-
1
-
-
0034318245
-
An efficient remote user authentication scheme using smart cards
-
H.M. Sun, "An Efficient Remote User Authentication Scheme Using Smart Cards," IEEE Transactions on Consumer Electronics, Vol. 46, No. 4, pp. 958-961, 2000.
-
(2000)
IEEE Transactions on Consumer Electronics
, vol.46
, Issue.4
, pp. 958-961
-
-
Sun, H.M.1
-
2
-
-
0142007144
-
A user friendly remote authentication scheme with smart cards
-
S.T. Wu, B.e. Chieu, "A User Friendly Remote Authentication Scheme with Smart Cards," Computers & Security, Vol. 22, No. 6, pp. 457-550, 2003.
-
(2003)
Computers & Security
, vol.22
, Issue.6
, pp. 457-550
-
-
Wu, S.T.1
Chieu, B.E.2
-
3
-
-
4043152192
-
Further improvements of an eflicient password-based remote user authentication scheme using smart cards
-
E. J. Yoon, E. K. Ryu and K. Y. Yoo, "Further Improvements of an Eflicient Password-based Remote User Authentication Scheme Using Smart Cards," IEEE Transactions on Consumer Electronics, Vol. 50, No. 2, pp. 6 12-6 14,2004.
-
(2004)
IEEE Transactions on Consumer Electronics
, vol.50
, Issue.2
, pp. 612-614
-
-
Yoon, E.J.1
Ryu, E.K.2
Yoo, K.Y.3
-
4
-
-
4043122631
-
A dynamic id-based remote user authentication scheme
-
M.LDas, A.Sxena and V.P.Gulathi, "A Dynamic ID-based Remote User Authentication Scheme," IEEE Transactions on Consumer Electronics, Vol. 50, No. 2, pp. 629-63 1, 2004.
-
(2004)
IEEE Transactions on Consumer Electronics
, vol.50
, Issue.2
, pp. 629-631
-
-
Das, M.L.1
Sxena, A.2
Gulathi, V.P.3
-
5
-
-
24144494609
-
Impersonation attack on a dynamic id-based remote user authentication scheme using smart cards
-
W.e. Ku, ST Chang, "Impersonation Attack on a Dynamic ID-based Remote User Authentication Scheme Using Smart Cards," IEICE Transactions on Communication, E88-B( 5), pp. 2 165-216,2005.
-
(2005)
IEICE Transactions on Communication
, vol.E88-B
, Issue.5
, pp. 2165-216
-
-
Ku, W.E.1
Chang, S.T.2
-
6
-
-
33744462119
-
A remote authentication scheme preserving user anonymity
-
H.Y. Chien, C.H. Chen, "A Remote Authentication Scheme Preserving User Anonymity," International Conference on AINA 2, pp. 245-248, 2005.
-
(2005)
International Conference on AINA
, vol.2
, pp. 245-248
-
-
Chien, H.Y.1
Chen, C.H.2
-
8
-
-
78650408501
-
Improved remote user authentication scheme preserving user anonymity
-
C. S.Bindu, P.C. S.Reddy and B. Satyanarayana, "Improved Remote User Authentication Scheme Preserving User Anonymity," International Journal of Computer Science and Network Security, Vol. 8, No. 3, pp. 62-66,2008.
-
(2008)
International Journal of Computer Science and Network Security
, vol.8
, Issue.3
, pp. 62-66
-
-
Bindu, C.S.1
Reddy, P.C.S.2
Satyanarayana, B.3
-
9
-
-
59649083248
-
A more eflicient and secure dynamic id-based remote user authentication scheme
-
Y. Y. Wang, 1. Y. Kiu, F.X. Xiao and 1. Dan, "A More Eflicient and Secure Dynamic ID-based Remote User Authentication Scheme," Computer Communications, Vol. 32, pp. 583-585,2009
-
(2009)
Computer Communications
, vol.32
, pp. 583-585
-
-
Wang, Y.Y.1
Kiu, I.Y.2
Xiao, F.X.3
Dan, I.4
-
10
-
-
70349792182
-
An efficient biometrics-based remote user authentication scheme using smart cards
-
CT Li, M. S. Hwang, "An Efficient Biometrics-based Remote User Authentication Scheme Using Smart Cards," Journal of Network and Computer Applications, Vol. 33, pp. 1-5,20 10
-
(2010)
Journal of Network and Computer Applications
, vol.33
, pp. 1-5
-
-
Li, C.T.1
Hwang, M.S.2
-
11
-
-
78751642788
-
Cryptanalysis and security enhancement of a 'more efficient and secure dynamic id-based remote user authentication scheme
-
M.K. Khan, S.K. Kim and K. Alghathbar, "Cryptanalysis and Security Enhancement of a 'More Efficient and Secure Dynamic ID-based Remote User Authentication Scheme," Computer Communications, Vo1.34, No. 3, pp. 305-309,20 1 1
-
(2011)
Computer Communications
, vol.34
, Issue.3
, pp. 305-309
-
-
Khan, M.K.1
Kim, S.K.2
Alghathbar, K.3
-
13
-
-
0036566408
-
Examining smart-card security under the threat of power analysis attacks
-
T. S. Messerges, E. A. Dabbish and R.H. Sloan, "Examining Smart-Card Security under the Threat of Power Analysis Attacks," IEEE Transactions on Computers, Vol. 5 1, No. 5, pp. 54 1-552,2002.
-
(2002)
IEEE Transactions on Computers
, vol.51
, Issue.5
, pp. 541-552
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
|