-
2
-
-
0034140374
-
A new remote user authentication scheme using smart cards
-
Hwang MS, Li LH,. A new remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics 2000; 46 (1): 28-30.
-
(2000)
IEEE Transactions on Consumer Electronics
, vol.46
, Issue.1
, pp. 28-30
-
-
Hwang, M.S.1
Li, L.H.2
-
3
-
-
84874800178
-
A public key cryptosystem and signature scheme based on discrete logarithm
-
ElGamal T,. A public key cryptosystem and signature scheme based on discrete logarithm. IEEE Transactions on Information Theory 1985; 31 (4): 469-472.
-
(1985)
IEEE Transactions on Information Theory
, vol.31
, Issue.4
, pp. 469-472
-
-
Elgamal, T.1
-
4
-
-
0034318245
-
An efficient remote user authentication scheme using smart cards
-
Sun HM,. An efficient remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics 2000; 46 (4): 958-961.
-
(2000)
IEEE Transactions on Consumer Electronics
, vol.46
, Issue.4
, pp. 958-961
-
-
Sun, H.M.1
-
5
-
-
0003629990
-
-
NIST FIPS PUB 180-2 NIST FIPS PUB 180-2, National Institute of Standard and Technology, U.S. Department of Commerce, DRAFT
-
NIST FIPS PUB 180-2. Secure Hash Standard. NIST FIPS PUB 180-2, National Institute of Standard and Technology, U.S. Department of Commerce, DRAFT, 2002.
-
(2002)
Secure Hash Standard
-
-
-
6
-
-
0036302680
-
An efficient and practical solution to remote authentication: Smart card
-
Chein HY, Jan JK, Tseng YM,. An efficient and practical solution to remote authentication: smart card. Computers and Security 2002; 21 (4): 372-375.
-
(2002)
Computers and Security
, vol.21
, Issue.4
, pp. 372-375
-
-
Chein, H.Y.1
Jan, J.K.2
Tseng, Y.M.3
-
7
-
-
0742268499
-
Security of Chein et al.'s remote user authentication scheme using smart cards
-
et al.
-
Hsu CL,. et al. Security of Chein et al.'s remote user authentication scheme using smart cards. Computer Standards and Interfaces 2004; 26 (3): 167-169.
-
(2004)
Computer Standards and Interfaces
, vol.26
, Issue.3
, pp. 167-169
-
-
Hsu, C.L.1
-
8
-
-
1942423677
-
Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards
-
Ku WC, Chen SM,. Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics 2004; 50 (1): 204-207.
-
(2004)
IEEE Transactions on Consumer Electronics
, vol.50
, Issue.1
, pp. 204-207
-
-
Ku, W.C.1
Chen, S.M.2
-
9
-
-
32444434862
-
Efficient remote mutual authentication and key agreement
-
Shieh WG, Wang JM,. Efficient remote mutual authentication and key agreement. Computers and Security 2006; 25 (1): 72-77.
-
(2006)
Computers and Security
, vol.25
, Issue.1
, pp. 72-77
-
-
Shieh, W.G.1
Wang, J.M.2
-
10
-
-
4243365845
-
-
Bellcore Press Release Bellcore Press Release, September
-
Bellcore Press Release. New threat model breaks crypto codes, Bellcore Press Release, September 1996.
-
(1996)
New Threat Model Breaks Crypto Codes
-
-
-
11
-
-
84939573910
-
Differential power analysis
-
Santa Barbara, CA, U.S.A.
-
Kocher P, Jaffe J, Jun B,. Differential power analysis. Proceedings of Advances in Cryptology, Santa Barbara, CA, U.S.A., 1999; 388-397.
-
(1999)
Proceedings of Advances in Cryptology
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
12
-
-
0036566408
-
Examining smart-card security under the threat of power analysis attacks
-
DOI 10.1109/TC.2002.1004593
-
Messerges TS, Dabbish EA, Sloan RH,. Examining smart-card security under the threat of power analysis attacks. IEEE Transactions on Computers 2002; 51 (5): 541-552. (Pubitemid 34550462)
-
(2002)
IEEE Transactions on Computers
, vol.51
, Issue.5
, pp. 541-552
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
-
13
-
-
0034276289
-
Checking before output may not be enough against fault-based cryptanalysis
-
Yen SM, Joye M,. Checking before output may not be enough against fault-based cryptanalysis. IEEE Transactions on Computers 2002; 49 (9): 967-970.
-
(2002)
IEEE Transactions on Computers
, vol.49
, Issue.9
, pp. 967-970
-
-
Yen, S.M.1
Joye, M.2
-
15
-
-
43649083106
-
Cryptanalysis of a password authentication scheme over insecure networks
-
DOI 10.1016/j.jcss.2007.05.001, PII S0022000007000657
-
Xiang T, Wong KW, Liao X,. Cryptanalysis of a password authentication scheme over insecure networks. Journal of Computer and System Sciences 2008; 74 (5): 657-661. (Pubitemid 351685697)
-
(2008)
Journal of Computer and System Sciences
, vol.74
, Issue.5
, pp. 657-661
-
-
Xiang, T.1
Wong, K.-w.2
Liao, X.3
-
16
-
-
34248666700
-
Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards
-
DOI 10.1016/j.csi.2006.11.005, PII S0920548906001322
-
Wang XM, Zhang WF, Zhang JS, Khan MK,. Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards. Computer Standards and Interfaces 2007; 29 (5): 507-512. (Pubitemid 46771122)
-
(2007)
Computer Standards and Interfaces
, vol.29
, Issue.5
, pp. 507-512
-
-
Wang, X.-M.1
Zhang, W.-F.2
Zhang, J.-S.3
Khan, M.K.4
-
17
-
-
15544370112
-
Further cryptanalysis of fingerprint-based remote user authentication scheme using smartcards
-
DOI 10.1049/el:20047658
-
Ku WC, Chang ST, Chiang MH,. Further cryptanalysis of fingerprint based remote user authentication scheme using smart cards. IEEE Electronics Letters 2005; 41 (5): 240-241. (Pubitemid 40401878)
-
(2005)
Electronics Letters
, vol.41
, Issue.5
, pp. 240-241
-
-
Ku, W.C.1
Chang, S.T.2
Chiang, M.H.3
-
18
-
-
0025384135
-
Identity authentication on keystroke latencies
-
Joyce R, Gupta G,. Identity authentication on keystroke latencies. Communication of the ACM 1990; 33 (2): 168-176.
-
(1990)
Communication of the ACM
, vol.33
, Issue.2
, pp. 168-176
-
-
Joyce, R.1
Gupta, G.2
-
19
-
-
0029214744
-
Biometric, is it a viable proposition for identity authentication and access control
-
Kim HJ,. Biometric, is it a viable proposition for identity authentication and access control. Computers and Security 1995; 14 (3): 205-214.
-
(1995)
Computers and Security
, vol.14
, Issue.3
, pp. 205-214
-
-
Kim, H.J.1
-
20
-
-
0037030525
-
Fingerprint-based remote user authentication scheme using smart cards
-
DOI 10.1049/el:20020380
-
Lee JK, Ryu SR, Yoo KY,. Fingerprint-based remote user authentication scheme using smart cards. IEEE Electronics Letters 2002; 38 (12): 554-555. (Pubitemid 34684645)
-
(2002)
Electronics Letters
, vol.38
, Issue.12
, pp. 554-555
-
-
Lee, J.K.1
Ryu, S.R.2
Yoo, K.Y.3
-
21
-
-
4043139259
-
A flexible biometric remote user authentication scheme
-
Lin CH, Lai YY,. A flexible biometric remote user authentication scheme. Computer Standard and Interfaces 2004; 27 (1): 19-23.
-
(2004)
Computer Standard and Interfaces
, vol.27
, Issue.1
, pp. 19-23
-
-
Lin, C.H.1
Lai, Y.Y.2
-
22
-
-
15544370112
-
Further cryptanalysis of fingerprint-based remote user authentication scheme using smartcards
-
DOI 10.1049/el:20047658
-
Ku WC, Chang ST, Chiang MH,. Further cryptanalysis of fingerprint based remote user authentication scheme using smart cards. IEEE Electronics Letters 2005; 41 (5): 240-241. (Pubitemid 40401878)
-
(2005)
Electronics Letters
, vol.41
, Issue.5
, pp. 240-241
-
-
Ku, W.C.1
Chang, S.T.2
Chiang, M.H.3
-
23
-
-
33751167604
-
Improving the security of 'a flexible biometrics remote user authentication scheme'
-
DOI 10.1016/j.csi.2006.01.002, PII S0920548906000122
-
Khan MK, Zhang J,. Improving the security of a flexible biometrics remote user authentication scheme. Computer Standards and Interfaces 2007; 29 (1): 82-85. (Pubitemid 44773789)
-
(2007)
Computer Standards and Interfaces
, vol.29
, Issue.1
, pp. 82-85
-
-
Khan, M.K.1
Zhang, J.2
-
25
-
-
34548620637
-
Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices
-
DOI 10.1016/j.chaos.2006.05.061, PII S096007790600498X
-
Khan MK, Zhang J, Wang X,. Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices. Chaos Solution and Fractals 2008; 35 (3): 519-524. (Pubitemid 47404851)
-
(2008)
Chaos, Solitons and Fractals
, vol.35
, Issue.3
, pp. 519-524
-
-
Khan, M.K.1
Zhang, J.2
Wang, X.3
-
26
-
-
84860675336
-
Enhancing the security of e-government portals using biometric voice along with a traditional password
-
Cambridge, U.K.
-
Al-Sarayreh KT, Al-Qutaish RE,. Enhancing the security of e-government portals using biometric voice along with a traditional password. Proceedings of the Seventh WSEAS international Conference on Artificial intelligence, Knowledge Engineering and Data Bases, Cambridge, U.K., 2008; 101-108.
-
(2008)
Proceedings of the Seventh WSEAS International Conference on Artificial Intelligence, Knowledge Engineering and Data Bases
, pp. 101-108
-
-
Al-Sarayreh, K.T.1
Al-Qutaish, R.E.2
-
27
-
-
56349171150
-
Biometrics and their use in e-passports
-
Ben S, Bart J,. Biometrics and their use in e-passports. Image and Version Computing 2009; 27: 305-312.
-
(2009)
Image and Version Computing
, vol.27
, pp. 305-312
-
-
Ben, S.1
Bart, J.2
-
28
-
-
34547519982
-
Privacy preserving multi-factor authentication with biometrics
-
The Second ACM Workshop on Digita; Identity Management - DIM 2006
-
Bhargav-Spantzel A, Squicciarini AC, Modi S, Young M, Bertino E, Elliott SJ,. Privacy preserving multi-factor authentication with biometrics. Journal of Computer Security 2007; 15 (5): 529-560. (Pubitemid 47182339)
-
(2007)
Journal of Computer Security
, vol.15
, Issue.5
, pp. 529-560
-
-
Bhargav-Spantzel, A.1
Squicciarini, A.C.2
Modi, S.3
Young, M.4
Bertino, E.5
Elliott, S.J.6
-
29
-
-
38949203738
-
Cancelable biometrics and annotations on BioHash
-
Teoh ABJ, Kuan YW, Lee S,. Cancelable biometrics and annotations on BioHash. Pattern Recognition 2008; 41 (6): 2034-2044.
-
(2008)
Pattern Recognition
, vol.41
, Issue.6
, pp. 2034-2044
-
-
Teoh, A.B.J.1
Kuan, Y.W.2
Lee, S.3
-
30
-
-
26444519149
-
-
Lecture Notes in Computer Science, 3546. Springer: Berlin.
-
Su Q, Tian J, Chen X, Yang X,. A Fingerprint Authentication System Based on Mobile Phone. Lecture Notes in Computer Science, vol. 3546. Springer: Berlin, 2005; 151-159.
-
(2005)
A Fingerprint Authentication System Based on Mobile Phone
, pp. 151-159
-
-
Su, Q.1
Tian, J.2
Chen, X.3
Yang, X.4
-
31
-
-
84860671637
-
-
Fujitsu Inc. access available 24/10/ 2009
-
Fujitsu Inc. Available from: http://www.fujitsu.com/sg/services/ computing/pc/notebooks/useries/u2010/index.html, access available 24/10/ 2009.
-
-
-
-
32
-
-
84860693113
-
-
Mobile Gazette Inc. access available 24/10/ 2009
-
Mobile Gazette Inc. Availble from:, access available http://www. mobilegazette.com/toshiba-portege-g910-08x02x13.htm 24/10/ 2009.
-
-
-
-
33
-
-
84860686569
-
-
Transcend Information Inc. access available 24/10/ 2009
-
Transcend Information Inc. Available from: http://www.transcendusa.com/ Products/Modlist.asp?CatNo=95&LangNo=0, access available 24/10/ 2009.
-
-
-
-
34
-
-
23344449693
-
ID-based password authentication scheme using smart cards and fingerprints
-
Kim HS, Lee SW, Yoo KY,. ID-based password authentication scheme using smart cards and fingerprints. ACM Operating System 2003; 37 (4): 32-41.
-
(2003)
ACM Operating System
, vol.37
, Issue.4
, pp. 32-41
-
-
Kim, H.S.1
Lee, S.W.2
Yoo, K.Y.3
-
35
-
-
33745726025
-
On the security of ID-based password authentication scheme using smart cards and fingerprints
-
Hsinchu, Taiwan
-
Lin CH, Lin TS, Lin HH, Lai YY,. On the security of ID-based password authentication scheme using smart cards and fingerprints. Third International Conference on Information Technology: Information Technology: Research and Education (ITRE 2005), Hsinchu, Taiwan, 2005; 230-232.
-
(2005)
Third International Conference on Information Technology: Information Technology: Research and Education (ITRE 2005)
, pp. 230-232
-
-
Lin, C.H.1
Lin, T.S.2
Lin, H.H.3
Lai, Y.Y.4
-
36
-
-
52949137008
-
Two-factor mutual authentication based on smart card and passwords
-
Yang G, Wong DS, Wang H, Deng X,. Two-factor mutual authentication based on smart card and passwords. Journal of Computer and System Sciences 2008; 74 (7): 1160-1172.
-
(2008)
Journal of Computer and System Sciences
, vol.74
, Issue.7
, pp. 1160-1172
-
-
Yang, G.1
Wong, D.S.2
Wang, H.3
Deng, X.4
|