-
1
-
-
0037862948
-
Distributing internet services to the network's edge
-
Jun
-
A. C. Weaver and M. W. Condtry, "Distributing internet services to the network's edge, " IEEE Trans. Ind. Electron., vol. 50, no. 3, pp. 404-411, Jun. 2003.
-
(2003)
IEEE Trans. Ind. Electron
, vol.50
, Issue.3
, pp. 404-411
-
-
Weaver, A.C.1
Condtry, M.W.2
-
2
-
-
79956280962
-
JXTA-OVERLAY: A P2P platform for distributed, collaborative and ubiquitous computing
-
Oct.
-
L. Barolli and F. Xhafa, "JXTA-OVERLAY: A P2P platform for distributed, collaborative and ubiquitous computing, " IEEE Trans. Ind. Electron., vol. 58, no. 6, pp. 2163-2172, Oct. 2010.
-
(2010)
IEEE Trans. Ind. Electron
, vol.58
, Issue.6
, pp. 2163-2172
-
-
Barolli, L.1
Xhafa, F.2
-
3
-
-
0019634370
-
Password authentication with insecure communication
-
Nov
-
L. Lamport, "Password authentication with insecure communication, " Commun. ACM, vol. 24, no. 11, pp. 770-772, Nov. 1981.
-
(1981)
Commun. ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
4
-
-
0034225062
-
User identification and key distribution maintaining anonymity for distributed computer networks
-
W. B. Lee and C. C. Chang, "User identification and key distribution maintaining anonymity for distributed computer networks, " Comput. Syst. Sci. Eng., vol. 15, no. 4, pp. 113-116, 2000.
-
(2000)
Comput. Syst. Sci. Eng
, vol.15
, Issue.4
, pp. 113-116
-
-
Lee, W.B.1
Chang, C.C.2
-
5
-
-
62549133356
-
Robust and efficient password authenticated key agreement using smart cards
-
Jun
-
W. Juang, S. Chen, and H. Liaw, "Robust and efficient password authenticated key agreement using smart cards, " IEEE Trans. Ind. Electron., vol. 15, no. 6, pp. 2551-2556, Jun. 2008.
-
(2008)
IEEE Trans. Ind. Electron
, vol.15
, Issue.6
, pp. 2551-2556
-
-
Juang, W.1
Chen, S.2
Liaw, H.3
-
6
-
-
75449106985
-
Anonymity enhancement on robust and efficient password-authenticated key agreement using smart cards
-
Feb.
-
X. Li, W. Qiu, D. Zheng, K. Chen, and J. Li, "Anonymity enhancement on robust and efficient password-authenticated key agreement using smart cards, " IEEE Trans. Ind. Electron., vol. 57, no. 2, pp. 793-800, Feb. 2010.
-
(2010)
IEEE Trans. Ind. Electron
, vol.57
, Issue.2
, pp. 793-800
-
-
Li, X.1
Qiu, W.2
Zheng, D.3
Chen, K.4
Li, J.5
-
7
-
-
79951577827
-
Formal vulnerability analysis of a security system for remote fieldbus access
-
Feb.
-
M. Cheminod, A. Pironti, and R. Sisto, "Formal vulnerability analysis of a security system for remote fieldbus access, " IEEE Trans. Ind. Inf., vol. 7, no. 1, pp. 30-40, Feb. 2011.
-
(2011)
IEEE Trans. Ind. Inf
, vol.7
, Issue.1
, pp. 30-40
-
-
Cheminod, M.1
Pironti, A.2
Sisto, R.3
-
8
-
-
84871964962
-
Review of security issues in industrial networks
-
DOI 10. 1109/TII/20122198666
-
A. Valenzano, L. Durante, and M. Cheminod, "Review of security issues in industrial networks, " IEEE Trans. Ind. Inf., vol. PP, no. 99, 2012, DOI 10. 1109/TII/2012. 2198666.
-
(2012)
IEEE Trans. Ind. Inf.
, vol.PP
, Issue.99
-
-
Valenzano, A.1
Durante, L.2
Cheminod, M.3
-
9
-
-
1542335490
-
Efficient user identification scheme with key distribution preserving anonymity for distributed computer networks
-
T.-S. Wu and C.-L. Hsu, "Efficient user identification scheme with key distribution preserving anonymity for distributed computer networks, " Comput. Security, vol. 23, no. 2, pp. 120-125, 2004.
-
(2004)
Comput. Security
, vol.23
, Issue.2
, pp. 120-125
-
-
Wu, T.-S.1
Hsu, C.-L.2
-
10
-
-
10644225185
-
New efficient user identification and key distribution scheme providing enhanced security
-
Y. Yang, S. Wang, F. Bao, J. Wang, and R. H. Deng, "New efficient user identification and key distribution scheme providing enhanced security, " Comput. Security, vol. 23, no. 8, pp. 697-704, 2004.
-
(2004)
Comput. Security
, vol.23
, Issue.8
, pp. 697-704
-
-
Yang, Y.1
Wang, S.2
Bao, F.3
Wang, J.4
Deng, R.H.5
-
11
-
-
33748125161
-
A secure identification and key agreement protocol with user anonymity (SIKA)
-
K. V. Mangipudi and R. S. Katti, "A secure identification and key agreement protocol with user anonymity (SIKA), " Comput. Security, vol. 25, no. 6, pp. 420-425, 2006.
-
(2006)
Comput. Security
, vol.25
, Issue.6
, pp. 420-425
-
-
Mangipudi, K.V.1
Katti, R.S.2
-
12
-
-
56949092341
-
A novel user identification scheme with key distribution preserving user anonymity for distributed computer networks
-
C.-L. Hsu and Y.-H. Chuang, "A novel user identification scheme with key distribution preserving user anonymity for distributed computer networks, " Inf. Sci., vol. 179, no. 4, pp. 422-429, 2009.
-
(2009)
Inf. Sci
, vol.179
, Issue.4
, pp. 422-429
-
-
Hsu, C.-L.1
Chuang, Y.-H.2
-
13
-
-
84864549429
-
A server independent authentication scheme for RFID systems
-
Aug.
-
B. Wang and M. Ma, "A server independent authentication scheme for RFID systems, " IEEE Trans. Ind. Inf., vol. 8, no. 3, pp. 689-696, Aug. 2012.
-
(2012)
IEEE Trans. Ind. Inf
, vol.8
, Issue.3
, pp. 689-696
-
-
Wang, B.1
Ma, M.2
-
14
-
-
84862274466
-
SHARDIS: A privacy-enhanced discovery service for RFID-based product information
-
Aug.
-
B. Fabian, T. Ermakova, and C. Muller, "SHARDIS: A privacy-enhanced discovery service for RFID-based product information, " IEEE Trans. Ind. Inf., vol. 8, no. 3, pp. 707-718, Aug. 2012.
-
(2012)
IEEE Trans. Ind. Inf
, vol.8
, Issue.3
, pp. 707-718
-
-
Fabian, B.1
Ermakova, T.2
Muller, C.3
-
15
-
-
84863343959
-
OPass: A user authentication protocol resistant to password stealing and password reuse attacks
-
Apr.
-
H.-M. Sun, Y.-H. Chen, and Y.-H. Lin, "oPass: A user authentication protocol resistant to password stealing and password reuse attacks, " IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 651-663, Apr. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.2
, pp. 651-663
-
-
Sun, H.-M.1
Chen, Y.-H.2
Lin, Y.-H.3
-
16
-
-
84871813799
-
Security forumon single sign-on
-
"Security Forumon Single Sign-On, " TheOpenGroup [Online]. Available: http://www. opengroup. org/security/l2-sso. htm
-
TheOpenGroup
-
-
-
17
-
-
84867290573
-
A generic construction of dynamic single sign-on with strong security
-
Springer
-
J. Han, Y. Mu, W. Susilo, and J. Yan, "A generic construction of dynamic single sign-on with strong security, " in Proc. SecureComm', 2010, pp. 181-198, Springer.
-
(2010)
Proc. SecureComm
, pp. 181-198
-
-
Han, J.1
Mu, Y.2
Susilo, W.3
Yan, J.4
-
18
-
-
79960556311
-
Generalized digital certificate for user authentication and key establishment for secure communications
-
Jul.
-
L. Harn and J. Ren, "Generalized digital certificate for user authentication and key establishment for secure communications, " IEEE Trans. Wireless Commun., vol. 10, no. 7, pp. 2372-2379, Jul. 2011.
-
(2011)
IEEE Trans. Wireless Commun
, vol.10
, Issue.7
, pp. 2372-2379
-
-
Harn, L.1
Ren, J.2
-
19
-
-
80053654561
-
A secure single sign-on mechanism for distributed computer networks
-
Jan.
-
C.-C. Chang and C.-Y. Lee, "A secure single sign-on mechanism for distributed computer networks, " IEEE Trans. Ind. Electron., vol. 59, no. 1, pp. 629-637, Jan. 2012.
-
(2012)
IEEE Trans. Ind. Electron
, vol.59
, Issue.1
, pp. 629-637
-
-
Chang, C.-C.1
Lee, C.-Y.2
-
20
-
-
0024135240
-
Zero-knowledge proofs of identity
-
U. Feige, A. Fiat, and A. Shamir, "Zero-knowledge proofs of identity, " J. Crytography, vol. 1, no. 2, pp. 77-94, 1988.
-
(1988)
J. Crytography
, vol.1
, Issue.2
, pp. 77-94
-
-
Feige, U.1
Fiat, A.2
Shamir, A.3
-
21
-
-
3142585398
-
Verifiable encryption of digital signatures and applications
-
G. Ateniese, "Verifiable encryption of digital signatures and applications, " ACM Trans. Inf. Syst. Secur., vol. 7, no. 1, pp. 1-20, 2004.
-
(2004)
ACM Trans. Inf. Syst. Secur
, vol.7
, Issue.1
, pp. 1-20
-
-
Ateniese, G.1
-
25
-
-
0347824705
-
-
PKCS #1 v2 1, RSA Cryptography Standard, Draft 2, PKCS
-
Public Key Cryptography Standards, PKCS #1 v2. 1, RSA Cryptography Standard, Draft 2, PKCS, 2001 [Online]. Available: http://www. rsasecurity. com/rsalabs/pkcs/
-
(2001)
Public Key Cryptography Standards
-
-
-
26
-
-
0000552770
-
Twenty years of attacks on the RSA cryptosystem
-
D. Boneh, "Twenty years of attacks on the RSA cryptosystem, " Notices Amer. Math. Soc., vol. 46, no. 2, pp. 203-213, 1999.
-
(1999)
Notices Amer. Math. Soc
, vol.46
, Issue.2
, pp. 203-213
-
-
Boneh, D.1
-
27
-
-
84871793257
-
-
Wikipedia, RSA (algorithm) [Online]. Available: http://en. wikipedia. org/wiki/RSA-(algorithm)
-
Wikipedia RSA (Algorithm)
-
-
-
28
-
-
28444465910
-
Distributed device networks with security constraints
-
DOI 10.1109/TII.2005.843826
-
Y. Xu, R. Song, L. Korba, L. Wang, W. Shen, and S. Y. T. Lang, "Distributed device networks with security constraints, " IEEE Trans. Ind. Inf., vol. 1, no. 4, pp. 217-225, Nov. 2005. (Pubitemid 41729785)
-
(2005)
IEEE Transactions on Industrial Informatics
, vol.1
, Issue.4
, pp. 217-225
-
-
Xu, Y.1
Song, R.2
Korba, L.3
Wang, L.4
Shen, W.5
Lang, S.6
-
29
-
-
0025386404
-
A logic of authentication
-
M. Burrows, M. Abadi, and R. Needham, "A logic of authentication, " ACM Trans. Comput. Syst., vol. 8, no. 1, pp. 18-36, 1990.
-
(1990)
ACM Trans. Comput. Syst
, vol.8
, Issue.1
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
30
-
-
0005078946
-
Entity authentication and key distribution
-
M. Bellare and P. Rogaway, "Entity authentication and key distribution, " in Proc. of CRYPTO', 1993, pp. 232-249.
-
(1993)
Proc. of CRYPTO
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
31
-
-
84958778419
-
On a limitation of BAN Logic
-
C. Boyd and W. Mao, "On a limitation of BAN Logic, " in Proc. of EUROCRYPT, 1994, pp. 240-247.
-
(1994)
Proc. of EUROCRYPT
, pp. 240-247
-
-
Boyd, C.1
Mao, W.2
-
32
-
-
0033750375
-
Optimistic fair exchange of digital signatures
-
Apr
-
N. Asokan, V. Shoup, and M. Waidner, "Optimistic fair exchange of digital signatures, " IEEE J. Sel. Areas Commun., vol. 18, no. 4, pp. 591-606, Apr. 2000.
-
(2000)
IEEE J. Sel. Areas Commun
, vol.18
, Issue.4
, pp. 591-606
-
-
Asokan, N.1
Shoup, V.2
Waidner, M.3
-
33
-
-
84948967686
-
Confirmer signature schemes secure against adaptive adversaries
-
J. Camenisch and M. Michels, "Confirmer signature schemes secure against adaptive adversaries, " in Proc. EUROCRYPT, 2000, pp. 243-258.
-
(2000)
Proc. EUROCRYPT
, pp. 243-258
-
-
Camenisch, J.1
Michels, M.2
-
34
-
-
84921018856
-
A practical and provably secure coalition-resistant group signature scheme
-
G. Ateniese, J. Camenisch, M. Joye, and G. Tsudik, "A practical and provably secure coalition-resistant group signature scheme, " in Proc. CRYPTO, 2000, pp. 255-270.
-
(2000)
Proc. CRYPTO
, pp. 255-270
-
-
Ateniese, G.1
Camenisch, J.2
Joye, M.3
Tsudik, G.4
-
35
-
-
85001025766
-
Wallet databases with observers
-
D. Chaum and T. P. Pedersen, "Wallet databases with observers, " in Proc. of CRYPTO, 1993, pp. 89-105.
-
(1993)
Proc. of CRYPTO
, pp. 89-105
-
-
Chaum, D.1
Pedersen, T.P.2
-
37
-
-
84868090556
-
Provably secure single sign-on scheme in distributed systems and networks
-
Jun
-
J. Yu, G. Wang, and Y. Mu, "Provably secure single sign-on scheme in distributed systems and networks, " in Proc. 11th IEEE TrustCom, Jun. 2012, pp. 271-278.
-
(2012)
Proc. 11th IEEE TrustCom
, pp. 271-278
-
-
Yu, J.1
Wang, G.2
Mu, Y.3
|