheme with anonymity for wireless communications. IEEE Communications Letters, 13(5), 292-293.
-
(2009)
IEEE Communications Letters
, vol.13
, Issue.5
, pp. 292-293
-
-
Lee, J.-S.1
Chang, J.H.2
Lee, D.H.3
-
6
-
-
59649101587
-
Enhanced authentication scheme with anonymity for roaming service in global mobility networks
-
Chang, C.-C., Lee, C.-Y. & Chiu, Y.-C. (2009). Enhanced authentication scheme with anonymity for roaming service in global mobility networks. Computer Communications, 32(4), 611-618.
-
(2009)
Computer Communications
, vol.32
, Issue.4
, pp. 611-618
-
-
Chang, C.-C.1
Lee, C.-Y.2
Chiu, Y.-C.3
-
7
-
-
68349157387
-
Weaknesses in an anonymous authentication scheme for roaming service in global mobility networks
-
Youn, T.-Y., Park, Y.-H. & Lim, J. (2009). Weaknesses in an anonymous authentication scheme for roaming service in global mobility networks. IEEE Communications Letters, 13(7), 471-473.
-
(2009)
IEEE Communications Letters
, vol.13
, Issue.7
, pp. 471-473
-
-
Youn, T.-Y.1
Park, Y.-H.2
Lim, J.3
-
8
-
-
54449094667
-
A secure dynamic ID based remote user authentication scheme for multi-server environment
-
Liao, Y.-P. & Wang, S.-S. (2009). A secure dynamic ID based remote user authentication scheme for multi-server environment. Computer Standards & Interfaces, 31(1), 24-29.
-
(2009)
Computer Standards & Interfaces
, vol.31
, Issue.1
, pp. 24-29
-
-
Liao, Y.-P.1
Wang, S.-S.2
-
9
-
-
68849128250
-
Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment
-
Hsiang, H.-C. & Shih, W.-K. (2009). Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment. Computer Standards and Interfaces, 31(6), 1118-1123.
-
(2009)
Computer Standards and Interfaces
, vol.31
, Issue.6
, pp. 1118-1123
-
-
Hsiang, H.-C.1
Shih, W.-K.2
-
10
-
-
0038218554
-
-
Secaucus, NJ, USA: Springer-Verlag New York, Inc
-
Daemen, J. & Rijmen, V. (2002). The design of rijndael. Secaucus, NJ, USA: Springer-Verlag New York, Inc.
-
(2002)
The Design of Rijndael
-
-
Daemen, J.1
Rijmen, V.2
-
13
-
-
36749002169
-
Mutual authentication and key exchange protocols for roaming services in wireless mobile networks
-
Jiang, Y., Lin, C., Shen, X. & Shi, M. (2006). Mutual authentication and key exchange protocols for roaming services in wireless mobile networks. IEEE Transactions on Wireless Communications, 5(9), 2569-2577.
-
(2006)
IEEE Transactions on Wireless Communications
, vol.5
, Issue.9
, pp. 2569-2577
-
-
Jiang, Y.1
Lin, C.2
Shen, X.3
Shi, M.4
-
14
-
-
0003629990
-
-
National Institute of Standards and Technology, U.S. Department of Commerce. U.S. Federal Information Processing Standard Publication
-
National Institute of Standards and Technology, U.S. Department of Commerce. (2002). Secure Hash Standard. U.S. Federal Information Processing Standard Publication, pp. 180-182.
-
(2002)
Secure Hash Standard
, pp. 180-182
-
-
-
16
-
-
84855610929
-
-
IAIK Krypto Group-Description of SHA-1 Collision Search Project"
-
"IAIK Krypto Group-Description of SHA-1 Collision Search Project".
-
-
-
-
17
-
-
84939573910
-
Differential power analysis
-
Santa Barbara, CA, USA: Springer-Verlag
-
Kocher, P. C., Jaffe, J. & Jun, B. (1999). Differential power analysis. In Proceeding of advances cryptology LNCS 1666 (pp. 388-397). Santa Barbara, CA, USA: Springer-Verlag.
-
(1999)
Proceeding of Advances Cryptology LNCS 1666
, pp. 388-397
-
-
Kocher, P.C.1
Jaffe, J.2
Jun, B.3
-
18
-
-
84855589035
-
-
http://www.avispa-project.org/.
-
-
-
-
19
-
-
67649354423
-
Design and verification of enhanced secure localization scheme in wireless sensor networks
-
He, D., Cui, L., Huang, H. & Ma, M. (2009a). Design and verification of enhanced secure localization scheme in wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 20(7), 1050-1058.
-
(2009)
IEEE Transactions on Parallel and Distributed Systems
, vol.20
, Issue.7
, pp. 1050-1058
-
-
He, D.1
Cui, L.2
Huang, H.3
Ma, M.4
-
20
-
-
68949121318
-
Secure and efficient localization scheme in ultra-wideband sensor networks
-
He, D., Cui, L., Huang, H., & Ma, M. (2009b). Secure and efficient localization scheme in ultra-wideband sensor networks. Wireless Personal Communications, 50(4), 545-561.
-
(2009)
Wireless Personal Communications
, vol.50
, Issue.4
, pp. 545-561
-
-
He, D.1
Cui, L.2
Huang, H.3
Ma, M.4
|