-
1
-
-
0019634370
-
Password authentication with insecure communication
-
Lamport, L.: Password authentication with insecure communication. Communications of the ACM 24(11), 770-772 (1981)
-
(1981)
Communications of the ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
2
-
-
1542647564
-
A remote user authentication scheme using smart cards with forward secrecy
-
Awasthi, A., Lal, S.: A remote user authentication scheme using smart cards with forward secrecy. IEEE Trans. Consumer Electronic 49(4), 1246-1248 (2003)
-
(2003)
IEEE Trans. Consumer Electronic
, vol.49
, Issue.4
, pp. 1246-1248
-
-
Awasthi, A.1
Lal, S.2
-
3
-
-
4043089982
-
An enhanced remote user authentication scheme using smart cards
-
Awasthi, A., Lal, S.: An enhanced remote user authentication scheme using smart cards. IEEE Trans. Consumer Electronic 50(2), 583-586 (2004)
-
(2004)
IEEE Trans. Consumer Electronic
, vol.50
, Issue.2
, pp. 583-586
-
-
Awasthi, A.1
Lal, S.2
-
4
-
-
1542335451
-
Efficient password authenticated key agreement using smart card
-
Juang, W.: Efficient password authenticated key agreement using smart card. Computers & Security 23, 167-173 (2004)
-
(2004)
Computers & Security
, vol.23
, pp. 167-173
-
-
Juang, W.1
-
5
-
-
1942423677
-
Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards
-
Ku, W., Chen, S.: Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards. IEEE Trans. Consumer Electronic 50(1), 204-207 (2004)
-
(2004)
IEEE Trans. Consumer Electronic
, vol.50
, Issue.1
, pp. 204-207
-
-
Ku, W.1
Chen, S.2
-
6
-
-
4043060141
-
New remote user authentication scheme using smart cards
-
Kumar, M.: New remote user authentication scheme using smart cards. IEEE Trans. Consumer Electronic 50(2), 597-600 (2004)
-
(2004)
IEEE Trans. Consumer Electronic
, vol.50
, Issue.2
, pp. 597-600
-
-
Kumar, M.1
-
7
-
-
12544254099
-
Security analysis and improvement of the efficient password-based authentication protocol
-
Kwon, T., Park, Y., Lee, H.: Security analysis and improvement of the efficient password-based authentication protocol. IEEE Communications Letters 9(1), 93-95 (2005)
-
(2005)
IEEE Communications Letters
, vol.9
, Issue.1
, pp. 93-95
-
-
Kwon, T.1
Park, Y.2
Lee, H.3
-
8
-
-
2642546539
-
Two factor authenticated key exchange (TAKE) protocol in public wireless LANs
-
Park, Y., Park, S.: Two factor authenticated key exchange (TAKE) protocol in public wireless LANs. IEICE Trans. Communications E87-B(5), 1382-1385 (2004)
-
(2004)
IEICE Trans. Communications
, vol.E87-B
, Issue.5
, pp. 1382-1385
-
-
Park, Y.1
Park, S.2
-
9
-
-
0034318245
-
An efficient use authentication scheme using smart cards
-
Sun, H.: An efficient use authentication scheme using smart cards. IEEE Trans. Consumer Electronic 46(4), 958-961 (2000)
-
(2000)
IEEE Trans. Consumer Electronic
, vol.46
, Issue.4
, pp. 958-961
-
-
Sun, H.1
-
10
-
-
34248666700
-
Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards
-
Wang, X., Zhang, W., Zhang, J., Khan, M.: Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards. Computer Standards & Interfaces 29(5), 507-512 (2007)
-
(2007)
Computer Standards & Interfaces
, vol.29
, Issue.5
, pp. 507-512
-
-
Wang, X.1
Zhang, W.2
Zhang, J.3
Khan, M.4
-
11
-
-
4243165683
-
Cryptanalysis of simple authenticated key agreement protocols
-
Yang, C., Hwang, M.: Cryptanalysis of simple authenticated key agreement protocols. IEICE Trans. Communications E87-A(8), 2174-2176 (2004)
-
(2004)
IEICE Trans. Communications
, vol.E87-A
, Issue.8
, pp. 2174-2176
-
-
Yang, C.1
Hwang, M.2
-
12
-
-
3042731523
-
Cryptanalysis of a user friendly remote authentication scheme with smart cards
-
Yang, C., Wang, R.: Cryptanalysis of a user friendly remote authentication scheme with smart cards. Computer Security 23, 425-427 (2004)
-
(2004)
Computer Security
, vol.23
, pp. 425-427
-
-
Yang, C.1
Wang, R.2
-
13
-
-
33749681217
-
Efficient password-based authentication and key exchange scheme preserving user privacy
-
Wireless Algorithms, Systems, and Applications - First International Conference, WASA 2006, Proceedings
-
Chai, Z., Cao, Z., Lu, R.: Efficient Password-Based Authentication and Key Exchange Scheme Preserving User Privacy. In: Cheng, X., Li, W., Znati, T. (eds.) WASA 2006. LNCS, vol. 4138, pp. 467-477. Springer, Heidelberg (2006) (Pubitemid 44551219)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4138 LNCS
, pp. 467-477
-
-
Chai, Z.1
Cao, Z.2
Lu, R.3
-
14
-
-
2642546539
-
Two factor authenticated key exchange(TAKE) protocol in public wireless LANs
-
Park, Y.M., Park, S.K.: Two factor authenticated key exchange(TAKE) protocol in public wireless LANs. IEICE Trans. Communications E87-B(5), 1382-1385 (2004)
-
(2004)
IEICE Trans. Communications
, vol.E87-B
, Issue.5
, pp. 1382-1385
-
-
Park, Y.M.1
Park, S.K.2
-
15
-
-
78651543728
-
Two efficient two-factor authenticated key exchange protocols in public wireless LANs
-
Juang, W.-S., Wu, J.-L.: Two efficient two-factor authenticated key exchange protocols in public wireless LANs. Computers and Electrical Engineering 10, 1-8 (2008)
-
(2008)
Computers and Electrical Engineering
, vol.10
, pp. 1-8
-
-
Juang, W.-S.1
Wu, J.-L.2
-
16
-
-
0037285305
-
-
Yeh, T.-C., Shen, H.-Y., Hwang, J.-J.: A Secure One-Time Password Authentication Scheme Using Smart Cards E85-B(11), 2515-2518 (2002)
-
(2002)
A Secure One-Time Password Authentication Scheme Using Smart Cards
, vol.E85-B
, Issue.11
, pp. 2515-2518
-
-
Yeh, T.-C.1
Shen, H.-Y.2
Hwang, J.-J.3
-
17
-
-
84869008405
-
Cryptanalysis of Two-Factor Authenticated Key Exchange Protocol in Wireless LANs
-
Lee, H., Choi, D., Lee, Y., Won, D., Kim, S.: Cryptanalysis of Two-Factor Authenticated Key Exchange Protocol in Wireless LANs. World Academy of Science, Engineering and Technology 59, 390-393 (2009)
-
(2009)
World Academy of Science, Engineering and Technology
, vol.59
, pp. 390-393
-
-
Lee, H.1
Choi, D.2
Lee, Y.3
Won, D.4
Kim, S.5
|