-
1
-
-
1942423677
-
Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards
-
Ku WC, Chen SM Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards IEEE Transactions on Consumer Electronics 50 1 2004 204 207
-
(2004)
IEEE Transactions on Consumer Electronics
, vol.50
, Issue.1
, pp. 204-207
-
-
Ku, W.C.1
Chen, S.M.2
-
3
-
-
77955312905
-
Advanced smart card based password authentication protocol
-
Song RG Advanced smart card based password authentication protocol Computer Standards & Interfaces 32 4 2010 321 325
-
(2010)
Computer Standards & Interfaces
, vol.32
, Issue.4
, pp. 321-325
-
-
Song, R.G.1
-
5
-
-
78049322666
-
Two robust remote user authentication protocols using smart cards
-
Yeh KH, Su CH, Lo NW Two robust remote user authentication protocols using smart cards Journal of Systems and Software 83 12 2010 2556 2565
-
(2010)
Journal of Systems and Software
, vol.83
, Issue.12
, pp. 2556-2565
-
-
Yeh, K.H.1
Su, C.H.2
Lo, N.W.3
-
6
-
-
79956361026
-
Secure dynamic identity-based authentication scheme using smart cards
-
Sood KS Secure dynamic identity-based authentication scheme using smart cards Information Security Journal: A Global Perspective 20 2 2011 67 77
-
(2011)
Information Security Journal: A Global Perspective
, vol.20
, Issue.2
, pp. 67-77
-
-
Sood, K.S.1
-
7
-
-
52949137008
-
Two-factor mutual authentication based on smart cards and password
-
Yang G, Wong DS, Wang H et al. Two-factor mutual authentication based on smart cards and password Journal of Computer and System Sciences 74 7 2008 1160 1172
-
(2008)
Journal of Computer and System Sciences
, vol.74
, Issue.7
, pp. 1160-1172
-
-
Yang, G.1
Wong, D.S.2
Wang, H.3
-
8
-
-
84863239521
-
Cryptanalysis and improvement of Sood et al's dynamic ID-based authentication scheme
-
Springer-Verlag Berlin, Germany
-
Ma CG, Wang D, Zhang QM Cryptanalysis and improvement of Sood et al's dynamic ID-based authentication scheme Proceedings of the 8th International Conference on Distributed Computing and Internet Technology (ICDCIT'12), Feb 2-4, 2012, Bhubaneswar, India. LNCS 7154 2012 Springer-Verlag Berlin, Germany 141 152
-
(2012)
Proceedings of the 8th International Conference on Distributed Computing and Internet Technology (ICDCIT'12), Feb 2-4, 2012, Bhubaneswar, India. LNCS 7154
, pp. 141-152
-
-
Ma, C.G.1
Wang, D.2
Zhang, Q.M.3
-
9
-
-
84863056589
-
Robust smart-cards-based user authentication scheme with user anonymity
-
Wu SH, Zhu YF, Pu Q Robust smart-cards-based user authentication scheme with user anonymity Security and Communication Networks 5 2 2012 236 248
-
(2012)
Security and Communication Networks
, vol.5
, Issue.2
, pp. 236-248
-
-
Wu, S.H.1
Zhu, Y.F.2
Pu, Q.3
-
10
-
-
64249125305
-
An improved smart card based password authentication scheme with provable security
-
Xu J, Zhu WT, Feng DG An improved smart card based password authentication scheme with provable security Computer Standards & Interfaces 31 4 2009 723 728
-
(2009)
Computer Standards & Interfaces
, vol.31
, Issue.4
, pp. 723-728
-
-
Xu, J.1
Zhu, W.T.2
Feng, D.G.3
-
11
-
-
78049329614
-
S ecurity enhancement on an improvement on two remote user authentication schemes using smart cards
-
Chen TH, Hsiang HC, Shih WK S ecurity enhancement on an improvement on two remote user authentication schemes using smart cards Future Generation Computer Systems 27 4 2011 377 380
-
(2011)
Future Generation Computer Systems
, vol.27
, Issue.4
, pp. 377-380
-
-
Chen, T.H.1
Hsiang, H.C.2
Shih, W.K.3
-
12
-
-
34248666700
-
Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards
-
Wang XM, Zhang WF, Zhang JS et al. Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards Computer Standards & Interfaces 29 5 2007 507 512
-
(2007)
Computer Standards & Interfaces
, vol.29
, Issue.5
, pp. 507-512
-
-
Wang, X.M.1
Zhang, W.F.2
Zhang, J.S.3
-
15
-
-
84949230533
-
Key Agreement Protocols and Their Security Analysis
-
Cryptography and Coding
-
Blake-Wilson S, Johnson D, Menezes A Key agreement protocols and their security analysis Proceedings of the 6th IMA International Conference on Cryptography and Coding (IMACC'97), Dec 17-19, 1997, Cirencester, UK. LNCS 1355 1997 Springer-Verlag Berlin, Germany 30 45 (Pubitemid 128005797)
-
(1997)
Lecture Notes in Computer Science
, Issue.1355
, pp. 30-45
-
-
Blake-Wilson, S.1
Johnson, D.2
Menezes, A.3
-
16
-
-
0036566408
-
Examining smart-card security under the threat of power analysis attacks
-
DOI 10.1109/TC.2002.1004593
-
Messerges TS, Dabbish EA, Sloan RH Examining smart-card security under the threat of power analysis attacks IEEE Transactions on Computers 51 5 2002 541 552 (Pubitemid 34550462)
-
(2002)
IEEE Transactions on Computers
, vol.51
, Issue.5
, pp. 541-552
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
-
18
-
-
79959430513
-
One for all-all for one: Unifying standard differential power analysis attacks
-
Mangard S, Oswald E, Standaert FX One for all-all for one: unifying standard differential power analysis attacks IET Information Security 5 2 2011 100 110
-
(2011)
IET Information Security
, vol.5
, Issue.2
, pp. 100-110
-
-
Mangard, S.1
Oswald, E.2
Standaert, F.X.3
-
19
-
-
0040231044
-
Foiling the cracker: A survey of and improvements to password security
-
USENIX Association Berkeley, CA, USA
-
Klein DV Foiling the cracker: a survey of and improvements to password security Proceedings of the 2nd Conference on USENIX Security Symposium(USENIX'90), Aug, 1990, Anaheim CA, USA 1990 USENIX Association Berkeley, CA, USA 5 14
-
(1990)
Proceedings of the 2nd Conference on USENIX Security Symposium(USENIX'90) , Aug, 1990, Anaheim CA, USA
, pp. 5-14
-
-
Klein, D.V.1
-
20
-
-
33745179557
-
HMQV: A high-performance secure Diffie-Hellman protocol
-
Springer-Verlag Berlin, Germany
-
Krawczyk H HMQV: a high-performance secure Diffie-Hellman protocol Advances in Crytography: Proceedings of the 25st Annual International Cryptology Conference (Crypto'05), Aug 14-18, 2005, Santa Barbara, CA, USA. LNCS 3621 2005 Springer-Verlag Berlin, Germany 546 566
-
(2005)
Advances in Crytography: Proceedings of the 25st Annual International Cryptology Conference (Crypto'05), Aug 14-18, 2005, Santa Barbara, CA, USA. LNCS 3621
, pp. 546-566
-
-
Krawczyk, H.1
-
21
-
-
41149155794
-
Mobile privacy in wireless networks-revisited
-
DOI 10.1109/TWC.2008.060802, 4471983
-
Tang C, Wu D Mobile privacy in wireless networks-revisited IEEE Transactions on Wireless Communications 7 3 2008 1035 1042 (Pubitemid 351436491)
-
(2008)
IEEE Transactions on Wireless Communications
, vol.7
, Issue.3
, pp. 1035-1042
-
-
Tang, C.1
Wu, D.O.2
-
22
-
-
64249169230
-
Weaknesses and improvement of Wang et al's remote user password authentication scheme for resource-limited environments
-
Chung HR, Ku WC, Tsaur MJ Weaknesses and improvement of Wang et al's remote user password authentication scheme for resource-limited environments Computer Standards & Interfaces 31 4 2009 863 868
-
(2009)
Computer Standards & Interfaces
, vol.31
, Issue.4
, pp. 863-868
-
-
Chung, H.R.1
Ku, W.C.2
Tsaur, M.J.3
-
25
-
-
84949187399
-
The performance measurement of cryptographic primitives on palm devices
-
IEEE Computer Society Los Alamitos, CA, USA
-
Wong DS, Fuentes HH, Chan AH The performance measurement of cryptographic primitives on palm devices Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC'01), Dec 10-14, 2001, New Orleans, LA, USA 2001 IEEE Computer Society Los Alamitos, CA, USA 92 101
-
(2001)
Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC'01), Dec 10-14, 2001, New Orleans, LA, USA
, pp. 92-101
-
-
Wong, D.S.1
Fuentes, H.H.2
Chan, A.H.3
-
26
-
-
0242277358
-
Architectural enhancements for montgomery multiplication on embedded RISC processors
-
Springer-Verlag Berlin, Germany
-
Großschädl J, Kamendje GA Architectural enhancements for montgomery multiplication on embedded RISC processors Proceedings of the 1st International Conference on Applied Cryptography and Network Security (ACNS'03), Oct 16 19, 2003, Kunming, China. LNCS 2846 2003 Springer-Verlag Berlin, Germany
-
(2003)
Proceedings of the 1st International Conference on Applied Cryptography and Network Security (ACNS'03), Oct 16 19, 2003, Kunming, China. LNCS 2846
-
-
Großschädl, J.1
Kamendje, G.A.2
-
27
-
-
33646382089
-
A study of the energy consumption characteristics of cryptographic algorithms and security protocols
-
DOI 10.1109/TMC.2006.16
-
Potlapally NR, Ravi S, Raghunathan A et al. A study of the energy consumption characteristics of cryptographic algorithms and security protocols IEEE Transactions on Mobile Computing 5 2 2006 128 143 (Pubitemid 43671073)
-
(2006)
IEEE Transactions on Mobile Computing
, vol.5
, Issue.2
, pp. 128-143
-
-
Potlapally, N.R.1
Ravi, S.2
Raghunathan, A.3
Jha, N.K.4
|