-
1
-
-
0036302680
-
An efficient and practical solution to remote authentication smart card
-
H.Y. Chien, J.K. Jan, and Y.M. Tseng An efficient and practical solution to remote authentication smart card Computers & Security 21 4 2002 372 375
-
(2002)
Computers & Security
, vol.21
, Issue.4
, pp. 372-375
-
-
Chien, H.Y.1
Jan, J.K.2
Tseng, Y.M.3
-
2
-
-
78751648745
-
A strong user authentication scheme with smart cards for wireless communications
-
Daojing He, Maode Ma, Yan Zhang, Chun Chen, and Jiajun Bu A strong user authentication scheme with smart cards for wireless communications Computer Communications 34 3 15 March 2011 367 374
-
(2011)
Computer Communications
, vol.34
, Issue.3
, pp. 367-374
-
-
He, D.1
Ma, M.2
Zhang, Y.3
Chen, C.4
Bu, J.5
-
3
-
-
80054052709
-
Weaknesses of a remote user password authentication scheme using smart card
-
Debiao He, Jianhua Chen, and Jin Hu Weaknesses of a remote user password authentication scheme using smart card International Journal of Network Security 13 1 2011 58 60
-
(2011)
International Journal of Network Security
, vol.13
, Issue.1
, pp. 58-60
-
-
He, D.1
Chen, J.2
Hu, J.3
-
4
-
-
59649086399
-
Weaknesses and improvements of the Yoon-Ryu-Yoo remote user authentication scheme using smart cards
-
H.C. Hsiang, and W.K. Shih Weaknesses and improvements of the Yoon-Ryu-Yoo remote user authentication scheme using smart cards Computer Communications 32 2009 649 652
-
(2009)
Computer Communications
, vol.32
, pp. 649-652
-
-
Hsiang, H.C.1
Shih, W.K.2
-
5
-
-
0036556279
-
Improvement on Peyravian-Zunic's password authentication schemes
-
J.J. Hwang, and T.C. Yeh Improvement on Peyravian-Zunic's password authentication schemes IEICE Transactions on Communications E85-B 4 April 2002 823 825
-
(2002)
IEICE Transactions on Communications
, vol.85
, Issue.4
, pp. 823-825
-
-
Hwang, J.J.1
Yeh, T.C.2
-
6
-
-
73149124039
-
Cryptanalysis of a remote user authentication scheme using smart cards
-
Huang Kai, Ou Qingyu, Wu Xiaoping, and Song Yexin Cryptanalysis of a remote user authentication scheme using smart cards Proceedings of 5th International Conference on Wireless Communications, Networking and Mobile Computing(WiCom'09) 2009 1 4 Beijing, China, Sept. 24-26
-
(2009)
Proceedings of 5th International Conference on Wireless Communications, Networking and Mobile Computing(WiCom'09)
, pp. 1-4
-
-
Kai, H.1
Qingyu, O.2
Xiaoping, W.3
Yexin, S.4
-
8
-
-
1942423677
-
Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards
-
W.C. Ku, and S.M. Chen Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards IEEE Transactions on Consumer Electronics 50 1 2004 204 207
-
(2004)
IEEE Transactions on Consumer Electronics
, vol.50
, Issue.1
, pp. 204-207
-
-
Ku, W.C.1
Chen, S.M.2
-
9
-
-
0019634370
-
Password authentication with insecure communication
-
L. Lamport Password authentication with insecure communication Communications of the ACM 24 11 1981 770 772
-
(1981)
Communications of the ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
10
-
-
0041698517
-
A remote user authentication scheme using hash functions
-
Cheng-Chi Lee, Li-Hua Li, and Min-Shiang Hwang A remote user authentication scheme using hash functions ACM SIGOPS Operating System Review 36 4 October 2002 23 29
-
(2002)
ACM SIGOPS Operating System Review
, vol.36
, Issue.4
, pp. 23-29
-
-
Lee, C.-C.1
Li, L.-H.2
Hwang, M.-S.3
-
12
-
-
0036566408
-
Examining smart card security under the threat of power analysis attacks
-
T.S. Messerges, E.A. Dabbish, and R.H. Sloan Examining smart card security under the threat of power analysis attacks IEEE Transactions on Computers 51 5 2002 541 552
-
(2002)
IEEE Transactions on Computers
, vol.51
, Issue.5
, pp. 541-552
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
-
13
-
-
0033704170
-
Methods for protecting password transmission
-
M. Peyravian, and N. Zunic Methods for protecting password transmission Computers & Security 19 5 2000 466 469
-
(2000)
Computers & Security
, vol.19
, Issue.5
, pp. 466-469
-
-
Peyravian, M.1
Zunic, N.2
-
14
-
-
0003256983
-
Shared authentication token secure against replay and weak key attack
-
S.M. Yen, and K.H. Liao Shared authentication token secure against replay and weak key attack Information Processing Letters 1997 78 80
-
(1997)
Information Processing Letters
, pp. 78-80
-
-
Yen, S.M.1
Liao, K.H.2
-
15
-
-
4043152192
-
Further improvement of an efficient password based remote user authentication scheme using smart cards
-
E.J. Yoon, E.K. Ryu, and K.Y. Yoo Further improvement of an efficient password based remote user authentication scheme using smart cards IEEE Transactions on Consumer Electronics 50 2 2004 612 614
-
(2004)
IEEE Transactions on Consumer Electronics
, vol.50
, Issue.2
, pp. 612-614
-
-
Yoon, E.J.1
Ryu, E.K.2
Yoo, K.Y.3
|