-
1
-
-
0036302680
-
An ef-ficient, and practical solution to remote authentica-tion: Smart card
-
H. Y. Chien, J. K. Jan, and Y. M. Tseng, "An ef-ficient, and practical solution to remote authentica-tion: Smart card," Computers & Security, vol. 21, no. 4, pp. 372-375, 2002.
-
(2002)
Computers & Security
, vol.21
, Issue.4
, pp. 372-375
-
-
Chien, H.Y.1
Jan, J.K.2
Tseng, Y.M.3
-
2
-
-
0037282439
-
A password authenti-cation scheme with secure password updating
-
L. L. Chun and T. L. Hwang, "A password authenti-cation scheme with secure password updating," Com-puters & Security, vol. 22, pp. 68-72, 2003.
-
(2003)
Com-puters & Security
, vol.22
, pp. 68-72
-
-
Chun, L.L.1
Hwang, T.L.2
-
4
-
-
12244276366
-
User authentication wit h smart cards in trusted computing architecture
-
Las Vegas, Nevada, USA
-
P. George, "User authentication wit h smart cards in trusted computing architecture," Proceedings of the International Conference on Security and Manage-ment, pp. 25-31, Las Vegas, Nevada, USA, 2004.
-
(2004)
Proceedings of the International Conference on Security and Manage-ment
, pp. 25-31
-
-
George, P.1
-
5
-
-
0019634370
-
Password authentication with insecure communication
-
L. Lamport, "Password authentication with insecure communication," Communications of the ACM, vol. 24, pp. 770-772, 1981.
-
(1981)
Communications of the ACM
, vol.24
, pp. 770-772
-
-
Lamport, L.1
-
6
-
-
1942423677
-
Weaknesses and im-provements of an efficient password based remote user authentication scheme using smart cards
-
W. C. Ku and S. M. Chen, "Weaknesses and im-provements of an efficient password based remote user authentication scheme using smart cards," IEEE Transaction on Consumer Electronics, vol. 50, pp. 204-207, 2004.
-
(2004)
IEEE Transaction on Consumer Electronics
, vol.50
, pp. 204-207
-
-
Ku, W.C.1
Chen, S.M.2
-
8
-
-
33748126252
-
A pass-word authentication scheme over insecure networks
-
I. E. Liao, C. C. Lee, and M. S. Hwang, "A pass-word authentication scheme over insecure networks," Journal of Computer and System Sciences, vol. 72, pp. 727-740, 2006.
-
(2006)
Journal of Computer and System Sciences
, vol.72
, pp. 727-740
-
-
Liao, I.E.1
Lee, C.C.2
Hwang, M.S.3
-
9
-
-
24944506569
-
Trusted Computing: Strengths, Weak-nesses, and Further Opportunities for Enhancing Privacy
-
LNCS 3477, Springer-Verlag
-
S. Pearson, "Trusted Computing: Strengths, Weak-nesses, and Further Opportunities for Enhancing Privacy," iTrust 2005, LNCS 3477, pp. 305-320, Springer-Verlag, 2005.
-
(2005)
iTrust 2005
, pp. 305-320
-
-
Pearson, S.1
-
10
-
-
61349102383
-
Trustworthy clients: Ex-tending TNC to web-based environments
-
S. Rehbocka and R. Hunt, "Trustworthy clients: Ex-tending TNC to web-based environments," Com-puter Communications, vol. 32, pp. 1006-1013, 2009.
-
(2009)
Com-puter Communications
, vol.32
, pp. 1006-1013
-
-
Rehbocka, S.1
Hunt, R.2
-
11
-
-
34547277604
-
Survey of Information Security
-
C. X. Shen, H. G. Zhang, D. G. Feng, et al., "Survey of Information Security," Science China Information Sciences, vol. 50, pp. 273-298, 2007.
-
(2007)
Science China Information Sciences
, vol.50
, pp. 273-298
-
-
Shen, C.X.1
Zhang, H.G.2
Feng, D.G.3
-
12
-
-
77952302538
-
Research on trusted computing and its development
-
C. X. Shen, H. Zhang, H. M. Wang, et al., "Research on trusted computing and its development," Science China Information Sciences, vol. 53, pp. 405-433, 2010.
-
(2010)
Science China Information Sciences
, vol.53
, pp. 405-433
-
-
Shen, C.X.1
Zhang, H.2
Wang, H.M.3
-
13
-
-
79953218276
-
A Ro-bust integrity Reporting Protocol for Remote Attes-tation
-
Tokyo, Japan
-
F. Stumpf, O. Tafreschi, P. Roder, et al., "A Ro-bust integrity Reporting Protocol for Remote Attes-tation," Proceedings of the Second Workshop on Ad-vances in Trusted Computing, Tokyo, Japan, 2006.
-
(2006)
Proceedings of the Second Workshop on Ad-vances in Trusted Computing
-
-
Stumpf, F.1
Tafreschi, O.2
Roder, P.3
-
16
-
-
84863275410
-
-
Trusted Computing Group, TCG Trusted Net-work Connect TNC Architecture for Interoperability XSpecification Version 1.2, 2007
-
Trusted Computing Group, TCG Trusted Net-work Connect TNC Architecture for Interoperability XSpecification Version 1.2, 2007. (http://www.trus-tedcomputinggroup.org)
-
-
-
-
17
-
-
40949152760
-
Pass-word authentication schemes: Current status and key issues
-
C. S. Tsai, C. C. Lee, and M. S. Hwang, "Pass-word authentication schemes: Current status and key issues," International Journal of Network Secu-rity, vol. 3, pp. 101-115, 2006.
-
(2006)
International Journal of Network Secu-rity
, vol.3
, pp. 101-115
-
-
Tsai, C.S.1
Lee, C.C.2
Hwang, M.S.3
-
18
-
-
52949137008
-
Two-factor mutual authentication based on smart cards and passwords
-
G. Yang, D. S. Wong, H. Wang, and X. Deng, "Two-factor mutual authentication based on smart cards and passwords," Journal of Computer and System Sciences, vol. 74, pp. 1160-1172, 2008.
-
(2008)
Journal of Computer and System Sciences
, vol.74
, pp. 1160-1172
-
-
Yang, G.1
Wong, D.S.2
Wang, H.3
Deng, X.4
|