-
1
-
-
80052436479
-
A secure billing service with two-factor user authentication in wireless sensor networks
-
Li, C.T., Lee, C.C., Wang, L.J., Liu, C.J.: 'A secure billing service with two-factor user authentication in wireless sensor networks', Int. J. Innov. Comput., Inf. Control, 2011, 7, (8), pp. 4821-4831
-
(2011)
Int. J. Innov. Comput., Inf. Control
, vol.7
, Issue.8
, pp. 4821-4831
-
-
Li, C.T.1
Lee, C.C.2
Wang, L.J.3
Liu, C.J.4
-
2
-
-
82755189733
-
A novel user authentication and privacy preserving scheme with smart cards for wireless communications
-
Li, C.T., Lee, C.C.: 'A novel user authentication and privacy preserving scheme with smart cards for wireless communications', Math. Comput. Model., 2012, 55, (1-2), pp. 35-44
-
(2012)
Math. Comput. Model.
, vol.55
, Issue.1-2
, pp. 35-44
-
-
Li, C.T.1
Lee, C.C.2
-
3
-
-
80053379375
-
A robust remote user authentication scheme using smart card
-
Li, C.T., Lee, C.C.: 'A robust remote user authentication scheme using smart card', Inf. Technol. Control, 2011, 40, (3), pp. 236-245
-
(2011)
Inf. Technol. Control
, vol.40
, Issue.3
, pp. 236-245
-
-
Li, C.T.1
Lee, C.C.2
-
4
-
-
0019634370
-
Password authentication with insecure communication
-
Lamport, L.: 'Password authentication with insecure communication', Commun. ACM, 1981, 24, (11), pp. 770-772
-
(1981)
Commun. ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
5
-
-
0036556279
-
Improvement on Peyravian-unic's password authentication schemes
-
Hwang, J.J., Yeh, T.C.: 'Improvement on Peyravian-unic's password authentication schemes', IEICE Trans. Commun., 2002, E85-B, (4), pp. 823-825
-
(2002)
IEICE Trans. Commun.
, vol.E85-B
, Issue.4
, pp. 823-825
-
-
Hwang, J.J.1
Yeh, T.C.2
-
6
-
-
0041698517
-
A remote user authentication scheme using hash functions
-
Lee, C.C., Li, L.H., Hwang, M.S.: 'A remote user authentication scheme using hash functions', ACM Oper. Syst. Rev., 2002, 36, (4), pp. 23-29
-
(2002)
ACM Oper. Syst. Rev.
, vol.36
, Issue.4
, pp. 23-29
-
-
Lee, C.C.1
Li, L.H.2
Hwang, M.S.3
-
7
-
-
0037282439
-
A password authentication scheme with secure password updating
-
Lin, C.L., Hwang, T.: 'A password authentication scheme with secure password updating', Comput. Secur., 2003, 22, (1), pp. 68-72
-
(2003)
Comput. Secur.
, vol.22
, Issue.1
, pp. 68-72
-
-
Lin, C.L.1
Hwang, T.2
-
8
-
-
0033704170
-
Methods for protecting password transmission
-
Peyravian, M., Zunic, N.: 'Methods for protecting password transmission', Comput. Secur., 2000, 19, (5), pp. 466-469
-
(2000)
Comput. Secur.
, vol.19
, Issue.5
, pp. 466-469
-
-
Peyravian, M.1
Zunic, N.2
-
9
-
-
33144456748
-
Secure remote user access over insecure networks
-
DOI 10.1016/j.comcom.2005.07.025, PII S0140366405002999, Networks of Excellence
-
Peyravian, M., Jeffries, C.: 'Secure remote user access over insecure networks', Comput. Commun., 2006, 29, (5), pp. 660-667 (Pubitemid 43267620)
-
(2006)
Computer Communications
, vol.29
, Issue.5
, pp. 660-667
-
-
Peyravian, M.1
Jeffries, C.2
-
10
-
-
0036302680
-
An efficient and practical solution to remote authentication: Smart card
-
Chien, H.Y., Jan, J.K., Tseng, Y.M.: 'An efficient and practical solution to remote authentication: smart card', Comput. Secur., 2002, 21, (4), pp. 372-375
-
(2002)
Comput. Secur.
, vol.21
, Issue.4
, pp. 372-375
-
-
Chien, H.Y.1
Jan, J.K.2
Tseng, Y.M.3
-
11
-
-
81855227196
-
Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards
-
Das, A.K.: 'Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards', IET Inf. Secur., 2011, 5, (3), pp. 145-151
-
(2011)
IET Inf. Secur.
, vol.5
, Issue.3
, pp. 145-151
-
-
Das, A.K.1
-
12
-
-
0742268499
-
Security of Chien et al.'s remote user authentication scheme using smart cards
-
Hsu, C.L.: 'Security of Chien et al.'s remote user authentication scheme using smart cards', Comput. Stand. Interfaces, 2004, 26, (3), pp. 167-169
-
(2004)
Comput. Stand. Interfaces
, vol.26
, Issue.3
, pp. 167-169
-
-
Hsu, C.L.1
-
13
-
-
79959762596
-
Secure smart card based password authentication scheme with user anonymity
-
Li, C.T.: 'Secure smart card based password authentication scheme with user anonymity', Inf. Technol. Control, 2011, 40, (2), pp. 157-162
-
(2011)
Inf. Technol. Control
, vol.40
, Issue.2
, pp. 157-162
-
-
Li, C.T.1
-
14
-
-
77955312905
-
Advanced smart card based password authentication
-
Song, R.: 'Advanced smart card based password authentication', Comput. Stand. Interfaces, 2010, 32, (5-6), pp. 321-325
-
(2010)
Comput. Stand. Interfaces
, vol.32
, Issue.5-6
, pp. 321-325
-
-
Song, R.1
-
15
-
-
78751645363
-
Robust authentication and key agreement scheme preserving the privacy of secret key
-
Wang, R.C., Juang, W.S., Lei, C.L.: 'Robust authentication and key agreement scheme preserving the privacy of secret key', Comput. Commun., 2011, 34, (3), pp. 274-280
-
(2011)
Comput. Commun.
, vol.34
, Issue.3
, pp. 274-280
-
-
Wang, R.C.1
Juang, W.S.2
Lei, C.L.3
-
16
-
-
84863369937
-
Cryptanalysis and improvements of an anonymous multi-receiver identity-based encryption scheme
-
Wang, H., Zhang, Y., Xiong, H., Qin, B.: 'Cryptanalysis and improvements of an anonymous multi-receiver identity-based encryption scheme', IET Inf. Secur., 2012, 6, (1), pp. 20-27
-
(2012)
IET Inf. Secur.
, vol.6
, Issue.1
, pp. 20-27
-
-
Wang, H.1
Zhang, Y.2
Xiong, H.3
Qin, B.4
-
17
-
-
84939573910
-
Differential power analysis
-
Kocher, P., Jaffe, J., Jun, B.: 'Differential power analysis'. Proc. Advances in Cryptology, 1999, pp. 388-397
-
(1999)
Proc. Advances in Cryptology
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
18
-
-
79959430513
-
One for all-all for one: Unifying standard differential power analysis attacks
-
Manqard, S., Oswald, E., Standaert, F.X.: 'One for all-all for one: unifying standard differential power analysis attacks', IET Inf. Secur., 2011, 5, (2), pp. 100-110
-
(2011)
IET Inf. Secur.
, vol.5
, Issue.2
, pp. 100-110
-
-
Manqard, S.1
Oswald, E.2
Standaert, F.X.3
-
19
-
-
0036566408
-
Examining smart-card security under the threat of power analysis attacks
-
DOI 10.1109/TC.2002.1004593
-
Messerges, T.S., Dabbish, E.A., Sloan, R.H.: 'Examining smart-card security under the threat of power analysis attacks', IEEE Trans. Comput., 2002, 51, (5), pp. 541-552 (Pubitemid 34550462)
-
(2002)
IEEE Transactions on Computers
, vol.51
, Issue.5
, pp. 541-552
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
-
20
-
-
84877858572
-
Design of improved password authentication and update scheme based on elliptic curve cryptography
-
in press
-
Islam, S.H., Biswas, G.P.: 'Design of improved password authentication and update scheme based on elliptic curve cryptography', Math. Comput. Model., 2012, in press
-
(2012)
Math. Comput. Model.
-
-
Islam, S.H.1
Biswas, G.P.2
-
21
-
-
11244267013
-
-
Springer-Verlag, New York, USA
-
Hankerson, D., Menezes, A., Vanstone, S.: 'Guide to elliptic curve cryptography' (Springer-Verlag, New York, USA, 2004)
-
(2004)
Guide to Elliptic Curve Cryptography
-
-
Hankerson, D.1
Menezes, A.2
Vanstone, S.3
-
22
-
-
84872225263
-
-
National Institute of Standards and Technology, (US Federal Information Processing Standard Publication)
-
National Institute of Standards and Technology: 'US department of commerce, secure hash standard' (US Federal Information Processing Standard Publication, 2002)
-
(2002)
US Department of Commerce, Secure Hash Standard
-
-
-
23
-
-
84877845366
-
-
National Institute of Standards and Technology. (US Federal Information Processing Standard Publication)
-
National Institute of Standards and Technology: 'US department of commerce, advanced encryption standard' (US Federal Information Processing Standard Publication, 2001)
-
(2001)
US Department of Commerce, Advanced Encryption Standard
-
-
-
24
-
-
80052938422
-
A lightweight anonymous routing protocol without public key en/decryptions for wireless ad hoc networks
-
Li, C.T., Hwang, M.S.: 'A lightweight anonymous routing protocol without public key en/decryptions for wireless ad hoc networks', Inf. Sci., 2011, 181, (23), pp. 5333-5347
-
(2011)
Inf. Sci.
, vol.181
, Issue.23
, pp. 5333-5347
-
-
Li, C.T.1
Hwang, M.S.2
-
25
-
-
84863127067
-
A secure routing protocol with node selfishness resistance in MANETs
-
Li, C.T., Yang, C.C., Hwang, M.S.: 'A secure routing protocol with node selfishness resistance in MANETs', Int. J. Mob. Commun., 2012, 10, (1), pp. 103-118
-
(2012)
Int. J. Mob. Commun.
, vol.10
, Issue.1
, pp. 103-118
-
-
Li, C.T.1
Yang, C.C.2
Hwang, M.S.3
|