-
1
-
-
33751197641
-
Comment on a dynamic id-based remote user authentication scheme
-
Awasthi AK,. Comment on a dynamic id-based remote user authentication scheme. Transaction on Cryptology 2004; 1 (2): 15-16.
-
(2004)
Transaction on Cryptology
, vol.1
, Issue.2
, pp. 15-16
-
-
Awasthi, A.K.1
-
3
-
-
24144494609
-
Impersonation attacks on a dynamic id-based remote user authentication scheme using smart cards
-
Ku WC, Chang ST,. Impersonation attacks on a dynamic id-based remote user authentication scheme using smart cards. IEICE Transactions 2005; E88-B (5): 2165-2167.
-
(2005)
IEICE Transactions
, vol.88
, Issue.5
, pp. 2165-2167
-
-
Ku, W.C.1
Chang, S.T.2
-
4
-
-
33845399962
-
Security enhancement for a dynamic ID-based remote user authentication scheme
-
DOI 10.1109/NWESP.2005.67, 1592466, Proceedings - International Conference on Next Generation Web Services Practices, NWeSP 2005
-
Liao I, Lee CC, Hwang MS,. Security enhancement for a dynamic id-based remote user authentication scheme. In 2005 International Conference on Next Generation Web Services Practices, Seoul, Korea, 2005; 437-440. (Pubitemid 46276573)
-
(2005)
Proceedings - International Conference on Next Generation Web Services Practices, NWeSP 2005
, vol.2005
, pp. 437-440
-
-
Liao, I.-E.1
Lee, C.-C.2
Hwang, M.-S.3
-
6
-
-
58049197989
-
Two efficient two-factor authenticated key exchange protocols in public wireless lans
-
Juang WS, Wu JL,. Two efficient two-factor authenticated key exchange protocols in public wireless lans. Computers and Electrical Engineering 2009; 1 (35): 33-40.
-
(2009)
Computers and Electrical Engineering
, vol.1
, Issue.35
, pp. 33-40
-
-
Juang, W.S.1
Wu, J.L.2
-
7
-
-
59649083248
-
A more efficient and secure dynamic id-based remote user authentication scheme
-
Wang YY, Liu JY, Xiao FX, et al,. A more efficient and secure dynamic id-based remote user authentication scheme. Computer Communications 2009; 4 (32): 583-585.
-
(2009)
Computer Communications
, vol.4
, Issue.32
, pp. 583-585
-
-
Wang, Y.Y.1
Liu, J.Y.2
Xiao, F.X.3
-
8
-
-
77950629746
-
An efficient anonymous authentication mechanism for delay tolerant networks
-
Su R, Cao ZF,. An efficient anonymous authentication mechanism for delay tolerant networks. Computers and Electrical Engineering 2010; 3 (36): 435-441.
-
(2010)
Computers and Electrical Engineering
, vol.3
, Issue.36
, pp. 435-441
-
-
Su, R.1
Cao, Z.F.2
-
9
-
-
78751642788
-
Cryptanalysis and security enhancement of a 'more efficient and secure dynamic id-based remote user authentication scheme'
-
Khan MK, Kim SK, Alghathbar K,. Cryptanalysis and security enhancement of a 'more efficient and secure dynamic id-based remote user authentication scheme'. Computer Communications 2011; 34 (3): 305-309.
-
(2011)
Computer Communications
, vol.34
, Issue.3
, pp. 305-309
-
-
Khan, M.K.1
Kim, S.K.2
Alghathbar, K.3
-
10
-
-
79956064800
-
A user friendly authentication scheme with anonymity for wireless communications
-
Yoon EJ, Yoo KY, Ha KS,. A user friendly authentication scheme with anonymity for wireless communications. Computers and Electrical Engineering 2011; 3 (37): 356-364.
-
(2011)
Computers and Electrical Engineering
, vol.3
, Issue.37
, pp. 356-364
-
-
Yoon, E.J.1
Yoo, K.Y.2
Ha, K.S.3
-
11
-
-
84858082073
-
An improved dynamic id-based remote user authentication with key agreement scheme
-
Wen F, Li X,. An improved dynamic id-based remote user authentication with key agreement scheme. Computers and Electrical Engineering 2011; 38 (2): 381-387.
-
(2011)
Computers and Electrical Engineering
, vol.38
, Issue.2
, pp. 381-387
-
-
Wen, F.1
Li, X.2
-
12
-
-
84864058187
-
A more secure authentication scheme for telecare medicine information systems
-
He D, Chen J, Zhang R,. A more secure authentication scheme for telecare medicine information systems. Journal of Medical Systems 2011; 36 (3): 1989-1995.
-
(2011)
Journal of Medical Systems
, vol.36
, Issue.3
, pp. 1989-1995
-
-
He, D.1
Chen, J.2
Zhang, R.3
-
13
-
-
79952059658
-
Lightweight and provably secure user authentication with anonymity for the global mobility network
-
Chen C, He D, Chan S, et al,. Lightweight and provably secure user authentication with anonymity for the global mobility network. International Journal of Communication Systems 2010; 24 (3): 347-362.
-
(2010)
International Journal of Communication Systems
, vol.24
, Issue.3
, pp. 347-362
-
-
Chen, C.1
He, D.2
Chan, S.3
-
15
-
-
78751645363
-
Robust authentication and key agreement scheme preserving the privacy of secret key
-
Wang RC, Juang WS, Lei CL,. Robust authentication and key agreement scheme preserving the privacy of secret key. Computer Communications 2011; 34 (3): 274-280.
-
(2011)
Computer Communications
, vol.34
, Issue.3
, pp. 274-280
-
-
Wang, R.C.1
Juang, W.S.2
Lei, C.L.3
-
16
-
-
84863056589
-
Robust smart-cards-based user authentication scheme with user anonymity
-
Wu S, Zhu Y, Pu Q,. Robust smart-cards-based user authentication scheme with user anonymity. Security and Communication Networks 2011; 5 (2): 236-248.
-
(2011)
Security and Communication Networks
, vol.5
, Issue.2
, pp. 236-248
-
-
Wu, S.1
Zhu, Y.2
Pu, Q.3
-
17
-
-
80054005779
-
A practical authentication protocol with anonymity for wireless access networks
-
Chen Y-C, Chuang S-C, Yeh L-Y, et al,. A practical authentication protocol with anonymity for wireless access networks. Wireless Communications and Mobile Computing 2011; 11 (10): 1366-1375.
-
(2011)
Wireless Communications and Mobile Computing
, vol.11
, Issue.10
, pp. 1366-1375
-
-
Chen, Y.-C.1
Chuang, S.-C.2
Yeh, L.-Y.3
-
19
-
-
79953304485
-
Cryptanalysis of a simple three-party password-based key exchange protocol
-
Yoon EJ, Yoo KY,. Cryptanalysis of a simple three-party password-based key exchange protocol. International Journal of Communication Systems 2011; 24 (4): 532-542.
-
(2011)
International Journal of Communication Systems
, vol.24
, Issue.4
, pp. 532-542
-
-
Yoon, E.J.1
Yoo, K.Y.2
|