-
1
-
-
0019634370
-
Password authentication with insecure communication
-
Lamport L. Password authentication with insecure communication. Communications of the ACM 1981; 24(11): 770-772.
-
(1981)
Communications of the ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
2
-
-
0000873739
-
Reparable key distribution protocols for Internet environments
-
Hwang T, Ku WC. Reparable key distribution protocols for Internet environments. IEEE Transactions on Consumer Electronics 1995; 43(5): 1947-1949.
-
(1995)
IEEE Transactions on Consumer Electronics
, vol.43
, Issue.5
, pp. 1947-1949
-
-
Hwang, T.1
Ku, W.C.2
-
3
-
-
0034318245
-
An efficient remote user authentication scheme using smart cards
-
Sun HM. An efficient remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics 2000; 46(4): 958-961.
-
(2000)
IEEE Transactions on Consumer Electronics
, vol.46
, Issue.4
, pp. 958-961
-
-
Sun, H.M.1
-
5
-
-
4043089982
-
An enhanced remote user authentication scheme using smart cards
-
Awashti AK, Sunder Lal An enhanced remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics 2004; 50(2): 583-586.
-
(2004)
IEEE Transactions on Consumer Electronics
, vol.50
, Issue.2
, pp. 583-586
-
-
Awashti, A.K.1
Sunder Lal2
-
7
-
-
77955495427
-
Cryptanalysis and security improvements of 'two-factor user authentication in wireless sensor networks'
-
Khan MK, Alghathbar K. Cryptanalysis and security improvements of 'two-factor user authentication in wireless sensor networks'. Journal of Sensors 2010; 10(3): 2450-2459.
-
(2010)
Journal of Sensors
, vol.10
, Issue.3
, pp. 2450-2459
-
-
Khan, M.K.1
Alghathbar, K.2
-
8
-
-
33751167604
-
Improving the security of 'a flexible biometrics remote user authentication scheme'
-
Khan K, Zhang J. Improving the security of 'a flexible biometrics remote user authentication scheme'. Computer Standards and Interfaces 2007; 29(1): 84-87.
-
(2007)
Computer Standards and Interfaces
, vol.29
, Issue.1
, pp. 84-87
-
-
Khan, K.1
Zhang, J.2
-
9
-
-
34548620637
-
Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices
-
Khan MK, Zhang J, Wang X. Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices. Chaos, Solitons, and Fractals 2008; 35(3): 519-524.
-
(2008)
Chaos, Solitons, and Fractals
, vol.35
, Issue.3
, pp. 519-524
-
-
Khan, M.K.1
Zhang, J.2
Wang, X.3
-
10
-
-
67549132170
-
Fingerprint biometric-based self and deniable authentication schemes for the electronic world
-
Khan MK. Fingerprint biometric-based self and deniable authentication schemes for the electronic world. IETE Technical Review 2009; 26(3): 191-195.
-
(2009)
IETE Technical Review
, vol.26
, Issue.3
, pp. 191-195
-
-
Khan, M.K.1
-
11
-
-
84864058187
-
A more secure authentication scheme for telecare medicine information systems
-
DOI: 10.1007/s10916-011-9658-5.
-
He D, Chen J, Zhang R. A more secure authentication scheme for telecare medicine information systems. Journal of Medical Systems 2010. DOI: 10.1007/s10916-011-9658-5.
-
(2010)
Journal of Medical Systems
-
-
He, D.1
Chen, J.2
Zhang, R.3
-
12
-
-
80051571433
-
An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security
-
DOI: 10.1016/j.inffus.2011.01.001.
-
He D, Chen J, Hu J. An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security. Information Fusion 2011. DOI: 10.1016/j.inffus.2011.01.001.
-
(2011)
Information Fusion
-
-
He, D.1
Chen, J.2
Hu, J.3
-
13
-
-
84859767453
-
An efficient remote user authentication and key exchange protocol for mobile client-server environment from pairings
-
DOI: 10.1016/j.adhoc.2012.01.002.
-
He D. An efficient remote user authentication and key exchange protocol for mobile client-server environment from pairings. Ad Hoc Networks 2012. DOI: 10.1016/j.adhoc.2012.01.002.
-
(2012)
Ad Hoc Networks
-
-
He, D.1
-
14
-
-
0035506864
-
A remote password authentication scheme for multi-server architecture using neural networks
-
Li L, Lin I, Hwang M. A remote password authentication scheme for multi-server architecture using neural networks. IEEE Transaction on Neural Network 2001; 12(6): 1498-1504.
-
(2001)
IEEE Transaction on Neural Network
, vol.12
, Issue.6
, pp. 1498-1504
-
-
Li, L.1
Lin, I.2
Hwang, M.3
-
15
-
-
0037211327
-
A new remote user authentication scheme for multi-server architecture
-
Lin I, Hwang M, Li H. A new remote user authentication scheme for multi-server architecture. Future Generation Computer Systems 2003; 1(19): 13-22.
-
(2003)
Future Generation Computer Systems
, vol.1
, Issue.19
, pp. 13-22
-
-
Lin, I.1
Hwang, M.2
Li, H.3
-
16
-
-
1942455353
-
Efficient multi-server password authenticated key agreement using smart cards
-
Juang W. Efficient multi-server password authenticated key agreement using smart cards. IEEE Transaction on Consumer Electronics 2004; 50(1): 251-255.
-
(2004)
IEEE Transaction on Consumer Electronics
, vol.50
, Issue.1
, pp. 251-255
-
-
Juang, W.1
-
17
-
-
19544367392
-
-
An efficient and secure multi-server password authentication scheme using smart cards. 2004 IEEE international conference on cyberworlds
-
Chang C, Lee J. An efficient and secure multi-server password authentication scheme using smart cards. 2004 IEEE international conference on cyberworlds, 2004; 417-422.
-
(2004)
, pp. 417-422
-
-
Chang, C.1
Lee, J.2
-
18
-
-
54449094667
-
A secure dynamic ID based remote user authentication scheme for multi-server environment
-
Liao Y, Wang S. A secure dynamic ID based remote user authentication scheme for multi-server environment. Computer Standard & Interfaces 2009; 31(1): 24-29.
-
(2009)
Computer Standard & Interfaces
, vol.31
, Issue.1
, pp. 24-29
-
-
Liao, Y.1
Wang, S.2
-
19
-
-
68849128250
-
Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment
-
Hsiang H, Shih W. Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment. Computer Standard & Interfaces 2009; 31(6): 1118-1123.
-
(2009)
Computer Standard & Interfaces
, vol.31
, Issue.6
, pp. 1118-1123
-
-
Hsiang, H.1
Shih, W.2
-
20
-
-
79251600218
-
A secure dynamic identity based authentication protocol for multi-server architecture
-
Sood S, Sarje A, Singh K. A secure dynamic identity based authentication protocol for multi-server architecture. Journal of Network and Computer Applications 2011; 34(2): 609-618.
-
(2011)
Journal of Network and Computer Applications
, vol.34
, Issue.2
, pp. 609-618
-
-
Sood, S.1
Sarje, A.2
Singh, K.3
-
21
-
-
84856217617
-
An enhanced and security dynamic identity based authentication protocol for multi-server architecture using smart cards
-
DOI: 10.1016/j.jnca.2011.11.009.
-
Li X, Xiong Y, Ma J, Wang W. An enhanced and security dynamic identity based authentication protocol for multi-server architecture using smart cards. Journal of Network and Computer Applications 2011. DOI: 10.1016/j.jnca.2011.11.009.
-
(2011)
Journal of Network and Computer Applications
-
-
Li, X.1
Xiong, Y.2
Ma, J.3
Wang, W.4
-
22
-
-
84868010662
-
-
Weaknesses of a dynamic identity based authentication protocol for multi-server architecture, arXiv:1201.0883v1
-
Han W. Weaknesses of a dynamic identity based authentication protocol for multi-server architecture, arXiv:1201.0883v1, 2012.
-
(2012)
-
-
Han, W.1
-
24
-
-
0036566408
-
Examining smart-card security under the threat of power analysis attacks
-
Messerges T, Dabbish E, Sloan R. Examining smart-card security under the threat of power analysis attacks. IEEE Transactions on Computers 2002; 51(5): 541-552.
-
(2002)
IEEE Transactions on Computers
, vol.51
, Issue.5
, pp. 541-552
-
-
Messerges, T.1
Dabbish, E.2
Sloan, R.3
|