-
1
-
-
1542647564
-
A remote user authentication scheme using smart cards with forward security
-
A. K. Awasthi and S. Lal, "A remote user authentication scheme using smart cards with forward security," IEEE Transactions on Consumer Electronics, vol. 49, no. 4, pp. 1246-1248, 2003.
-
(2003)
IEEE Transactions on Consumer Electronics
, vol.49
, Issue.4
, pp. 1246-1248
-
-
Awasthi, A.K.1
Lal, S.2
-
2
-
-
0034317895
-
Cryptanalysis of a remote user authentication scheme using smart cards
-
C. K. Chan and L. M. Cheng, "Cryptanalysis of a remote user authentication scheme using smart cards," IEEE Transactions on Consumer Electronics, vol. 46, pp. 992-993, 2000.
-
(2000)
IEEE Transactions on Consumer Electronics
, vol.46
, pp. 992-993
-
-
Chan, C.K.1
Cheng, L.M.2
-
3
-
-
0001784609
-
Using smart cards to authenticate remote passwords
-
C. C. Chang and S. J. Hwang, "Using smart cards to authenticate remote passwords," Computers and Mathematics with applications, vol. 26, no. 7, pp. 19-27, 1993.
-
(1993)
Computers and Mathematics with applications
, vol.26
, Issue.7
, pp. 19-27
-
-
Chang, C.C.1
Hwang, S.J.2
-
4
-
-
0026153410
-
Remote password authentication with smart cards
-
C. C. Chang and T. C. Wu, "Remote password authentication with smart cards," IEE Proceedings-E, vol. 138, no. 3, pp. 165-168, 1993.
-
(1993)
IEE Proceedings-E
, vol.138
, Issue.3
, pp. 165-168
-
-
Chang, C.C.1
Wu, T.C.2
-
5
-
-
0036302680
-
An efficient and practical solution to remote authentication: smart card
-
H. Y. Chien, J. K. Jan, and Y. M. Tseng, "An efficient and practical solution to remote authentication: smart card," Computers and Security, vol. 21, no. 4, pp. 372-375, 2002.
-
(2002)
Computers and Security
, vol.21
, Issue.4
, pp. 372-375
-
-
Chien, H.Y.1
Jan, J.K.2
Tseng, Y.M.3
-
6
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
T. ElGamal, "A public key cryptosystem and a signature scheme based on discrete logarithms," IEEE Transactions on Information Theory, vol. 31, no. 4, pp. 469-472, 1985.
-
(1985)
IEEE Transactions on Information Theory
, vol.31
, Issue.4
, pp. 469-472
-
-
ElGamal, T.1
-
7
-
-
28044451335
-
Robust remote authentication scheme with smart cards
-
Nov
-
C. Fan, Y. Chan, and Z. Zhang, "Robust remote authentication scheme with smart cards," Computers and Security, vol. 24, no. 8, pp. 619-628, Nov. 2005.
-
(2005)
Computers and Security
, vol.24
, Issue.8
, pp. 619-628
-
-
Fan, C.1
Chan, Y.2
Zhang, Z.3
-
8
-
-
0036429021
-
An enhancement of timestamp-based password authentication schem
-
Elsevier
-
L. Fan, J. H. Li, and H. W. Zhu, "An enhancement of timestamp-based password authentication schem," Computer and Security, Elsevier vol. 21, pp. 665-667, 2002.
-
(2002)
Computer and Security
, vol.21
, pp. 665-667
-
-
Fan, L.1
Li, J.H.2
Zhu, H.W.3
-
9
-
-
0742268499
-
Security of Chien et al' s remote user authentication scheme using smart cards
-
C. L. Hsu, "Security of Chien et al' s remote user authentication scheme using smart cards," Computer Standards and Interfaces, vol. 26, no. 3, pp. 167-169, 2004.
-
(2004)
Computer Standards and Interfaces
, vol.26
, Issue.3
, pp. 167-169
-
-
Hsu, C.L.1
-
10
-
-
0034140374
-
A new remote user authentication scheme using smart cards
-
M. S. Hwang and L. H. Li, "A new remote user authentication scheme using smart cards," IEEE Transactions on Consumer Electronics, vol. 46, no. 1, pp. 28-30, 2000.
-
(2000)
IEEE Transactions on Consumer Electronics
, vol.46
, Issue.1
, pp. 28-30
-
-
Hwang, M.S.1
Li, L.H.2
-
11
-
-
26844434016
-
An improvement on Yang et al.'s password authentication schemes
-
K. W. Kim, J. C. Jeon, and K. Y. Yoo, "An improvement on Yang et al.'s password authentication schemes," Applied Mathematics and Computation, vol. 170, pp. 207-215, 2005.
-
(2005)
Applied Mathematics and Computation
, vol.170
, pp. 207-215
-
-
Kim, K.W.1
Jeon, J.C.2
Yoo, K.Y.3
-
12
-
-
33646236878
-
A simple attack on a recently introduced hash-based strong-password authentication scheme
-
Sep
-
M. Kim and C. K. Koc, "A simple attack on a recently introduced hash-based strong-password authentication scheme," International Journal of Net-work Security, vol.1, no.2, PP.77-80, Sep. 2005.
-
(2005)
International Journal of Net-work Security
, vol.1
, Issue.2
, pp. 77-80
-
-
Kim, M.1
Koc, C.K.2
-
13
-
-
33744725812
-
A hash-based strong-password authentication scheme without using smart cards
-
Jan
-
W. C. Ku, "A hash-based strong-password authentication scheme without using smart cards," ACM Operating System Review, vol. 38, no. 1, pp. 29-34, Jan 2004.
-
(2004)
ACM Operating System Review
, vol.38
, Issue.1
, pp. 29-34
-
-
Ku, W.C.1
-
14
-
-
0142007776
-
Cryptanalysis of a variant of Peyravian-Zunic' s password authentication scheme
-
May
-
W. C. Ku, C. M. Chen, and H. L. Lee, "Cryptanalysis of a variant of Peyravian-Zunic' s password authentication scheme," IEICE Transaction on Communication, vol. E86-B, no. 5, pp. 1682-1684, May 2003.
-
(2003)
IEICE Transaction on Communication
, vol.E86-B
, Issue.5
, pp. 1682-1684
-
-
Ku, W.C.1
Chen, C.M.2
Lee, H.L.3
-
15
-
-
1942423677
-
Weakness and improvement of an efficient password based user authentication scheme using smart cards
-
Feb
-
W. C. Ku, and S. M. Chen, "Weakness and improvement of an efficient password based user authentication scheme using smart cards," IEEE Transactions on Consumer Electronics, vol. 50, no. 1, pp. 204-207, Feb 2004.
-
(2004)
IEEE Transactions on Consumer Electronics
, vol.50
, Issue.1
, pp. 204-207
-
-
Ku, W.C.1
Chen, S.M.2
-
16
-
-
4043060141
-
New remote user authentication scheme using smart cards
-
May
-
M. Kumar, "New remote user authentication scheme using smart cards," IEEE Transactions on Consumer Electronics, vol. 50, no. 2, pp. 597-600. May 2004.
-
(2004)
IEEE Transactions on Consumer Electronics
, vol.50
, Issue.2
, pp. 597-600
-
-
Kumar, M.1
-
17
-
-
84875286190
-
An enhanced remote user authentication scheme with smart card
-
May
-
M. Kumar, "An enhanced remote user authentication scheme with smart card," International Journal of Network Security, vol. 10, no. 3, PP. 175-184, May 2010.
-
(2010)
International Journal of Network Security
, vol.10
, Issue.3
, pp. 175-184
-
-
Kumar, M.1
-
18
-
-
77958081838
-
A new secure remote user authentication scheme with smart cards
-
Nov
-
M. Kumar, "A new secure remote user authentication scheme with smart cards,"International Journal of Network Security, vol. 11, no. 3, PP. 128-133, Nov. 2010.
-
(2010)
International Journal of Network Security
, vol.11
, Issue.3
, pp. 128-133
-
-
Kumar, M.1
-
19
-
-
0019634370
-
Password authentication with insecure communication
-
L. Lamport, "Password authentication with insecure communication," Communication of the ACM, vol. 24, no. 11, pp. 770-772, 1981.
-
(1981)
Communication of the ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
20
-
-
0035506864
-
A remote password authentication scheme for multi-server architecture using neural networks
-
L. H. Li, L. C. Lin, and M. S. Hwang, "A remote password authentication scheme for multi-server architecture using neural networks," IEEE Transactions Neural Networks, vol. 12, no. 6, pp. 1498-1504, 2001.
-
(2001)
IEEE Transactions Neural Networks
, vol.12
, Issue.6
, pp. 1498-1504
-
-
Li, L.H.1
Lin, L.C.2
Hwang, M.S.3
-
21
-
-
84874816729
-
Elliptic curve cryptography based wireless authentication protocol
-
Nov
-
Y. L. Liu, W. Gao, H. Yao, and X. Yu, "Elliptic curve cryptography based wireless authentication protocol," International Journal of Network Security, vol. 5, no. 3, PP. 327-337, Nov. 2007.
-
(2007)
International Journal of Network Security
, vol.5
, Issue.3
, pp. 327-337
-
-
Liu, Y.L.1
Gao, W.2
Yao, H.3
Yu, X.4
-
22
-
-
0024715186
-
Limitation of challenge-response entity authentication
-
Aug
-
C. Mitchell, "Limitation of challenge-response entity authentication," Electronics Letters, vol. 25, no. 17, pp. 1195-1196, Aug. 1989.
-
(1989)
Electronics Letters
, vol.25
, Issue.17
, pp. 1195-1196
-
-
Mitchell, C.1
-
23
-
-
44149088152
-
Cryptanalysis of Yang-Wang-Chang's password authentication scheme with smart cards
-
Feb
-
A. S. K. Pathan and C. S. Hong, "Cryptanalysis of Yang-Wang-Chang's password authentication scheme with smart cards," Proceedings of ICACT 2008, pp. 1618-1620, Feb. 2008.
-
(2008)
Proceedings of ICACT
, vol.2008
, pp. 1618-1620
-
-
Pathan, A.S.K.1
Hong, C.S.2
-
24
-
-
0042196051
-
A modified remote user authentication scheme using smart card
-
J. J. Shen, C. W. Lin, and M. S. Hwang, "A modified remote user authentication scheme using smart card," IEEE Transactions on Consumer Electronics, vol. 49, no. 2, pp. 414-416, 2003.
-
(2003)
IEEE Transactions on Consumer Electronics
, vol.49
, Issue.2
, pp. 414-416
-
-
Shen, J.J.1
Lin, C.W.2
Hwang, M.S.3
-
25
-
-
4043178772
-
Further cryptanalysis of a password authentication scheme with smart cards
-
H. M. Sun and H. T. Yeh, "Further cryptanalysis of a password authentication scheme with smart cards," IEICE Transactions on Communication, vol. E86-B, no. 4, pp. 1412-1415, 2003.
-
(2003)
IEICE Transactions on Communication
, vol.E86-B
, Issue.4
, pp. 1412-1415
-
-
Sun, H.M.1
Yeh, H.T.2
-
26
-
-
77958098545
-
Pass-Go: A proposal to improve the usability of graphical passwords
-
H. Tao and C. Adams, "Pass-Go: A proposal to improve the usability of graphical passwords," International Journal of Network Security, vol. 7, no. 2, PP. 273-292, 2008.
-
(2008)
International Journal of Network Security
, vol.7
, Issue.2
, pp. 273-292
-
-
Tao, H.1
Adams, C.2
-
27
-
-
33847710813
-
Improved efficient remote user authentication schemes
-
Mar
-
X. Tian, R. W. Zhu, and D. S. Wong, "Improved efficient remote user authentication schemes," International Journal of Network Security, vol. 4, no. 2, PP. 149-154, Mar. 2007.
-
(2007)
International Journal of Network Security
, vol.4
, Issue.2
, pp. 149-154
-
-
Tian, X.1
Zhu, R.W.2
Wong, D.S.3
-
28
-
-
40949152760
-
Password authentication schemes: current status and key issues
-
Sept
-
C. S. Tsai, C. C. Lee, and M. S. Hwang, "Password authentication schemes: current status and key issues," International Journal of Network Security, vol. 3, no. 2, PP. 101-115, Sept. 2006.
-
(2006)
International Journal of Network Security
, vol.3
, Issue.2
, pp. 101-115
-
-
Tsai, C.S.1
Lee, C.C.2
Hwang, M.S.3
-
29
-
-
33746248709
-
A forward-secure user authentication scheme with smart cards
-
Sept
-
B. Wang and Z. Q. Li, "A forward-secure user authentication scheme with smart cards," International Journal of Network Security, vol. 3, no. 2, PP. 116-119, Sept. 2006.
-
(2006)
International Journal of Network Security
, vol.3
, Issue.2
, pp. 116-119
-
-
Wang, B.1
Li, Z.Q.2
-
30
-
-
70349819161
-
Cryptanalysis of two improved password authentication schemes using smart cards
-
Nov
-
R. C. Wang and C. C. Yang, "Cryptanalysis of two improved password authentication schemes using smart cards," International Journal of Network Security, vol. 3, no. 3, PP. 283-285, Nov. 2006.
-
(2006)
International Journal of Network Security
, vol.3
, Issue.3
, pp. 283-285
-
-
Wang, R.C.1
Yang, C.C.2
-
31
-
-
0029535942
-
Remote login authentication scheme based on a geometric approach
-
T. C. Wu, "Remote login authentication scheme based on a geometric approach," Computer Communication, vol. 18, no. 12, pp. 959-963, 1995.
-
(1995)
Computer Communication
, vol.18
, Issue.12
, pp. 959-963
-
-
Wu, T.C.1
-
32
-
-
12244291938
-
An improvement of the Yang-Shieh password authentication schemes
-
C. C. Yang, R. C. Wang, and T. Y. Chang, "An improvement of the Yang-Shieh password authentication schemes," Applied Mathematics and Computation, vol. 162, no. 3, pp. 1391-1396, 2005.
-
(2005)
Applied Mathematics and Computation
, vol.162
, Issue.3
, pp. 1391-1396
-
-
Yang, C.C.1
Wang, R.C.2
Chang, T.Y.3
-
33
-
-
0033350090
-
Password authentication schemes with smart cards
-
W. H. Yang and S. P. Shieh, "Password authentication schemes with smart cards," Computers and Security, vol. 18, no. 8, pp. 727-733, 1999.
-
(1999)
Computers and Security
, vol.18
, Issue.8
, pp. 727-733
-
-
Yang, W.H.1
Shieh, S.P.2
-
34
-
-
4043152192
-
Further Improvement of an Efficient password based Remote Authentication Scheme using smart cards
-
May
-
E. J. Yoon, E. K. Ryu, and K. Y. Yoo, "Further Improvement of an Efficient password based Remote Authentication Scheme using smart cards," IEEE Transaction on Consumer Electronics, vol. 50, no. 2, pp. 612-614, May 2004.
-
(2004)
IEEE Transaction on Consumer Electronics
, vol.50
, Issue.2
, pp. 612-614
-
-
Yoon, E.J.1
Ryu, E.K.2
Yoo, K.Y.3
-
35
-
-
4043072876
-
Efficient remote user authentication scheme based on generalized ElGamal signature scheme
-
May
-
E. J. Yoon, E. K. Ryu, and K. Y. Yoo, "Efficient remote user authentication scheme based on generalized ElGamal signature scheme," IEEE Transaction on Consumer Electronics, vol. 50, no. 2, pp. 568-570, May 2004.
-
(2004)
IEEE Transaction on Consumer Electronics
, vol.50
, Issue.2
, pp. 568-570
-
-
Yoon, E.J.1
Ryu, E.K.2
Yoo, K.Y.3
|