-
1
-
-
0026153410
-
Remote password authentication with smart cards
-
C.C. Chang and T.C. Wu, "Remote password authentication with smart cards," IEE Proceedings-E, vol. 138, no. 3, pp. 165-168, 1993.
-
(1993)
IEE Proceedings-E
, vol.138
, Issue.3
, pp. 165-168
-
-
Chang, C.C.1
Wu, T.C.2
-
2
-
-
1942423677
-
Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards
-
W.C. Ku and S.M. Chen, "Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards," IEEE Transactions on Consumer Electronics, vol. 50, no. 1, pp. 204-207, 2004.
-
(2004)
IEEE Transactions on Consumer Electronics
, vol.50
, Issue.1
, pp. 204-207
-
-
Ku, W.C.1
Chen, S.M.2
-
3
-
-
33748126252
-
A password authentication scheme over insecure networks
-
I.E. Liao, C.C. Lee, and M.S. Hwang, "A password authentication scheme over insecure networks," Journal of Computer and System Sciences, vol. 72, no. 4, pp. 727-740, 2006.
-
(2006)
Journal of Computer and System Sciences
, vol.72
, Issue.4
, pp. 727-740
-
-
Liao, I.E.1
Lee, C.C.2
Hwang, M.S.3
-
4
-
-
84862930748
-
Improvements on two password-based authentication protocols
-
Technical report 561
-
Y. Chen, J.S. Chou, and C.H. Huang, "Improvements on two password-based authentication protocols," Cryptology ePrint archive, Technical report 561, 2010.
-
(2010)
Cryptology EPrint Archive
-
-
Chen, Y.1
Chou, J.S.2
Huang, C.H.3
-
5
-
-
77955133201
-
A secure remote authentication scheme preserving user anonymity with non-tamper resistant smart cards
-
W.B. Horng, C.P. Lee, and J. Peng, "A secure remote authentication scheme preserving user anonymity with non-tamper resistant smart cards," WSEAS Transactions on Information Science and Applications, vol. 7, no. 5, pp. 619-628, 2010.
-
(2010)
WSEAS Transactions on Information Science and Applications
, vol.7
, Issue.5
, pp. 619-628
-
-
Horng, W.B.1
Lee, C.P.2
Peng, J.3
-
6
-
-
64249125305
-
An improved smart card based password authentication scheme with provable security
-
J. Xu, W.T. Zhu, and D.G. Feng, "An improved smart card based password authentication scheme with provable security," Computer Standards & Interfaces, vol. 31, no. 4, pp. 723-728, 2009.
-
(2009)
Computer Standards & Interfaces
, vol.31
, Issue.4
, pp. 723-728
-
-
Xu, J.1
Zhu, W.T.2
Feng, D.G.3
-
7
-
-
79956361026
-
Secure Dynamic Identity-Based Authentication Scheme Using Smart Cards
-
S.K. Sood, "Secure Dynamic Identity-Based Authentication Scheme Using Smart Cards," Information Security Journal: A Global Perspective, vol. 20, no. 2, pp. 67-77, 2011.
-
(2011)
Information Security Journal: A Global Perspective
, vol.20
, Issue.2
, pp. 67-77
-
-
Sood, S.K.1
-
8
-
-
84939573910
-
Differential Power Analysis
-
P. Kocher, J. Jaffe, and B. Jun, "Differential Power Analysis," in proceedings of CRYPTO'99, LNCS, vol. 1666, 1999, pp. 388-397.
-
(1999)
Proceedings of CRYPTO'99, LNCS
, vol.1666
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
9
-
-
67650694228
-
A unified framework for the analysis of side-channel key recovery attacks
-
F.X. Standaert, T.G. Malkin, and M. Yung, "A unified framework for the analysis of side-channel key recovery attacks," in proceedings of Advances in Cryptology-EUROCRYPT 2009, LNCS, vol 5479, 2009, pp. 443-461.
-
(2009)
Proceedings of Advances in Cryptology-EUROCRYPT 2009, LNCS
, vol.5479
, pp. 443-461
-
-
Standaert, F.X.1
Malkin, T.G.2
Yung, M.3
-
10
-
-
0036566408
-
Examining Smart-Card Security under the Threat of Power Analysis Attacks
-
T.S. Messerges, E.A. Dabbish, and R.H. Sloan, "Examining Smart-Card Security under the Threat of Power Analysis Attacks," IEEE Transactions on Computers, vol. 51, no. 5, pp. 541-552, 2002.
-
(2002)
IEEE Transactions on Computers
, vol.51
, Issue.5
, pp. 541-552
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
-
11
-
-
84949230533
-
Key agreement protocols and their security analysis
-
S.B. Wilson, D. Johnson, and A. Menezes, "Key agreement protocols and their security analysis," in proceedings of 6th IMA International Conference on Cryptography and Coding, Cirencester, LNCS, vol. 1355, 1997, pp.30-45.
-
(1997)
Proceedings of 6th IMA International Conference on Cryptography and Coding, Cirencester, LNCS
, vol.1355
, pp. 30-45
-
-
Wilson, S.B.1
Johnson, D.2
Menezes, A.3
-
12
-
-
33745179557
-
HMQV: A High-Performance Secure Diffie-Hellman Protocol
-
H. Krawczyk, "HMQV: A High-Performance Secure Diffie-Hellman Protocol," in proceedings of CRYPTO'05, LNCS, vol. 3621, 2005, pp. 546-566.
-
(2005)
Proceedings of CRYPTO'05, LNCS
, vol.3621
, pp. 546-566
-
-
Krawczyk, H.1
-
13
-
-
78751645363
-
Robust authentication and key agreement scheme preserving the privacy of secret key
-
R.C. Wang, W.S. Juang, and C.L. Lei, "Robust authentication and key agreement scheme preserving the privacy of secret key," Computer Communications, vol. 34, no. 3, pp. 274-280, 2011.
-
(2011)
Computer Communications
, vol.34
, Issue.3
, pp. 274-280
-
-
Wang, R.C.1
Juang, W.S.2
Lei, C.L.3
-
14
-
-
84863056589
-
Robust smart-cards-based user authentication scheme with user anonymity
-
S.H. Wu, Y.F. Zhu, and Q. Pu, "Robust smart-cards-based user authentication scheme with user anonymity," Security and Communication Networks, vol. 5, no. 2, pp. 236-248, 2012.
-
(2012)
Security and Communication Networks
, vol.5
, Issue.2
, pp. 236-248
-
-
Wu, S.H.1
Zhu, Y.F.2
Pu, Q.3
-
15
-
-
84863239521
-
Cryptanalysis and improvement of Sood et al.'s dynamic id-based authentication scheme
-
C.G. Ma, D. Wang and Q. M Zhang, "Cryptanalysis and improvement of Sood et al.'s dynamic id-based authentication scheme," in proceedings of 8th International Conference on Distributed Computing and Internet Technology, Lecture Notes in Computer Science, Vol. 7154, 2012, pp. 141-152.
-
(2012)
Proceedings of 8th International Conference on Distributed Computing and Internet Technology, Lecture Notes in Computer Science
, vol.7154
, pp. 141-152
-
-
Ma, C.G.1
Wang, D.2
Zhang, Q.M.3
-
16
-
-
4043152192
-
Further improvement of an efficient password based remote user authentication scheme using smart cards
-
E.J. Yoon, E.K. Ryu, K.Y. Yoo, "Further improvement of an efficient password based remote user authentication scheme using smart cards", IEEE Transactions on Consumer Electronics, vol. 50, no. 2, pp. 612-614, 2004.
-
(2004)
IEEE Transactions on Consumer Electronics
, vol.50
, Issue.2
, pp. 612-614
-
-
Yoon, E.J.1
Ryu, E.K.2
Yoo, K.Y.3
-
17
-
-
59649086399
-
Weaknesses and improvements of the Yoon-Ryu-Yoo remote user authentication scheme using smart cards
-
H. C. Hsiang and W. K. Shih, "Weaknesses and improvements of the Yoon-Ryu-Yoo remote user authentication scheme using smart cards," Computer Communications, vol. 32, no. 4, pp. 649-652, 2009.
-
(2009)
Computer Communications
, vol.32
, Issue.4
, pp. 649-652
-
-
Hsiang, H.C.1
Shih, W.K.2
-
18
-
-
80053379375
-
A Robust Remote User Authentication Scheme using Smart Card
-
C.T. Li and C.C. Lee, "A Robust Remote User Authentication Scheme using Smart Card," Information Technology and Control, vol. 40, no. 3, pp. 231-238, 2011.
-
(2011)
Information Technology and Control
, vol.40
, Issue.3
, pp. 231-238
-
-
Li, C.T.1
Lee, C.C.2
-
19
-
-
0040231044
-
Foiling the Cracker: A Survey of, and Improvements to, Password Security
-
D.V. Klein, "Foiling the Cracker: A Survey of, and Improvements to, Password Security," in proceedings of 2nd USENIX Security Workshop, 1990, pp. 5-14.
-
(1990)
Proceedings of 2nd USENIX Security Workshop
, pp. 5-14
-
-
Klein, D.V.1
-
20
-
-
0003370741
-
A security risk of depending on synchronized clocks
-
L. Gong, "A security risk of depending on synchronized clocks," ACM Operating System Review, vol. 26, no. 1, pp. 49-53, 1992.
-
(1992)
ACM Operating System Review
, vol.26
, Issue.1
, pp. 49-53
-
-
Gong, L.1
-
21
-
-
78751648745
-
A strong user authentication scheme with smart cards for wireless communications
-
D. He, M. Ma, Y. Zhang, and C. Chen, "A strong user authentication scheme with smart cards for wireless communications," Computer Communications, vol. 34, no. 3, pp. 367-374, 2011.
-
(2011)
Computer Communications
, vol.34
, Issue.3
, pp. 367-374
-
-
He, D.1
Ma, M.2
Zhang, Y.3
Chen, C.4
-
22
-
-
84860614830
-
A new dynamic ID-based remote user authentication scheme with forward secrecy
-
Springer-Verlag
-
C.G. Ma, D. Wang, P. Zhao and Y.H. Wang, "A new dynamic ID-based remote user authentication scheme with forward secrecy," in proceedings of the 14th Asia-Pacific Web Conference (APWeb Workshops 2012), Lecture Notes in Computer Science, Vol. 7234, pp. 199-211, Springer-Verlag, 2012.
-
(2012)
Proceedings of the 14th Asia-Pacific Web Conference (APWeb Workshops 2012), Lecture Notes in Computer Science
, vol.7234
, pp. 199-211
-
-
Ma, C.G.1
Wang, D.2
Zhao, P.3
Wang, Y.H.4
-
23
-
-
84868139535
-
Cryptanalysis and security enhancement of a remote user authentication scheme
-
D. Wang and C.G. Ma, "Cryptanalysis and security enhancement of a remote user authentication scheme", The Journal of China Universities of Posts and Telecommunications, vol. 19, no. 5, pp.104-114, 2012
-
(2012)
The Journal of China Universities of Posts and Telecommunications
, vol.19
, Issue.5
, pp. 104-114
-
-
Wang, D.1
Ma, C.G.2
-
24
-
-
64249169230
-
Weaknesses and improvement of Wang et al.'s remote user password authentication scheme for resource-limited environments
-
H.R. Chung, W.C. Ku, and M.J. Tsaur, "Weaknesses and improvement of Wang et al.'s remote user password authentication scheme for resource-limited environments," Computer Standards & Interfaces, vol. 31, no. 4, pp. 863-868, 2009.
-
(2009)
Computer Standards & Interfaces
, vol.31
, Issue.4
, pp. 863-868
-
-
Chung, H.R.1
Ku, W.C.2
Tsaur, M.J.3
-
26
-
-
84949187399
-
The Performance Measurement of Cryptographic Primitives on Palm Devices
-
D.S. Wong, H.H. Fuentes, and A.H. Chan, "The Performance Measurement of Cryptographic Primitives on Palm Devices," in Proceedings of ACSAC'01, pp. 92-101, 2001.
-
(2001)
Proceedings of ACSAC'01
, pp. 92-101
-
-
Wong, D.S.1
Fuentes, H.H.2
Chan, A.H.3
-
27
-
-
33646382089
-
A study of the energy consumption characteristics of cryptographic algorithms and security protocols
-
N.R. Potlapally, S. Ravi, A. Raghunathan, and N.K. Jha, "A study of the energy consumption characteristics of cryptographic algorithms and security protocols," IEEE Transactions on Mobile Computing, vol.5, no. 2, pp. 128-143, 2006.
-
(2006)
IEEE Transactions on Mobile Computing
, vol.5
, Issue.2
, pp. 128-143
-
-
Potlapally, N.R.1
Ravi, S.2
Raghunathan, A.3
Jha, N.K.4
-
28
-
-
71849087704
-
Public-key cryptography and password protocols
-
S. Halevi, H. Krawczyk, "Public-key cryptography and password protocols," ACM Transactions on Information and System Security, vol. 2, no. 3, pp. 230-268, 1999.
-
(1999)
ACM Transactions on Information and System Security
, vol.2
, Issue.3
, pp. 230-268
-
-
Halevi, S.1
Krawczyk, H.2
-
29
-
-
84864344507
-
Secure password-based remote user authentication scheme with non-tamper resistant smart cards
-
Springer Berlin /Heidelberg W.P
-
D. Wang, C.G. Ma, and W. P., "Secure password-based remote user authentication scheme with non-tamper resistant smart cards," in proceedings of 26th Annual IFIP Conference on Data and Applications Security and Privacy (DBSec 2012), Lecture Notes in Computer Science, Vol. 7371, pp. 114-121, Springer Berlin /Heidelberg, 2012.
-
(2012)
Proceedings of 26th Annual IFIP Conference on Data and Applications Security and Privacy (DBSec 2012), Lecture Notes in Computer Science
, vol.7371
, pp. 114-121
-
-
Wang, D.1
Ma, C.G.2
|