-
1
-
-
0019634370
-
Password authentication with insecure communication
-
L. Lamport, "Password authentication with insecure communication", Communications of the ACM, 24(11) 1981, pp. 770-772.
-
(1981)
Communications of the ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
2
-
-
0032137355
-
A password authentication method for contents communication on the Internet
-
A. Shimizu, T. Horioka, and H. Inagaki, "A password authentication method for contents communication on the Internet", IEICE Transactions on Communications, E81-B(8), 1998, pp. 1666-1673.
-
(1998)
IEICE Transactions on Communications
, vol.E81-B
, Issue.8
, pp. 1666-1673
-
-
Shimizu, A.1
Horioka, T.2
Inagaki, H.3
-
3
-
-
28044451335
-
Robust remote authentication scheme with smart cards
-
C. Fan, Y. Chan, and Z. Zhang, "Robust remote authentication scheme with smart cards", Computers & Security, 24, 2005, pp. 619-628.
-
(2005)
Computers & Security
, vol.24
, pp. 619-628
-
-
Fan, C.1
Chan, Y.2
Zhang, Z.3
-
4
-
-
1542335451
-
Efficient password authenticated key agreement using smart card
-
W. Juang, "Efficient password authenticated key agreement using smart card", Computer & Security, 23, 2004, pp. 167-173.
-
(2004)
Computer & Security
, vol.23
, pp. 167-173
-
-
Juang, W.1
-
5
-
-
1942423677
-
Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards
-
W. Ku and S. Chen, "Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards", IEEE Transactions on Consumer Electronics, 50(1), 2004, pp. 204-207.
-
(2004)
IEEE Transactions on Consumer Electronics
, vol.50
, Issue.1
, pp. 204-207
-
-
Ku, W.1
Chen, S.2
-
6
-
-
0041698517
-
A remote user authentication scheme using hash functions
-
C. Lee, L. Li, and M. Hwang, "A remote user authentication scheme using hash functions", ACM Operating Systems Review, 36(4), 2002, pp. 23-29.
-
(2002)
ACM Operating Systems Review
, vol.36
, Issue.4
, pp. 23-29
-
-
Lee, C.1
Li, L.2
Hwang, M.3
-
7
-
-
0033704170
-
Methods for protecting password transmission
-
M. Peyravian and N. Zunic, "Methods for protecting password transmission", Computers & Security, 19(5), 2000, pp. 466-469.
-
(2000)
Computers & Security
, vol.19
, Issue.5
, pp. 466-469
-
-
Peyravian, M.1
Zunic, N.2
-
8
-
-
33744725812
-
A hash-based strong-password authentication scheme without using smart cards
-
W. Ku, "A hash-based strong-password authentication scheme without using smart cards", ACM Operating Systems Review, 38(1),,2004, pp. 29-34.
-
(2004)
ACM Operating Systems Review
, vol.38
, Issue.1
, pp. 29-34
-
-
Ku, W.1
-
9
-
-
33744757940
-
Weaknesses of Lee-Li-Hwang's hash-based password authentication scheme
-
W. Ku, C. Chen, and H. Lee, "Weaknesses of Lee-Li-Hwang's hash-based password authentication scheme", ACM Operating Systems Review, 37(4), 2003, pp. 9-25.
-
(2003)
ACM Operating Systems Review
, vol.37
, Issue.4
, pp. 9-25
-
-
Ku, W.1
Chen, C.2
Lee, H.3
-
10
-
-
21644467750
-
Provably secure three-party password-based authenticated key exchange protocol using Weil pairing
-
H. Wen, T. Lee, and T. Hwang, "Provably secure three-party password-based authenticated key exchange protocol using Weil pairing", IEE Proceedings of Communications, 152(2), 2005, pp. 138-143.
-
(2005)
IEE Proceedings of Communications
, vol.152
, Issue.2
, pp. 138-143
-
-
Wen, H.1
Lee, T.2
Hwang, T.3
-
11
-
-
0037030525
-
Fingerprint-based remote user authentication scheme using smart cards
-
J.K. Lee, S.R. Ryu, and K.Y. Yoo, "Fingerprint-based remote user authentication scheme using smart cards", Electronics Letters, 38(12), 2002, pp. 554-555.
-
(2002)
Electronics Letters
, vol.38
, Issue.12
, pp. 554-555
-
-
Lee, J.K.1
Ryu, S.R.2
Yoo, K.Y.3
-
12
-
-
4043139259
-
A flexible biometrics remote user authentication scheme
-
C.H. Lin and Y.Y. Lai, "A flexible biometrics remote user authentication scheme", Computer Standards & Interfaces, 27(1), 2004, pp. 19-23.
-
(2004)
Computer Standards & Interfaces
, vol.27
, Issue.1
, pp. 19-23
-
-
Lin, C.H.1
Lai, Y.Y.2
-
13
-
-
15544370112
-
Further cryptanalysis of fingerprint-based remote user authentication scheme using smart cards
-
W.C. Ku, S.T. Chang, and M.H. Chiang, "Further cryptanalysis of fingerprint-based remote user authentication scheme using smart cards", Electronics Letters, 41(5), 2005, 240-241.
-
(2005)
Electronics Letters
, vol.41
, Issue.5
, pp. 240-241
-
-
Ku, W.C.1
Chang, S.T.2
Chiang, M.H.3
-
14
-
-
33751167604
-
Improving the security of 'a flexible biometrics remote user authentication scheme'
-
M.K. Khan and J.S. Zhang, "Improving the security of 'a flexible biometrics remote user authentication scheme'", Computer Standards & Interfaces, 29, 2007, pp. 82-85.
-
(2007)
Computer Standards & Interfaces
, vol.29
, pp. 82-85
-
-
Khan, M.K.1
Zhang, J.S.2
-
15
-
-
62549133356
-
Robust and Efficient Password-Authenticated Key Agreement Using Smart Cards
-
W.S. Juang, S.T. Chen, and H.T. Liaw, "Robust and Efficient Password-Authenticated Key Agreement Using Smart Cards", IEEE Transactions on Industrial Electronics, 55(6), 2008, pp. 2551-2556.
-
(2008)
IEEE Transactions on Industrial Electronics
, vol.55
, Issue.6
, pp. 2551-2556
-
-
Juang, W.S.1
Chen, S.T.2
Liaw, H.T.3
-
16
-
-
1942423677
-
Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards
-
W. Kuand and S. Chen, "Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards", IEEE Transactions Consumer Electronics, 50(1), 2004, pp. 204-207.
-
(2004)
IEEE Transactions Consumer Electronics
, vol.50
, Issue.1
, pp. 204-207
-
-
Kuand, W.1
Chen, S.2
-
17
-
-
0018048246
-
Using encryption for authentication in large networks of computer
-
R.M. Needham and M.D. Schroeder, "Using encryption for authentication in large networks of computer", Communication of the ACM, 21(12), 1978, pp. 993-998.
-
(1978)
Communication of the ACM
, vol.21
, Issue.12
, pp. 993-998
-
-
Needham, R.M.1
Schroeder, M.D.2
|