-
1
-
-
28044451335
-
Robust remote authentication scheme with smart cards
-
C. I. Fan, Y. C. Chan, and Z. K. Zhang, Robust remote authentication scheme with smart cards, Journal of Computers & Security, vol. 42, no. 8, pp. 619-628, 2005.
-
(2005)
Journal of Computers & Security
, vol.42
, Issue.8
, pp. 619-628
-
-
Fan, C.I.1
Chan, Y.C.2
Zhang, Z.K.3
-
2
-
-
77958150942
-
Secure group key agreement protocol based on chaotic hash
-
X. F. Guo, and J. S. Zhang, Secure group key agreement protocol based on chaotic hash, Journal of Information Sciences, Vol. 180, no. 20, pp. 4069-4074, 2010.
-
(2010)
Journal of Information Sciences
, vol.180
, Issue.20
, pp. 4069-4074
-
-
Guo, X.F.1
Zhang, J.S.2
-
3
-
-
78751648745
-
A strong user authentication scheme with anonymity for wireless communications
-
D. J. He, M. D. Ma, Y. Zhang, C. Chen, and J. J. Bu, A strong user authentication scheme with anonymity for wireless communications, Journal of Computer Communications, Vol. 34, no. 3, pp. 367-374, 2011.
-
(2011)
Journal of Computer Communications
, vol.34
, Issue.3
, pp. 367-374
-
-
He, D.J.1
Ma, M.D.2
Zhang, Y.3
Chen, C.4
Bu, J.J.5
-
4
-
-
71649104505
-
DoS resistant ID-based password authentication scheme using smart cards
-
M. S. Hwang, S. K. Chong, and T. Y. Chen, DoS resistant ID-based password authentication scheme using smart cards, Journal of Systems and Software, vol. 83, no. 1, pp. 163-172, 2010.
-
(2010)
Journal of Systems and Software
, vol.83
, Issue.1
, pp. 163-172
-
-
Hwang, M.S.1
Chong, S.K.2
Chen, T.Y.3
-
5
-
-
62549133356
-
Robust and efficient password-authenticated key agreement using smart card
-
W. S. Juang, S. T. Chen, and H. T. Liaw, Robust and efficient password-authenticated key agreement using smart card, IEEE Trans. Industrial Electronics, vol. 55, no. 6, pp. 2551-2556, 2008.
-
(2008)
IEEE Trans. Industrial Electronics
, vol.55
, Issue.6
, pp. 2551-2556
-
-
Juang, W.S.1
Chen, S.T.2
Liaw, H.T.3
-
6
-
-
33750133438
-
Security enhancement on a new authentication scheme with anonymity for wireless environments
-
C. C. Lee, M. S. Hwang, and I. E. Liao, Security enhancement on a new authentication scheme with anonymity for wireless environments, IEEE Trans. Industrial Electronics, vol. 53, no. 5, pp. 1683-1686, 2006.
-
(2006)
IEEE Trans. Industrial Electronics
, vol.53
, Issue.5
, pp. 1683-1686
-
-
Lee, C.C.1
Hwang, M.S.2
Liao, I.E.3
-
7
-
-
67649184080
-
Security flaw of authentication scheme with anonymity for wireless communications
-
J. S. Lee, J. H. Chang, and D. H. Lee, Security flaw of authentication scheme with anonymity for wireless communications, Journal of IEEE Communications Letters, vol. 13, no. 5, pp. 292-293, 2009.
-
(2009)
Journal of IEEE Communications Letters
, vol.13
, Issue.5
, pp. 292-293
-
-
Lee, J.S.1
Chang, J.H.2
Lee, D.H.3
-
8
-
-
82755189733
-
A novel user authentication and privacy preserving scheme with smart cards for wireless communications
-
C. T. Li and C. C. Lee, A novel user authentication and privacy preserving scheme with smart cards for wireless communications, Journal of Mathematical and Computer Modelling, vol. 55, no. 1-2, pp. 35-44, 2012.
-
(2012)
Journal of Mathematical and Computer Modelling
, vol.55
, Issue.1-2
, pp. 35-44
-
-
Li, C.T.1
Lee, C.C.2
-
9
-
-
75449106985
-
Anonymity enhancement on robust and efficient password-authenticated key agreement using smart cards
-
X. X. Li, W. D. Qiu, D. Zheng, K. F. Chen, and J. H. Li, Anonymity enhancement on robust and efficient password-authenticated key agreement using smart cards, IEEE Trans. Industrial Electronics, vol. 57, no. 2, pp. 793-800, 2010.
-
(2010)
IEEE Trans. Industrial Electronics
, vol.57
, Issue.2
, pp. 793-800
-
-
Li, X.X.1
Qiu, W.D.2
Zheng, D.3
Chen, K.F.4
Li, J.H.5
-
10
-
-
78049382801
-
An anonymous key agreement protocol based on chaotic maps
-
Y. J. Niu, and X. Y. Wang, An anonymous key agreement protocol based on chaotic maps, Journal of Communications in Nonlinear Science and Numerical Simulation, vol. 16, no. 4, pp. 1986-1992, 2011.
-
(2011)
Journal of Communications In Nonlinear Science and Numerical Simulation
, vol.16
, Issue.4
, pp. 1986-1992
-
-
Niu, Y.J.1
Wang, X.Y.2
-
11
-
-
67649386419
-
Improvements of Juang et al.'s password-authenticated key agreement scheme using smart cards
-
D. Z. Sun, J. P. Huai, J. Z. Sun, J. X. Li, J. W. Zhang, and Z. Y. Feng, Improvements of Juang et al.'s password-authenticated key agreement scheme using smart cards, IEEE Trans. Industrial Electronics, vol. 56, no. 6, pp. 2284-2291, 2009.
-
(2009)
IEEE Trans. Industrial Electronics
, vol.56
, Issue.6
, pp. 2284-2291
-
-
Sun, D.Z.1
Huai, J.P.2
Sun, J.Z.3
Li, J.X.4
Zhang, J.W.5
Feng, Z.Y.6
-
12
-
-
33750489725
-
Security of public key encryption technique based on multiple chaotic system
-
K. Wang, W. J. Pei, L. H. Zou, Y. M. Cheung, and Z. Y. HE, Security of public key encryption technique based on multiple chaotic system, Journal of Physics Letters A, vol. 360, no. 2, pp. 259-262, 2006.
-
(2006)
Journal of Physics Letters A
, vol.360
, Issue.2
, pp. 259-262
-
-
Wang, K.1
Pei, W.J.2
Zou, L.H.3
Cheung, Y.M.4
He, Z.Y.5
-
13
-
-
77952742569
-
An improved key agreement protocol based on chaos
-
X. Y. Wang, and J. F. Zhao, An improved key agreement protocol based on chaos, Journal of Communications in Nonlinear Science and Numerical Simulation, vol. 15, no. 12, pp. 4052-4057, 2010.
-
(2010)
Journal of Communications In Nonlinear Science and Numerical Simulation
, vol.15
, Issue.12
, pp. 4052-4057
-
-
Wang, X.Y.1
Zhao, J.F.2
-
14
-
-
84858082073
-
An improved dynamic ID-based remote user authentication with key agreement scheme
-
F. T. Wen, and X. L. Li, An improved dynamic ID-based remote user authentication with key agreement scheme, Journal of Computers and Electrical Engineering, vol. 38 no. 2, pp. 381-387, 2012.
-
(2012)
Journal of Computers and Electrical Engineering
, vol.38
, Issue.2
, pp. 381-387
-
-
Wen, F.T.1
Li, X.L.2
-
15
-
-
54949140749
-
A secure authentication scheme with anonymity for wireless communications
-
C. C. Wu, W. B. Lee, and W. J. Tsaur, A secure authentication scheme with anonymity for wireless communications, Journal of IEEE Communications Letters, vol. 12, no. 10, pp. 722-723, 2008.
-
(2008)
Journal of IEEE Communications Letters
, vol.12
, Issue.10
, pp. 722-723
-
-
Wu, C.C.1
Lee, W.B.2
Tsaur, W.J.3
-
16
-
-
33751227507
-
A novel key agreement protocol based on chaotic maps
-
D. Xiao, X. F. Liao, and S. J. Deng, A novel key agreement protocol based on chaotic maps, Journal of Information Sciences, vol. 177, no. 4, pp. 1136-1142, 2007.
-
(2007)
Journal of Information Sciences
, vol.177
, Issue.4
, pp. 1136-1142
-
-
Xiao, D.1
Liao, X.F.2
Deng, S.J.3
-
17
-
-
38349025681
-
Using time-stamp to improve the security of a chaotic maps- based key agreement protocol
-
D. Xiao, X. F. Liao, and S. J. Deng, Using time-stamp to improve the security of a chaotic maps- based key agreement protocol, Journal of Information Sciences, vol. 178, no. 6, pp. 1598-1602, 2008.
-
(2008)
Journal of Information Sciences
, vol.178
, Issue.6
, pp. 1598-1602
-
-
Xiao, D.1
Liao, X.F.2
Deng, S.J.3
-
18
-
-
6344239137
-
An efficient entire chaos-based scheme for deniable authenti- cation
-
D. Xiao, X. F. Liao, and K. W. Wong, An efficient entire chaos-based scheme for deniable authenti- cation, Journal of Chaos, Solitons & Fractals, vol. 23, no. 4, pp. 1327-1331, 2005.
-
(2005)
Journal of Chaos, Solitons & Fractals
, vol.23
, Issue.4
, pp. 1327-1331
-
-
Xiao, D.1
Liao, X.F.2
Wong, K.W.3
-
19
-
-
78751650071
-
An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks
-
J. Xu, W. T. Zhu, and D. G. Feng, An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks, Journal of Computer Communications, vol. 34, no. 3, pp. 319-325, 2011.
-
(2011)
Journal of Computer Communications
, vol.34
, Issue.3
, pp. 319-325
-
-
Xu, J.1
Zhu, W.T.2
Feng, D.G.3
-
20
-
-
78049322666
-
Two robust remote user authentication protocols using smart cards
-
K. H. Yeh, C. H. Su, N. W. Lo, Y. J. Li, and Y. X. Hung, Two robust remote user authentication protocols using smart cards, Journal of Systems and Software, vol. 83, no. 12, pp. 2556-2565, 2010.
-
(2010)
Journal of Systems and Software
, vol.83
, Issue.12
, pp. 2556-2565
-
-
Yeh, K.H.1
Su, C.H.2
Lo, N.W.3
Li, Y.J.4
Hung, Y.X.5
-
21
-
-
78651423836
-
An efficient and secure Diffie-Hellman key agreement protocol based on Chebyshev chaotic map
-
E. J. Yoon, and II. S. Jeon, An efficient and secure Diffie-Hellman key agreement protocol based on Chebyshev chaotic map, Journal of Communications in Nonlinear Science and Numerical Simulation, vol. 16, no. 6, pp. 2383-2389, 2011.
-
(2011)
Journal of Communications In Nonlinear Science and Numerical Simulation
, vol.16
, Issue.6
, pp. 2383-2389
-
-
Yoon, E.J.1
Jeon, H.S.2
-
22
-
-
79956064800
-
A user friendly authentication scheme with anonymity for wireless communications
-
E. J. Yoon, K. Y. Yoo, and K. S. Ha, A user friendly authentication scheme with anonymity for wireless communications, Journal of Computers and Electrical Engineering, vol. 37, no. 3, pp. 356-364, 2011.
-
(2011)
Journal of Computers and Electrical Engineering
, vol.37
, Issue.3
, pp. 356-364
-
-
Yoon, E.J.1
Yoo, K.Y.2
Ha, K.S.3
-
23
-
-
40249103088
-
Cryptanalysis of the public key encryption based on multiple chaotic systems
-
L. H. Zhang, Cryptanalysis of the public key encryption based on multiple chaotic systems, Journal of Chaos, Solitons & Fractals, vol. 37, no. 3, pp. 669-674, 2008.
-
(2008)
Journal of Chaos, Solitons & Fractals
, vol.37
, Issue.3
, pp. 669-674
-
-
Zhang, L.H.1
-
24
-
-
1942487780
-
A new authentication scheme with anonymity for wireless environments
-
J. M. Zhu, and J. F. Ma, A new authentication scheme with anonymity for wireless environments, IEEE Trans. Consumer Electronics, vol. 50, no. 1, pp. 231-235, 2004.
-
(2004)
IEEE Trans. Consumer Electronics
, vol.50
, Issue.1
, pp. 231-235
-
-
Zhu, J.M.1
Ma, J.F.2
|