-
1
-
-
82655168805
-
An improved timestamp-based remote user authentication scheme
-
A. K. Awasthi, K. Srivastava and R. C. Mittal, "An improved timestamp-based remote user authentication scheme," Computers and Electrical Engineering, vol. 37, no. 6, pp. 869-874, 2011.
-
(2011)
Computers and Electrical Engineering
, vol.37
, Issue.6
, pp. 869-874
-
-
Awasthi, A.K.1
Srivastava, K.2
Mittal, R.C.3
-
2
-
-
84886463668
-
Certicom research, Standard for efficient cryptography, sec 1, 2000: EC Cryptography
-
Ver. 1.0
-
Certicom research, "Standard for efficient cryptography, sec 1, 2000: EC Cryptography," Ver. 1.0, 2000.
-
(2000)
-
-
-
3
-
-
0036167785
-
Cryptanalysis of timestampbased password authentication scheme
-
C. K. Chan and L. M. Cheng, "Cryptanalysis of timestampbased password authentication scheme," Computer & Security, vol. 21, no. 1, pp. 74-76, 2002.
-
(2002)
Computer & Security
, vol.21
, Issue.1
, pp. 74-76
-
-
Chan, C.K.1
Cheng, L.M.2
-
4
-
-
0028405583
-
A remote password authentication scheme based upon elgamal's signature scheme
-
C. C. Chang and W. Y. Liao, "A remote password authentication scheme based upon elgamal's signature scheme," Computer & Security, vol. 13, no. 2, pp. 137- 144, 1994.
-
(1994)
Computer & Security
, vol.13
, Issue.2
-
-
Chang, C.C.1
Liao, W.Y.2
-
5
-
-
80053096670
-
Cryptanalysis of security enhancement for a modified authenticated key agreement protocol
-
K. M. Cheng, T. Y. Chang and J. W. Lo, "Cryptanalysis of security enhancement for a modified authenticated key agreement protocol," International Journal of Network Security, vol. 11, no. 1, pp. 55-57, 2010.
-
(2010)
International Journal of Network Security
, vol.11
, Issue.1
, pp. 55-57
-
-
Cheng, K.M.1
Chang, T.Y.2
Lo, J.W.3
-
6
-
-
0036429021
-
An enhancement of timestamp-based password authentication scheme
-
L. Fan, J. H. Li, and H. W. Zhu, "An enhancement of timestamp-based password authentication scheme," Computers and Security, vol. 21, no. 7, pp. 665-667, 2002.
-
(2002)
Computers and Security
, vol.21
, Issue.7
, pp. 665-667
-
-
Fan, L.1
Li, J.H.2
Zhu, H.W.3
-
7
-
-
80054052709
-
Weaknesses of a remote user password authentication scheme using smart card
-
D. B. He, J. H. Chen and J. Hu, "Weaknesses of a remote user password authentication scheme using smart card, "International Journal of Network Security, vol. 13, no. 1, pp. 58-60, 2011.
-
(2011)
International Journal of Network Security
, vol.13
, Issue.1
, pp. 58-60
-
-
He, D.B.1
Chen, J.H.2
Hu, J.3
-
8
-
-
84855196010
-
Note on 'Design of improved password authentication and update scheme based on elliptic curve cryptography'
-
D. B. He, S. H. Wu and J. H. Chen, "Note on 'Design of improved password authentication and update scheme based on elliptic curve cryptography'," Mathematical and Computer Modelling, vol. 55, no. 3- 4, pp. 1661-1664, 2012.
-
(2012)
Mathematical and Computer Modelling
, vol.55
, Issue.3-4
, pp. 1661-1664
-
-
He, D.B.1
Wu, S.H.2
Chen, J.H.3
-
9
-
-
84865366436
-
An efficient and provably-secure certificateless signature scheme
-
Nov. 2012
-
D. B. He, J. H. Chen and R. Zhang, "An efficient and provably-secure certificateless signature scheme," International Journal of Communication Systems, vol. 25, no. 11, pp. 1432-1442, Nov. 2012.
-
International Journal of Communication Systems
, vol.25
, Issue.11
, pp. 1432-1442
-
-
He, D.B.1
Chen, J.H.2
Zhang, R.3
-
10
-
-
84864058187
-
A more secure authentication scheme for telecare medicine information systems
-
D. B. He, J. H. Chen and R. Zhang, "A more secure authentication scheme for telecare medicine information systems,"J. Med. Syst., vol. 36, no. 3, pp. 1989-1995, 2012.
-
(2012)
J. Med. Syst.
, vol.36
, Issue.3
, pp. 1989-1995
-
-
He, D.B.1
Chen, J.H.2
Zhang, R.3
-
11
-
-
0034140374
-
A new remote user authentication scheme using smart cards
-
M. S. Hwang and L. H. Li, "A new remote user authentication scheme using smart cards," IEEE Transactions on Consumer Electronics, vol. 46, no. 1, pp. 28-30, 2000.
-
(2000)
IEEE Transactions on Consumer Electronics
, vol.46
, Issue.1
, pp. 28-30
-
-
Hwang, M.S.1
Li, L.H.2
-
12
-
-
1542335451
-
Efficient password authenticated key agreement using smart card
-
W. Juang, "Efficient password authenticated key agreement using smart card," Computer & Security, vol. 23, pp. 67-173, 2004.
-
(2004)
Computer & Security
, vol.23
, pp. 67-173
-
-
Juang, W.1
-
13
-
-
84968503742
-
Elliptic curve cryptosystems
-
N. Koblitz, "Elliptic curve cryptosystems," M athematics of Computation, vol. 48, pp. 203-209, 1987.
-
(1987)
M athematics of Computation
, vol.48
, pp. 203-209
-
-
Koblitz, N.1
-
14
-
-
0000474763
-
Differential power analysis
-
Santa Barbara, CA, U.S.A.
-
P. Kocher, J. Jaffe and B. Jun, "Differential power analysis," in Proceedings of Advances in Cryptology, Santa Barbara, CA, U.S.A., 1999.
-
(1999)
in Proceedings of Advances in Cryptology
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
15
-
-
1942423677
-
Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards
-
W. Ku and S. Chen, "Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards," IEEE Transactions on Consumer Electronics, vol. 50 no. 1, pp. 204-207, 2004.
-
(2004)
IEEE Transactions on Consumer Electronics
, vol.50
, Issue.1
, pp. 204-207
-
-
Ku, W.1
Chen, S.2
-
16
-
-
84875286190
-
An enhanced remote user authentication scheme with smart card
-
M. Kumar, "An enhanced remote user authentication scheme with smart card,"International Journal of Network Security, vol. 10, no. 3, pp. 175-184, 2010.
-
(2010)
International Journal of Network Security
, vol.10
, Issue.3
, pp. 175-184
-
-
Kumar, M.1
-
17
-
-
84866619118
-
An improved efficient remote password authentication scheme with smart card over insecure networks
-
M. Kumar, M. K. Gupta and S. kumari, "An improved efficient remote password authentication scheme with smart card over insecure networks," International Journal of Network Security, vol. 13, no. 3, pp. 167- 177, 2011.
-
(2011)
International Journal of Network Security
, vol.13
, Issue.3
-
-
Kumar, M.1
Gupta, M.K.2
Kumari, S.3
-
18
-
-
44549086640
-
A new mutual authentication scheme based on nonce and smart cards
-
J. Y. Liu, A. M. Zhou and M. X. Gao, " A new mutual authentication scheme based on nonce and smart cards," Computer Communications, vol. 31, pp. 2205- 2209, 2008.
-
(2008)
Computer Communications
, vol.31
-
-
Liu, J.Y.1
Zhou, A.M.2
Gao, M.X.3
-
19
-
-
0004192381
-
Handbook of Applied Cryptograph
-
Crc press, New York
-
A. J. Menezes, P. C. Oorschot and S. A. Vanstone, Handbook of Applied Cryptograph, Crc press, New York, 1997.
-
(1997)
-
-
Menezes, A.J.1
Oorschot, P.C.2
Vanstone, S.A.3
-
20
-
-
0036566408
-
Examining smart-card security under the threat of power analysis attacks
-
T. S. Messerges, E. A. Dabbish and R. H. Sloan, "Examining smart-card security under the threat of power analysis attacks," IEEE Transactions on Computers, vol. 51, no. 5, pp. 541-552, 2002
-
(2002)
IEEE Transactions on Computers
, vol.51
, Issue.5
, pp. 541-552
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
-
21
-
-
84976664565
-
A method for obtaining digital signatures and public-key cryptosystems
-
DOI:10.1145/357980.358017
-
R. L. Rivest, A. Shamir and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Communications of the ACM - Special 25th Anniversary Issue, vol. 26, no. 1, DOI:10.1145/357980.358017, 1983.
-
(1983)
Communications of the ACM - Special 25th Anniversary Issue
, vol.26
, Issue.1
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
22
-
-
0242552286
-
Security enhancement for the timestamp-based password authentication
-
J. J. Shen, C. W. Lin and M. S. Hwang, "Security enhancement for the timestamp-based password authentication," Computers and Security, vol. 22, no. 7, pp. 591-595, 2003..
-
(2003)
Computers and Security
, vol.22
, Issue.7
, pp. 591-595
-
-
Shen, J.J.1
Lin, C.W.2
Hwang, M.S.3
-
23
-
-
0033350090
-
Password authentication scheme with smard cards
-
W. H. Yang and S. P. Shieh, "Password authentication scheme with smard cards,"Computers and Security, vol. 18, no. 8, pp. 727-733, 1999.
-
(1999)
Computers and Security
, vol.18
, Issue.8
, pp. 727-733
-
-
Yang, W.H.1
Shieh, S.P.2
|