-
1
-
-
77956600221
-
Remote automation laboratory using a cluster of virtual machines
-
Vicente, A.G., Munoz, I.B., Galilea, J.L.L., del Toro, P.A.R.: Remote automation laboratory using a cluster of virtual machines. IEEE Transactions on Industrial Electronics 57(10), 3276-3283 (2010)
-
(2010)
IEEE Transactions on Industrial Electronics
, vol.57
, Issue.10
, pp. 3276-3283
-
-
Vicente, A.G.1
Munoz, I.B.2
Galilea, J.L.L.3
Del Toro, P.A.R.4
-
2
-
-
79956280962
-
JXTA-OVERLAY: A P2P platform for distributed, collaborative and ubiquitous computing
-
Barolli, L., Xhafa, F.: JXTA-OVERLAY: A P2P platform for distributed, collaborative and ubiquitous computing. IEEE Transactions on Industrial Electronics 58(6), 2163-2172 (2010)
-
(2010)
IEEE Transactions on Industrial Electronics
, vol.58
, Issue.6
, pp. 2163-2172
-
-
Barolli, L.1
Xhafa, F.2
-
3
-
-
0019634370
-
Password authentication with insecure communication
-
Lamport, L.: Password authentication with insecure communication. Communications of the ACM 24(11), 770-772 (1981)
-
(1981)
Communications of the ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
5
-
-
0026153410
-
Remote password authentication with smart cards
-
Chang, C.C., Wu, T.C.: Remote password authentication with smart cards. IEE Proceedings-E 138(3), 165-168 (1993)
-
(1993)
IEE Proceedings-E
, vol.138
, Issue.3
, pp. 165-168
-
-
Chang, C.C.1
Wu, T.C.2
-
6
-
-
4043152192
-
Further improvement of an efficient password based remote user authentication scheme using smart cards
-
Yoon, E.J., Ryu, E.K., Yoo, K.Y.: Further improvement of an efficient password based remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics 50(2), 612-614 (2004)
-
(2004)
IEEE Transactions on Consumer Electronics
, vol.50
, Issue.2
, pp. 612-614
-
-
Yoon, E.J.1
Ryu, E.K.2
Yoo, K.Y.3
-
7
-
-
52949137008
-
Two-factor mutual authentication based on smart cards and password
-
Yang, G., Wong, D.S., Wang, H., Deng, X.: Two-factor mutual authentication based on smart cards and password. Journal of Computer and System Sciences 74(7), 1160-1172 (2008)
-
(2008)
Journal of Computer and System Sciences
, vol.74
, Issue.7
, pp. 1160-1172
-
-
Yang, G.1
Wong, D.S.2
Wang, H.3
Deng, X.4
-
8
-
-
59649086399
-
Weaknesses and improvements of the Yoon-Ryu-Yoo remote user authentication scheme using smart cards
-
Hsiang, H.C., Shih, W.K.: Weaknesses and improvements of the Yoon-Ryu-Yoo remote user authentication scheme using smart cards. Computer Communications 32(4), 649-652 (2009)
-
(2009)
Computer Communications
, vol.32
, Issue.4
, pp. 649-652
-
-
Hsiang, H.C.1
Shih, W.K.2
-
9
-
-
77952401833
-
An improvement of Hsiang-Shih's authentication scheme using smart cards
-
ACM Press, New York
-
Sood, S.K., Sarje, A.K., Singh, K.: An improvement of Hsiang-Shih's authentication scheme using smart cards. In: Proceedings of ICWET 2010, pp. 19-25. ACM Press, New York (2010)
-
(2010)
Proceedings of ICWET 2010
, pp. 19-25
-
-
Sood, S.K.1
Sarje, A.K.2
Singh, K.3
-
10
-
-
84863239521
-
Cryptanalysis and Improvement of Sood et al.'s Dynamic ID-Based Authentication Scheme
-
Ramanujam, R., Ramaswamy, S. (eds.) ICDCIT 2012. Springer, Heidelberg
-
Ma, C.-G., Wang, D., Zhang, Q.-M.: Cryptanalysis and Improvement of Sood et al.'s Dynamic ID-Based Authentication Scheme. In: Ramanujam, R., Ramaswamy, S. (eds.) ICDCIT 2012. LNCS, vol. 7154, pp. 141-152. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7154
, pp. 141-152
-
-
Ma, C.-G.1
Wang, D.2
Zhang, Q.-M.3
-
12
-
-
84939573910
-
Differential Power Analysis
-
Wiener, M. (ed.) CRYPTO 1999. Springer, Heidelberg
-
Kocher, P., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388-397. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1666
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
13
-
-
0036566408
-
Examining Smart-Card Security under the Threat of Power Analysis Attacks
-
Messerges, T.S., Dabbish, E.A., Sloan, R.H.: Examining Smart-Card Security under the Threat of Power Analysis Attacks. IEEE Transactions on Computers 51(5), 541-552 (2002)
-
(2002)
IEEE Transactions on Computers
, vol.51
, Issue.5
, pp. 541-552
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
-
14
-
-
79959430513
-
One for all-all for one: Unifying standard differential power analysis attacks
-
Mangard, S., Oswald, E., Standaert, F.X.: One for all-all for one: unifying standard differential power analysis attacks. IET Information Security 5(2), 100-110 (2011)
-
(2011)
IET Information Security
, vol.5
, Issue.2
, pp. 100-110
-
-
Mangard, S.1
Oswald, E.2
Standaert, F.X.3
-
15
-
-
40949152760
-
Password authentication schemes: Current status and key issues
-
Tsai, C., Lee, C., Hwang, M.: Password authentication schemes: current status and key issues. International Journal of Network Security 3(2), 101-115 (2006)
-
(2006)
International Journal of Network Security
, vol.3
, Issue.2
, pp. 101-115
-
-
Tsai, C.1
Lee, C.2
Hwang, M.3
-
16
-
-
84949230533
-
Key Agreement Protocols and Their Security Analysis
-
Darnell, M.J. (ed.) Cryptography and Coding 1997. Springer, Heidelberg
-
Blake-Wilson, S., Johnson, D., Menezes, A.: Key Agreement Protocols and Their Security Analysis. In: Darnell, M.J. (ed.) Cryptography and Coding 1997. LNCS, vol. 1355, pp. 30-45. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1355
, pp. 30-45
-
-
Blake-Wilson, S.1
Johnson, D.2
Menezes, A.3
-
17
-
-
33745179557
-
HMQV: A High-Performance Secure Diffie-Hellman Protocol
-
Shoup, V. (ed.) CRYPTO 2005. Springer, Heidelberg
-
Krawczyk, H.: HMQV: A High-Performance Secure Diffie-Hellman Protocol. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 546-566. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3621
, pp. 546-566
-
-
Krawczyk, H.1
-
18
-
-
78049322666
-
Two robust remote user authentication protocols using smart cards
-
Yeh, K.H., Su, C.H., Lo, N.W.: Two robust remote user authentication protocols using smart cards. Journal of Systems and Software 83(12), 2556-2565 (2010)
-
(2010)
Journal of Systems and Software
, vol.83
, Issue.12
, pp. 2556-2565
-
-
Yeh, K.H.1
Su, C.H.2
Lo, N.W.3
-
19
-
-
0040231044
-
Foiling the Cracker: A Survey of, and Improvements to, Password Security
-
USENIX Association, Portland
-
Klein, D.V.: Foiling the Cracker: A Survey of, and Improvements to, Password Security. In: 2nd USENIX Security Workshop, pp. 5-14. USENIX Association, Portland (1990)
-
(1990)
2nd USENIX Security Workshop
, pp. 5-14
-
-
Klein, D.V.1
|