-
1
-
-
0019634370
-
Password authentication with insecure communication
-
Lamport, L.: Password authentication with insecure communication. Communications of the ACM 24(11), 770-772 (1981)
-
(1981)
Communications of the ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
2
-
-
33748126252
-
A password authentication scheme over insecure networks
-
Liao, I.E., Lee, C.C., Hwang, M.S.: A password authentication scheme over insecure networks. Journal of Computer and System Sciences 72(4), 727-740 (2006)
-
(2006)
Journal of Computer and System Sciences
, vol.72
, Issue.4
, pp. 727-740
-
-
Liao, I.E.1
Lee, C.C.2
Hwang, M.S.3
-
3
-
-
77955312905
-
Advanced smart card based password authentication protocol
-
Song, R.: Advanced smart card based password authentication protocol. Computer Standards & Interfaces 32(5), 321-325 (2010)
-
(2010)
Computer Standards & Interfaces
, vol.32
, Issue.5
, pp. 321-325
-
-
Song, R.1
-
4
-
-
78049322666
-
Two robust remote user authentication protocols using smart cards
-
Yeh, K.H., Su, C., Lo, N.W., Li, Y., Hung, Y.X.: Two robust remote user authentication protocols using smart cards. Journal of Systems and Software 83(12), 2556-2565 (2010)
-
(2010)
Journal of Systems and Software
, vol.83
, Issue.12
, pp. 2556-2565
-
-
Yeh, K.H.1
Su, C.2
Lo, N.W.3
Li, Y.4
Hung, Y.X.5
-
5
-
-
84863239521
-
Cryptanalysis and Improvement of Sood et al.'s Dynamic ID-Based Authentication Scheme
-
Ramanujam, R., Ramaswamy, S. (eds.) ICDCIT 2012. Springer, Heidelberg
-
Ma, C.-G., Wang, D., Zhang, Q.-M.: Cryptanalysis and Improvement of Sood et al.'s Dynamic ID-Based Authentication Scheme. In: Ramanujam, R., Ramaswamy, S. (eds.) ICDCIT 2012. LNCS, vol. 7154, pp. 141-152. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7154
, pp. 141-152
-
-
Ma, C.-G.1
Wang, D.2
Zhang, Q.-M.3
-
6
-
-
84860614830
-
A New Dynamic ID-Based Remote User Authentication Scheme with Forward Secrecy
-
Wang, H., Zou, L., Huang, G., He, J., Pang, C., Zhang, H.L., Zhao, D., Yi, Z. (eds.) APWeb 2012 Workshops. Springer, Heidelberg
-
Ma, C.-G., Wang, D., Zhao, P., Wang, Y.-H.: A New Dynamic ID-Based Remote User Authentication Scheme with Forward Secrecy. In: Wang, H., Zou, L., Huang, G., He, J., Pang, C., Zhang, H.L., Zhao, D., Yi, Z. (eds.) APWeb 2012 Workshops. LNCS, vol. 7234, pp. 199-211. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7234
, pp. 199-211
-
-
Ma, C.-G.1
Wang, D.2
Zhao, P.3
Wang, Y.-H.4
-
7
-
-
0040231044
-
Foiling the cracker: A survey of, and improvements to, password security
-
Klein, D.V.: Foiling the cracker: A survey of, and improvements to, password security. In: Proceedings of the 2nd USENIX Security Workshop, pp. 5-14 (1990)
-
(1990)
Proceedings of the 2nd USENIX Security Workshop
, pp. 5-14
-
-
Klein, D.V.1
-
8
-
-
78751645363
-
Robust authentication and key agreement scheme preserving the privacy of secret key
-
Wang, R.C., Juang, W.S., Lei, C.L.: Robust authentication and key agreement scheme preserving the privacy of secret key. Computer Communications 34(3), 274-280 (2011)
-
(2011)
Computer Communications
, vol.34
, Issue.3
, pp. 274-280
-
-
Wang, R.C.1
Juang, W.S.2
Lei, C.L.3
-
9
-
-
84863056589
-
Robust smart-cards-based user authentication scheme with user anonymity
-
Wu, S.H., Zhu, Y.F., Pu, Q.: Robust smart-cards-based user authentication scheme with user anonymity. Security and Communication Networks 5(2), 236-248 (2012)
-
(2012)
Security and Communication Networks
, vol.5
, Issue.2
, pp. 236-248
-
-
Wu, S.H.1
Zhu, Y.F.2
Pu, Q.3
-
10
-
-
84867869987
-
An improved authentication scheme for telecare medicine information systems
-
doi:10.1007/s10916-012-9835-1
-
Wei, J., Hu, X., Liu, W.: An improved authentication scheme for telecare medicine information systems. Journal of Medical Systems (2011), doi:10.1007/s10916-012-9835-1
-
(2011)
Journal of Medical Systems
-
-
Wei, J.1
Hu, X.2
Liu, W.3
-
11
-
-
84873039261
-
Strong authentication scheme for telecare medicine information systems
-
doi:10.1007/s10916-011-9735-9
-
Pu, Q., Wang, J., Zhao, R.: Strong authentication scheme for telecare medicine information systems. Journal of Medical Systems (2011), doi:10.1007/s10916-011-9735-9
-
(2011)
Journal of Medical Systems
-
-
Pu, Q.1
Wang, J.2
Zhao, R.3
-
12
-
-
84864058187
-
A more secure authentication scheme for telecare medicine information systems
-
doi:10.1007/s10916-011-9658-5
-
He, D.B., Chen, J.H., Zhang, R.: A more secure authentication scheme for telecare medicine information systems. Journal of Medical Systems (2011), doi:10.1007/s10916-011-9658-5
-
(2011)
Journal of Medical Systems
-
-
He, D.B.1
Chen, J.H.2
Zhang, R.3
-
13
-
-
84892506781
-
Design of improved password authentication and update scheme based on elliptic curve cryptography
-
doi:10.1016/j.mcm.2011.07.001
-
Islam, S.H., Biswas, G.P.: Design of improved password authentication and update scheme based on elliptic curve cryptography. Mathematical and Computer Modelling (2011), doi:10.1016/j.mcm.2011.07.001
-
(2011)
Mathematical and Computer Modelling
-
-
Islam, S.H.1
Biswas, G.P.2
-
14
-
-
84867658189
-
Comments on a password authentication and update scheme based on elliptic curve cryptography
-
ePrint Archive, Report 2011/411
-
He, D.B.: Comments on a password authentication and update scheme based on elliptic curve cryptography. Cryptology ePrint Archive, Report 2011/411 (2011), http://eprintH.iacr.org/2011/411.pdf
-
(2011)
Cryptology
-
-
He, D.B.1
-
15
-
-
24944496397
-
Dos-resistant access control protocol with identity confidentiality for wireless networks
-
IEEE Press, New York
-
Wan, Z., Zhu, B., Deng, R.H., Bao, F., Ananda, A.L.: Dos-resistant access control protocol with identity confidentiality for wireless networks. In: 2005 IEEE Wireless Communications and Networking Conference (WCNC), vol. 3, pp. 1521-1526. IEEE Press, New York (2005)
-
(2005)
2005 IEEE Wireless Communications and Networking Conference (WCNC)
, vol.3
, pp. 1521-1526
-
-
Wan, Z.1
Zhu, B.2
Deng, R.H.3
Bao, F.4
Ananda, A.L.5
-
16
-
-
0344875575
-
Information hiding, anonymity and privacy: A modular approach
-
Hughes, D., Shmatikov, V.: Information hiding, anonymity and privacy: a modular approach. Journal of Computer Security 12(1), 3-36 (2004)
-
(2004)
Journal of Computer Security
, vol.12
, Issue.1
, pp. 3-36
-
-
Hughes, D.1
Shmatikov, V.2
-
17
-
-
84862952685
-
Cryptanalysis and security enhancement of an advanced authentication scheme using smart cards, and a key agreement scheme for two-party communication
-
IEEE Press, New York
-
Roy, S., Das, A.K., Li, Y.: Cryptanalysis and security enhancement of an advanced authentication scheme using smart cards, and a key agreement scheme for two-party communication. In: 2011 IEEE 30th International Performance Computing and Communications Conference (IPCCC), pp. 1-7. IEEE Press, New York (2011)
-
(2011)
2011 IEEE 30th International Performance Computing and Communications Conference (IPCCC)
, pp. 1-7
-
-
Roy, S.1
Das, A.K.2
Li, Y.3
-
18
-
-
78049296439
-
A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges
-
Cao, X., Kou, W., Du, X.: A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges. Information Sciences 180(15), 2895-2903 (2010)
-
(2010)
Information Sciences
, vol.180
, Issue.15
, pp. 2895-2903
-
-
Cao, X.1
Kou, W.2
Du, X.3
|