-
1
-
-
1542647564
-
A remote user authentication scheme using smarts cards with forward secrecy
-
A. K. Awasthi and S. Lal,"A remote user authentication scheme using smarts cards with forward secrecy," IEEE Transactions on Consumer Electronic, vol. 49, no. 4, pp. 1246-1248, 2003.
-
(2003)
IEEE Transactions on Consumer Electronic
, vol.49
, Issue.4
, pp. 1246-1248
-
-
Awasthi, A.K.1
Lal, S.2
-
2
-
-
0034317895
-
Cryptanalysis of a remote user authentication scheme using smart cards
-
C. K. Chan and L. M. Cheng,"Cryptanalysis of a remote user authentication scheme using smart cards," IEEE Transactions on Consumer Electronic, vol. 46, pp. 992-993, 2000.
-
(2000)
IEEE Transactions on Consumer Electronic
, vol.46
, pp. 992-993
-
-
Chan, C.K.1
Cheng, L.M.2
-
3
-
-
0344197994
-
Some forgery attack on a remote user authentication scheme using smart cards
-
C. C. Chang and K. F. Hwang,"Some forgery attack on a remote user authentication scheme using smart cards," Informatics, vol. 14, no. 3, pp. 189-294, 2003.
-
(2003)
Informatics
, vol.14
, Issue.3
, pp. 189-294
-
-
Chang, C.C.1
Hwang, K.F.2
-
4
-
-
0037285263
-
Stolenverifier attack on two new strong-password authentication protocols
-
C. M. Chen and W. C. Ku,"Stolenverifier attack on two new strong-password authentication protocols," IEICE Transactions on Communications, vol. E85- B, no. 11, pp. 2519-2521, 2002.
-
(2002)
IEICE Transactions on Communications
, vol.E85-B
, Issue.11
, pp. 2519-2521
-
-
Chen, C.M.1
Ku, W.C.2
-
5
-
-
33744776672
-
"A novel remote user authentication scheme using bilinear pairings
-
M. L. Das, A. Saxena, V. P. Gulati and D. B. Phatak,"A novel remote user authentication scheme using bilinear pairings," Computers and Security, vol. 25, no. 3, pp. 184-189, 2006.
-
(2006)
Computers and Security
, vol.25
, Issue.3
, pp. 184-189
-
-
Das, M.L.1
Saxena, A.2
Gulati, V.P.3
Phatak, D.B.4
-
6
-
-
84874951959
-
Comments on Improved efficient rmote user authentication schemes
-
M. L. Das,"Comments on"Improved efficient rmote user authentication schemes"," International Journal of Network Security, vol. 6, no. 3, pp. 282-284, 2008.
-
(2008)
International Journal of Network Security
, vol.6
, Issue.3
, pp. 282-284
-
-
Das, M.L.1
-
7
-
-
55149098062
-
Improvement of recently proposed remote user authentication schemes
-
G. Fang and G. Huang,"Improvement of recently proposed remote user authentication schemes," Cryptology ePrint Archive, 2006. (http://eprint.iacr.org/2006/200.pdf)
-
(2006)
Cryptology ePrint Archive
-
-
Fang, G.1
Huang, G.2
-
8
-
-
0542444919
-
Assigning driver's license number
-
J. A. Gallian,"Assigning driver's license number," Mathematics Magazine, vol. 64, pp. 13-22, 1991.
-
(1991)
Mathematics Magazine
, vol.64
, pp. 13-22
-
-
Gallian, J.A.1
-
9
-
-
4043125047
-
Breaking the Missouri license code
-
J. A. Gallian,"Breaking the Missouri license code," The UMAP Journal, vol. 13, pp. 37-42, 1992.
-
(1992)
The UMAP Journal
, vol.13
, pp. 37-42
-
-
Gallian, J.A.1
-
11
-
-
0033704051
-
A simple XOR based technique for distributing group key in secure multicasting
-
Antibes, France, 3-6 July
-
S. M. Ghanem and H. A. Wahab,"A simple XOR based technique for distributing group key in secure multicasting," Proceedings of Fifth IEEE Symposium on Computers and Communications (ISCC 2000), Antibes, France, pp. 166-171, 3-6 July, 2000.
-
(2000)
Proceedings of Fifth IEEE Symposium on Computers and Communications (ISCC 2000)
, pp. 166-171
-
-
Ghanem, S.M.1
Wahab, H.A.2
-
12
-
-
47949101954
-
An improved remote user authentication scheme with smart cards using bilinear pairings
-
D. Giri and P. D. Srivastava,"An improved remote user authentication scheme with smart cards using bilinear pairings," Cryptology ePrint Archive, 2006. (http://eprint.iacr.org/2006/274.pdf)
-
(2006)
Cryptology ePrint Archive
-
-
Giri, D.1
Srivastava, P.D.2
-
13
-
-
80054086407
-
A cryptographic key assignment scheme for access control in poset ordered hierarchies with enhanced security
-
D. Giri and P. D. Srivastava,"A cryptographic key assignment scheme for access control in poset ordered hierarchies with enhanced security," International Journal of Network Security, vol. 7, no. 2, pp. 223-234, 2008.
-
(2008)
International Journal of Network Security
, vol.7
, Issue.2
, pp. 223-234
-
-
Giri, D.1
Srivastava, P.D.2
-
14
-
-
59649086399
-
Weaknesses and improvements of the Yoon remote user authentication scheme using smart cards
-
C. H. Han and W. K. Shih,"Weaknesses and improvements of the Yoon remote user authentication scheme using smart cards," Computer Communications, vol. 32, no. 4, pp. 649-652, 2009.
-
(2009)
Computer Communications
, vol.32
, Issue.4
, pp. 649-652
-
-
Han, C.H.1
Shih, W.K.2
-
15
-
-
0034140374
-
A new remote user authentication scheme using smart cards
-
M. S. Hwang and L. H. Li,"A new remote user authentication scheme using smart cards," IEEE Transactions on Consumer Electronic, vol. 46, no. 1, pp. 28-30, 2000.
-
(2000)
IEEE Transactions on Consumer Electronic
, vol.46
, Issue.1
, pp. 28-30
-
-
Hwang, M.S.1
Li, L.H.2
-
16
-
-
0037008805
-
A simple remote user authentication scheme
-
M. S. Hwang, C. C. Lee, and Y. L. Tang,"A simple remote user authentication scheme," Mathematical and Computer Modeling, vol. 36, no. 1-2, pp. 103-107, 2002.
-
(2002)
Mathematical and Computer Modeling
, vol.36
, Issue.1-2
, pp. 103-107
-
-
Hwang, M.S.1
Lee, C.C.2
Tang, Y.L.3
-
17
-
-
78649423156
-
Standard Specifications for Passwordbased Public Key Cryptographic Techniques
-
IEEE P1363.2-D13
-
IEEE P1363.2-D13, Standard Specifications for Passwordbased Public Key Cryptographic Techniques, IEEE P1363 working group, 2004.
-
(2004)
IEEE P1363 working group
-
-
-
18
-
-
44549086640
-
A new mutual authentication scheme based on nonce and smart cards
-
Y. L. Jia, A. M. Zhou, and M. X. Gao,"A new mutual authentication scheme based on nonce and smart cards," Computer Communications, vol. 31, no. 10, pp. 2205-2209, 2008.
-
(2008)
Computer Communications
, vol.31
, Issue.10
, pp. 2205-2209
-
-
Jia, Y.L.1
Zhou, A.M.2
Gao, M.X.3
-
19
-
-
0019634370
-
Password authentication with insecure communication
-
L. Lamport,"Password authentication with insecure communication," Communication of the ACM, vol. 24, no. 11, pp. 770-772, 1981.
-
(1981)
Communication of the ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
20
-
-
4043135280
-
Comment on a remote user authentication scheme using smart cards with forward secrecy
-
S. W. Lee, H. S. Kim and K. Y. Yoo,"Comment on a remote user authentication scheme using smart cards with forward secrecy," IEEE Transactions on Consumer Electronic, vol. 50, no. 2, pp. 576-577, 2004.
-
(2004)
IEEE Transactions on Consumer Electronic
, vol.50
, Issue.2
, pp. 576-577
-
-
Lee, S.W.1
Kim, H.S.2
Yoo, K.Y.3
-
21
-
-
0019579253
-
Cryptographic authentication of time-variant quantities
-
R. E. Lennon, S. M. Matyas and C. H. Mayer,"Cryp- tographic authentication of time-variant quantities," IEEE Transactions on Consumer Electronic, vol. 29, no. 6, pp. 773-777, 1981.
-
(1981)
IEEE Transactions on Consumer Electronic
, vol.29
, Issue.6
, pp. 773-777
-
-
Lennon, R.E.1
Matyas, S.M.2
Mayer, C.H.3
-
22
-
-
1542542636
-
Cryptanalysis of a remote user authentication scheme using smart cards
-
K. C. Leung, L. M. Cheng, A. S. Fong and C. K. Chen,"Cryptanalysis of a remote user authentication scheme using smart cards," IEEE Transactions on Consumer Electronic, vol. 49, no. 3, pp. 1243-1245, 2003.
-
(2003)
IEEE Transactions on Consumer Electronic
, vol.49
, Issue.3
, pp. 1243-1245
-
-
Leung, K.C.1
Cheng, L.M.2
Fong, A.S.3
Chen, C.K.4
-
23
-
-
33646477537
-
An efficient and complete remote user authentication scheme using smart cards
-
H. T. Liaw, J. F. Lin and W. C. Wu,"An effcient and complete remote user authentication scheme using smart cards," Mathematical and Computer Modelling, vol. 44, pp. 223-228, 2006.
-
(2006)
Mathematical and Computer Modelling
, vol.44
, pp. 223-228
-
-
Liaw, H.T.1
Lin, J.F.2
Wu, W.C.3
-
24
-
-
4043060141
-
New remote user authentication scheme with smart cards
-
K. Manoj,"New remote user authentication scheme with smart cards," IEEE Transactions on Consumer Electronic, vol. 50, no. 2, pp. 597-600, 2004.
-
(2004)
IEEE Transactions on Consumer Electronic
, vol.50
, Issue.2
, pp. 597-600
-
-
Manoj, K.1
-
25
-
-
4043118421
-
Some remarks on a remote user authentication scheme using smart cards with forward secrecy
-
K. Manoj,"Some remarks on a remote user authentication scheme using smart cards with forward secrecy," IEEE Transactions on Consumer Electronic, vol. 50, no. 2, pp. 615-618, 2004.
-
(2004)
IEEE Transactions on Consumer Electronic
, vol.50
, Issue.2
, pp. 615-618
-
-
Manoj, K.1
-
26
-
-
0013456359
-
Comments on the S/KEY user authentication scheme
-
C. J. Mitchell and l. Chen,"Comments on the S/KEY user authentication scheme," ACM Operating System Review, vol. 30, no. 4, pp. 12-16, 1996.
-
(1996)
ACM Operating System Review
, vol.30
, Issue.4
, pp. 12-16
-
-
Mitchell, C.J.1
Chen, L.2
-
27
-
-
0042196051
-
A modified remote user authentication scheme using smart cards
-
J. J. Shen, C. W. Lin and M. S. Hwang,"A modified remote user authentication scheme using smart cards," IEEE Transactions on Consumer Electronic, vol. 49, no. 2, pp. 414-416, 2003.
-
(2003)
IEEE Transactions on Consumer Electronic
, vol.49
, Issue.2
, pp. 414-416
-
-
Shen, J.J.1
Lin, C.W.2
Hwang, M.S.3
-
28
-
-
51749125085
-
A new modified remote user authentication scheme using smart cards
-
Z. H. Shen,"A new modified remote user authentication scheme using smart cards," Applied Mathematics, vol. 23, no. 3, pp. 371-376, 2008.
-
(2008)
Applied Mathematics
, vol.23
, Issue.3
, pp. 371-376
-
-
Shen, Z.H.1
-
29
-
-
33847710813
-
Improved efficient remote user authentication schemes
-
X. Tian, R. W. Zhu, D. S. Wong,"Improved efficient remote user authentication schemes," International Journal of Network Security, vol. 4, no. 2, pp. 149-154, 2007.
-
(2007)
International Journal of Network Security
, vol.4
, Issue.2
, pp. 149-154
-
-
Tian, X.1
Zhu, R.W.2
Wong, D.S.3
-
30
-
-
40949152760
-
Password authentication schemes: current status and key issues
-
C. S. Tsai, C. C. Lee and M. S. Hwang,"Password authentication schemes: current status and key issues," International Journal of Network Security, vol. 3, no. 2, pp. 101-115, 2006.
-
(2006)
International Journal of Network Security
, vol.3
, Issue.2
, pp. 101-115
-
-
Tsai, C.S.1
Lee, C.C.2
Hwang, M.S.3
-
31
-
-
0029696153
-
A simple scheme to make passwords based on the oneway function much harder to crack
-
M. Udi,"A simple scheme to make passwords based on the oneway function much harder to crack," Computer and Security, vol. 15, no. 2, pp. 171-176, 1996.
-
(1996)
Computer and Security
, vol.15
, Issue.2
, pp. 171-176
-
-
Udi, M.1
-
32
-
-
33746248709
-
A forward-secure user authentication scheme with smart cards
-
B. Wang and Z. Q. Li,"A forward-secure user authentication scheme with smart cards," International Journal of Network Security, vol. 3, no. 2, pp. 116-119, 2006.
-
(2006)
International Journal of Network Security
, vol.3
, Issue.2
, pp. 116-119
-
-
Wang, B.1
Li, Z.Q.2
-
33
-
-
70349819161
-
Cryptanalysis of two improved password authentication schemes us ing smart cards
-
R. C. Wang and C. C. Yang,"Cryptanalysis of two improved password authentication schemes using smart cards," International Journal of Network Security, vol. 3, no. 3, pp. 283-285, 2006.
-
(2006)
International Journal of Network Security
, vol.3
, Issue.3
, pp. 283-285
-
-
Wang, R.C.1
Yang, C.C.2
-
34
-
-
59649083248
-
A more efficient and secure dynamic ID-based remote user authentication scheme
-
Y. Y. Wang, J. Y. Liu, F. Xiao, and J. Dan,"A more efficient and secure dynamic ID-based remote user authentication scheme," Computer Communications, vol. 32, no. 4, PP. 583-585, 2009.
-
(2009)
Computer Communications
, vol.32
, Issue.4
, pp. 583-585
-
-
Wang, Y.Y.1
Liu, J.Y.2
Xiao, F.3
Dan, J.4
-
35
-
-
0003256983
-
Shared authentication token secure against replay and weak key attack
-
S. M. Yen and K. H. Liao,"Shared authentication token secure against replay and weak key attack," Information Processing Letters, vol. 62, no. 2, pp. 77-80, 1997.
-
(1997)
Information Processing Letters
, vol.62
, Issue.2
, pp. 77-80
-
-
Yen, S.M.1
Liao, K.H.2
-
36
-
-
12244291938
-
An improvement of the Yang-Shieh password authentication schemes
-
C. C. Yang, R. C. Wang, and T. Y. Chang,"An improvement of the Yang-Shieh password authenti- cation schemes," Applied Mathematics and Computation, vol. 162, pp. 391-396, 2005.
-
(2005)
Applied Mathematics and Computation
, vol.162
, pp. 391-396
-
-
Yang, C.C.1
Wang, R.C.2
Chang, T.Y.3
-
37
-
-
33748196456
-
Man-in-the-middle attack on the authentication of the user from the remote autonomous object
-
C. Y. Yang, C. C. Lee, and S. Y. Hsiao,"Man-in-the-middle attack on the authentication of the user from the remote autonomous object," International Journal of Network Security, vol. 1, no. 2, pp. 81-83, 2005.
-
(2005)
International Journal of Network Security
, vol.1
, Issue.2
, pp. 81-83
-
-
Yang, C.Y.1
Lee, C.C.2
Hsiao, S.Y.3
|