-
1
-
-
0019634370
-
Password Authentication with Insecure Communication
-
464646 10.1145/358790.358797
-
Lamport, L.; Password Authentication with Insecure Communication. Comm. ACM 24(11):770-772, 1981.
-
(1981)
Communications of the ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
3
-
-
33748125161
-
A secure identification and key agreement protocol with user anonymity (SIKA)
-
10.1016/j.cose.2006.05.002
-
Mangipudi, K.; Katti, R.; A secure identification and key agreement protocol with user anonymity (SIKA). Comput. Secur, 25(6):420-425, 2006.
-
(2006)
Computers & Security
, vol.25
, Issue.6
, pp. 420-425
-
-
Mangipudi, K.1
Katti, R.2
-
4
-
-
36349005859
-
Authenticated multiple key exchange protocols based on elliptic curves and bilinear pairings
-
1130.68050 10.1016/j.compeleceng.2006.11.005
-
Lee, N.-Y.; Wu, C.-N.; Wang, C.-C.; Authenticated multiple key exchange protocols based on elliptic curves and bilinear pairings. Comput. Electr. Eng. 34(1):12-20, 2008.
-
(2008)
Computers & Electrical Engineering
, vol.34
, Issue.1
, pp. 12-20
-
-
Lee, N.-Y.1
Wu, C.-N.2
Wang, C.-C.3
-
5
-
-
63049116480
-
An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem
-
10.1016/j.cose.2008.11.008
-
Yang, J.-H.; Chang, C.-C.; An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. Comput. Secur. 28:138-143, 2009.
-
(2009)
Computers and Security
, vol.28
, pp. 138-143
-
-
Yang, J.-H.1
Chang, C.-C.2
-
6
-
-
79952538982
-
Provably secure and efficient identification and key agreement protocol with user anonymity
-
doi: 10.1016/j.jcss.2010.07.004
-
Wang, R.-C.; Juang, W.-S.; Lei, C.-L.; Provably secure and efficient identification and key agreement protocol with user anonymity. J. Comput. Syst. Sci. doi: 10.1016/j.jcss.2010.07.004, 2010.
-
(2010)
J. Comput. Syst. Sci.
-
-
Wang, R.-C.1
Juang, W.-S.2
Lei, C.-L.3
-
7
-
-
80052614336
-
An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security
-
doi: 10.1016/j.infus.2011.01.001
-
He, D.; Chen, J.; Hu, J.; An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security. Inform. Fusion. doi: 10.1016/j.infus.2011.01.001, 2011.
-
(2011)
Inform. Fusion.
-
-
He, D.1
Chen, J.2
Hu, J.3
-
8
-
-
84863985527
-
A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography
-
doi: 10.1002/sec.506 2011
-
He, D.; Chen, J.; Chen, Y.; A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography. Secur. Comm. Network. doi: 10.1002/sec.506, 2011.
-
Secur. Comm. Network.
-
-
He, D.1
Chen, J.2
Chen, Y.3
-
9
-
-
84859767453
-
An efficient remote user authentication and key exchange protocol for mobile client-server environment from pairings
-
doi: 10.1016/j.adhoc.2012.01.002
-
He, D.; An efficient remote user authentication and key exchange protocol for mobile client-server environment from pairings, Ad Hoc Networks. doi: 10.1016/j.adhoc.2012.01.002, 2012.
-
(2012)
Ad Hoc Networks
-
-
He, D.1
-
10
-
-
84863989374
-
Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol
-
doi: 10.1007/s11071-012-0335-0
-
He, D.; Chen, Y.; Chen, J.; Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol, Nonlinear Dynam. doi: 10.1007/s11071-012-0335-0, 2012.
-
(2012)
Nonlinear Dynam.
-
-
He, D.1
Chen, Y.2
Chen, J.3
-
11
-
-
84864061174
-
A secure authentication scheme for telecare medicine information systems
-
doi: 10.1007/s10916-010-9614-9
-
Wu, Z. Y.; Lee, Y. C.; Lai, F.; Lee H. C.; and Chung, Y.; A secure authentication scheme for telecare medicine information systems. J. Med. Syst. doi: 10.1007/s10916-010-9614-9, 2010.
-
(2010)
J. Med. Syst.
-
-
Wu, Z.Y.1
Lee, Y.C.2
Lai, F.3
Lee, H.C.4
Chung, Y.5
-
12
-
-
84864058187
-
A more secure authentication scheme for telecare medicine information systems
-
doi: 10.1007/s10916-011-9658-5
-
He, D. B.; Chen, J. H.; and Zhang, R.; A more secure authentication scheme for telecare medicine information systems. J. Med. Syst. doi: 10.1007/s10916-011-9658-5, 2011.
-
(2011)
J. Med. Syst.
-
-
He, D.B.1
Chen, J.H.2
Zhang, R.3
-
13
-
-
84867869987
-
An Improved Authentication Scheme for Telecare Medicine Information Systems
-
doi: 10.1007/s10916-012-9835-1
-
Wei, J.; Hu, X.; Liu, W.; An Improved Authentication Scheme for Telecare Medicine Information Systems, J. Med. Syst. doi: 10.1007/s10916-012-9835-1, 2012.
-
(2012)
J. Med. Syst.
-
-
Wei, J.1
Hu, X.2
Liu, W.3
-
15
-
-
0036566408
-
Examining smart-card security under the threat of power analysis attacks
-
1901004 10.1109/TC.2002.1004593
-
Messerges T.; Dabbish E.; Sloan R.; Examining smart-card security under the threat of power analysis attacks, IEEE Trans. Comput. 51(5):541-552, 2002.
-
(2002)
IEEE Transactions on Computers
, vol.51
, Issue.5
, pp. 541-552
-
-
Messerges, T.1
Dabbish, E.2
Sloan, R.3
-
16
-
-
84873982441
-
PKCS, Public key cryptography standards, PKCS #1 v2.1
-
PKCS, Public key cryptography standards, PKCS #1 v2.1, RSA Cryptography Standard, Draft 2, 2001. Available at http://www.rsasecurity.com/rsalabs/pkcs/
-
(2001)
RSA Cryptography Standard, Draft 2
-
-
-
18
-
-
84873981630
-
-
Wikipedia, RSA (algorithm)
-
Wikipedia, RSA (algorithm). Available at http://en.wikipedia.org/wiki/ RSA-(algorithm)
-
-
-
|