-
1
-
-
0019634370
-
Password authentication with insecure communication
-
L. Lamport Password authentication with insecure communication Commun ACM 24 11 1981 770 772
-
(1981)
Commun ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
2
-
-
0026153410
-
Remote password authentication with smart card
-
C.C. Chang, and T.C. Wu Remote password authentication with smart card Comput. Digital Tech., IEE Proc. E 138 3 1991 165 168
-
(1991)
Comput. Digital Tech., IEe Proc. e
, vol.138
, Issue.3
, pp. 165-168
-
-
Chang, C.C.1
Wu, T.C.2
-
3
-
-
0036429021
-
An enhancement of timestamp-based password authentication scheme
-
DOI 10.1016/S0167-4048(02)01118-5
-
L. Fan, J.H. Li, and H.W. Zhu An enhancement of timestamp-based password authentication scheme Comput Secur 21 7 2002 665 667 (Pubitemid 35355526)
-
(2002)
Computers and Security
, vol.21
, Issue.7
, pp. 665-667
-
-
Fan, L.1
Li, J.-H.2
Zhu, H.-W.3
-
4
-
-
4043122631
-
A dynamic ID-based remote user authentication scheme
-
M.L. Das, A. Saxana, and V.P. Gulati A dynamic ID-based remote user authentication scheme IEEE Trans Consum Electr 50 2 2004 629 631
-
(2004)
IEEE Trans Consum Electr
, vol.50
, Issue.2
, pp. 629-631
-
-
Das, M.L.1
Saxana, A.2
Gulati, V.P.3
-
5
-
-
33751197641
-
Comment on a dynamic ID-based remote user authentication scheme
-
A.K. Awasthi Comment on a dynamic ID-based remote user authentication scheme Trans Cryptol 1 2 2004 15 16
-
(2004)
Trans Cryptol
, vol.1
, Issue.2
, pp. 15-16
-
-
Awasthi, A.K.1
-
6
-
-
24144494609
-
Impersonation attacks on a dynamic ID-based remote user authentication scheme using smart cards
-
W.C. Ku, and S.T. Chang Impersonation attacks on a dynamic ID-based remote user authentication scheme using smart cards IEICS Trans Commun E88-B 5 2005 2165 2167
-
(2005)
IEICS Trans Commun
, vol.88 E-B
, Issue.5
, pp. 2165-2167
-
-
Ku, W.C.1
Chang, S.T.2
-
7
-
-
33845399962
-
Security enhancement for a dynamic ID-based remote user authentication scheme
-
DOI 10.1109/NWESP.2005.67, 1592466, Proceedings - International Conference on Next Generation Web Services Practices, NWeSP 2005
-
Liao I, Lee CC, Hwang MS. Security enhancement for a dynamic ID-based remote user authentication scheme. 2005 International conference on next generation web services practices; 2005, p. 437-40. (Pubitemid 46276573)
-
(2005)
Proceedings - International Conference on Next Generation Web Services Practices, NWeSP 2005
, vol.2005
, pp. 437-440
-
-
Liao, I.-E.1
Lee, C.-C.2
Hwang, M.-S.3
-
8
-
-
70350724053
-
Cryptanalysis of Liao-Lee-Hwang's dynamic ID scheme
-
M. Misbahuddin, and C.S. Bindu Cryptanalysis of Liao-Lee-Hwang's dynamic ID scheme Int J Netw Secur 2 6 2008 211 213
-
(2008)
Int J Netw Secur
, vol.2
, Issue.6
, pp. 211-213
-
-
Misbahuddin, M.1
Bindu, C.S.2
-
9
-
-
59649083248
-
A more efficient and secure dynamic ID-based remote user authentication scheme
-
Y.Y. Wang, J.Y. Liu, F.X. Xiao, and J. Dan A more efficient and secure dynamic ID-based remote user authentication scheme Comput Commun 4 32 2009 583 585
-
(2009)
Comput Commun
, vol.4
, Issue.32
, pp. 583-585
-
-
Wang, Y.Y.1
Liu, J.Y.2
Xiao, F.X.3
Dan, J.4
-
10
-
-
58049197989
-
Two efficient two-factor authenticated key exchange protocols in public wireless LANs
-
W.S. Juang, and J.L. Wu Two efficient two-factor authenticated key exchange protocols in public wireless LANs Comput Electr Eng 1 35 2009 33 40
-
(2009)
Comput Electr Eng
, vol.1
, Issue.35
, pp. 33-40
-
-
Juang, W.S.1
Wu, J.L.2
-
11
-
-
78751642788
-
Cryptanalysis and security enhancement of a 'more efficient and secure dynamic ID-based remote user authentication scheme'
-
M.K. Khan, S.K. Kim, and K. Alghathbar Cryptanalysis and security enhancement of a 'more efficient and secure dynamic ID-based remote user authentication scheme' Comput Commun 34 3 2011 305 309
-
(2011)
Comput Commun
, vol.34
, Issue.3
, pp. 305-309
-
-
Khan, M.K.1
Kim, S.K.2
Alghathbar, K.3
-
12
-
-
77950629746
-
An efficient anonymous authentication mechanism for delay tolerant networks
-
R. Su, and Z.F. Cao An efficient anonymous authentication mechanism for delay tolerant networks Comput Electr Eng 3 36 2010 435 441
-
(2010)
Comput Electr Eng
, vol.3
, Issue.36
, pp. 435-441
-
-
Su, R.1
Cao, Z.F.2
-
13
-
-
79956064800
-
A user friendly authentication scheme with anonymity for wireless communications
-
E.J. Yoon, K.Y. Yoo, and K.S. Ha A user friendly authentication scheme with anonymity for wireless communications Comput Electr Eng 3 37 2011 356 364
-
(2011)
Comput Electr Eng
, vol.3
, Issue.37
, pp. 356-364
-
-
Yoon, E.J.1
Yoo, K.Y.2
Ha, K.S.3
-
15
-
-
0036566408
-
Examining smart-card security under the threat of power analysis attacks
-
DOI 10.1109/TC.2002.1004593
-
T.S. Messerges, E.A. Dabbish, and R.H. Sloan Examining smart-card security under the threat of power analysis attacks IEEE Trans Comput 5 51 2002 541 552 (Pubitemid 34550462)
-
(2002)
IEEE Transactions on Computers
, vol.51
, Issue.5
, pp. 541-552
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
|