-
1
-
-
0019634370
-
Password authentication with insecure communication
-
L. Lamport. Password authentication with insecure communication. Communications of the ACM, 1981, Vol. 24, No. 11, pp. 770-772.
-
(1981)
Communications of the ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
2
-
-
33751167604
-
Improving the security of 'a flexible biometrics remote user authentication scheme'
-
M. K. Khan, J. S. Zhang. Improving the security of 'a flexible biometrics remote user authentication scheme'. Computer Standards & Interfaces, 2007, Vol. 29, No. l, pp. 82-85.
-
(2007)
Computer Standards & Interfaces
, vol.29
, Issue.1
, pp. 82-85
-
-
Khan, M.K.1
Zhang, J.S.2
-
3
-
-
44549086640
-
A new mutual authentication scheme based on nonce and smart cards
-
J. Y. Liu, A. M. Zhou, M. X. Gao. A new mutual authentication scheme based on nonce and smart cards. Computer Communications, 2008, Vol. 31, No. 10, pp. 2205-2209.
-
(2008)
Computer Communications
, vol.31
, Issue.10
, pp. 2205-2209
-
-
Liu, J.Y.1
Zhou, A.M.2
Gao, M.X.3
-
4
-
-
54349089114
-
An improved bilinear pairing based remote client authentication protocol
-
T. Goriparthi, M. L. Das, A. Saxena. An improved bilinear pairing based remote client authentication protocol. Computer Standard Interface, 2009, Vol. 31, No. l, pp. 181-185.
-
(2009)
Computer Standard Interface
, vol.31
, Issue.1
, pp. 181-185
-
-
Goriparthi, T.1
Das, M.L.2
Saxena, A.3
-
5
-
-
80053379375
-
A robust remote user authentication scheme using smart card
-
C. T. Li, C. C. Lee. A robust remote user authentication scheme using smart card. Information Technology and Control, 2011, Vol.40, No. 3, pp. 236-245.
-
(2011)
Information Technology and Control
, vol.40
, Issue.3
, pp. 236-245
-
-
Li, C.T.1
Lee, C.C.2
-
6
-
-
84861369956
-
Further improvement of Juang et al.'s password-authenticated key agreement scheme using smart cards
-
D. He, J. Chen, J. Hu. Further improvement of Juang et al.'s password-authenticated key agreement scheme using smart cards. Kuwait Journal of Science & Engineering, 2011, Vol. 38, No. 2A, pp. 55-68.
-
(2011)
Kuwait Journal of Science & Engineering
, vol.38
, Issue.2 A
, pp. 55-68
-
-
He, D.1
Chen, J.2
Hu, J.3
-
7
-
-
84863989374
-
Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol
-
D. He, Y. Chen, J. Chen. Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol. Nonlinear Dynamics, 2012, Vol. 69, No. 3, pp. 1149-1157.
-
(2012)
Nonlinear Dynamics
, vol.69
, Issue.3
, pp. 1149-1157
-
-
He, D.1
Chen, Y.2
Chen, J.3
-
8
-
-
84878978708
-
Improvement on a smart card based password authentication scheme
-
D. He, J. Chen, J. Hu. Improvement on a smart card based password authentication scheme. Journal of Internet Technology, 2012, Vol. 13, No. 3, pp. 405-410.
-
(2012)
Journal of Internet Technology
, vol.13
, Issue.3
, pp. 405-410
-
-
He, D.1
Chen, J.2
Hu, J.3
-
9
-
-
80051571433
-
An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security
-
D. He, J. Chen, J. Hu. An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security. Information Fusion, 2012, Vol. 13, No. 3, pp. 223-230.
-
(2012)
Information Fusion
, vol.13
, Issue.3
, pp. 223-230
-
-
He, D.1
Chen, J.2
Hu, J.3
-
10
-
-
84859767453
-
An efficient remote user authentication and key exchange protocol for mobile client-server environment from pairings
-
D. He. An efficient remote user authentication and key exchange protocol for mobile client-server environment from pairings. Ad Hoc Networks, 2012, Vol. 10, No. 6, pp. 1009-1016.
-
(2012)
Ad Hoc Networks
, vol.10
, Issue.6
, pp. 1009-1016
-
-
He, D.1
-
11
-
-
84864058187
-
A more secure authentication scheme for telecare medicine information systems
-
D. He, J. Chen, R. Zhang. A more secure authentication scheme for telecare medicine information systems. Journal of Medical Systems, 2012, Vol. 36, No. 3, pp. 1989-1995.
-
(2012)
Journal of Medical Systems
, vol.36
, Issue.3
, pp. 1989-1995
-
-
He, D.1
Chen, J.2
Zhang, R.3
-
12
-
-
84863310175
-
Cryptanalysis of an authenticated key agreement protocol for wireless mobile communications
-
D. He. Cryptanalysis of an authenticated key agreement protocol for wireless mobile communications. ETRI Journal, 2012, Vol. 34, No. 3, pp. 482-484.
-
(2012)
ETRI Journal
, vol.34
, Issue.3
, pp. 482-484
-
-
He, D.1
-
13
-
-
54349125537
-
A remote user authentication scheme without using smart cards
-
H. S. Rhee, J. O. Kwon, D. H. Lee. A remote user authentication scheme without using smart cards. Computer Standards & Interfaces, 2009, Vol. 31, No. l, pp. 6-13.
-
(2009)
Computer Standards & Interfaces
, vol.31
, Issue.1
, pp. 6-13
-
-
Rhee, H.S.1
Kwon, J.O.2
Lee, D.H.3
-
16
-
-
84872223681
-
A secure password-based remote user authentication scheme without smart cards
-
B. Chen, W. Kuo, L. Wuu. A secure password-based remote user authentication scheme without smart cards. Information Technology and Control, 2012, Vol. 41, No. 1, pp. 53-59.
-
(2012)
Information Technology and Control
, vol.41
, Issue.1
, pp. 53-59
-
-
Chen, B.1
Kuo, W.2
Wuu, L.3
-
17
-
-
84863056589
-
Robust smart-cards-based user authentication scheme with user anonymity
-
S. Wu, Y. Zhu, Q. Pu. Robust smart-cards-based user authentication scheme with user anonymity. Security and Communication Networks, 2012, Vol. 5, No. 2, pp. 236-248.
-
(2012)
Security and Communication Networks
, vol.5
, Issue.2
, pp. 236-248
-
-
Wu, S.1
Zhu, Y.2
Pu, Q.3
-
18
-
-
68849128250
-
Improvement of the secure dynamic ID based remote user authentication next term scheme for multi-server environment
-
H. C. Hsiang, W. K. Shih. Improvement of the secure dynamic ID based remote user authentication next term scheme for multi-server environment. Computer Standards & Interfaces, 2009, Vol. 31, No. 6, pp. 1118-1123.
-
(2009)
Computer Standards & Interfaces
, vol.31
, Issue.6
, pp. 1118-1123
-
-
Hsiang, H.C.1
Shih, W.K.2
-
19
-
-
84855196010
-
Note on 'Design of improved password authentication and update scheme based on elliptic curve cryptography'
-
D. He, S. Wu, J. Chen. Note on 'Design of improved password authentication and update scheme based on elliptic curve cryptography'. Mathematical and Computer Modelling, 2012, Vol. 55, No. 3-4, pp. 1661-1664.
-
(2012)
Mathematical and Computer Modelling
, vol.55
, Issue.3-4
, pp. 1661-1664
-
-
He, D.1
Wu, S.2
Chen, J.3
-
20
-
-
0025386404
-
A logic of authentication
-
M. Burrows, M. Abadi, R. Needham. A logic of authentication. ACM Transactions on Computer Systems, 1990, Vol. 8, No. 1, pp. 18-36.
-
(1990)
ACM Transactions On Computer Systems
, vol.8
, Issue.1
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
|