-
1
-
-
0019634370
-
Password authentication with insecure communication
-
DOI 10.1145/358790.358797
-
Lamport L., Password authentication with insecure communication. Communications of the ACM 1981 24 11 770 772 2-s2.0-0019634370 10.1145/358790.358797 (Pubitemid 12462508)
-
(1981)
Communications of the ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport Leslie1
-
2
-
-
1542647564
-
A remote user authentication scheme using smart cards with forward secrecy
-
2-s2.0-1542647564 10.1109/TCE.2003.1261225
-
Awasthi A. K., Lal S., A remote user authentication scheme using smart cards with forward secrecy. IEEE Transactions on Consumer Electronics 2003 49 4 1246 1248 2-s2.0-1542647564 10.1109/TCE.2003.1261225
-
(2003)
IEEE Transactions on Consumer Electronics
, vol.49
, Issue.4
, pp. 1246-1248
-
-
Awasthi, A.K.1
Lal, S.2
-
3
-
-
4043089982
-
An enhanced remote user authentication scheme using smart cards
-
2-s2.0-4043089982 10.1109/TCE.2004.1309430
-
Awasthi A. K., Lal S., An enhanced remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics 2004 50 2 583 586 2-s2.0-4043089982 10.1109/TCE.2004.1309430
-
(2004)
IEEE Transactions on Consumer Electronics
, vol.50
, Issue.2
, pp. 583-586
-
-
Awasthi, A.K.1
Lal, S.2
-
4
-
-
0000112683
-
Elliptic curve cryptosystems
-
10.2307/2007884 MR866109 ZBL0622.94015
-
Koblitz N., Elliptic curve cryptosystems. Mathematics of Computation 1987 48 177 203 209 10.2307/2007884 MR866109 ZBL0622.94015
-
(1987)
Mathematics of Computation
, vol.48
, Issue.177
, pp. 203-209
-
-
Koblitz, N.1
-
5
-
-
12544254099
-
Security analysis and improvement of the efficient password-based authentication protocol
-
DOI 10.1109/LCOMM.2005.01032
-
Kwon T., Park Y. H., Lee H. J., Security analysis and improvement of the efficient password-based authentication protocol. IEEE Communications Letters 2005 9 1 93 95 2-s2.0-12544254099 10.1109/LCOMM.2005.01032 (Pubitemid 40152132)
-
(2005)
IEEE Communications Letters
, vol.9
, Issue.1
, pp. 93-95
-
-
Kwon, T.1
Park, Y.H.2
Lee, H.J.3
-
6
-
-
0017930809
-
Method for obtaining digital signatures and public-key cryptosystems
-
DOI 10.1145/359340.359342
-
Rivest R. L., Shamir A., Adleman L., A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 1978 21 2 120 126 10.1145/359340.359342 MR700103 ZBL0368.94005 (Pubitemid 8591219)
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
7
-
-
84872151913
-
Password authentication based on fractal coding scheme
-
340861 10.1155/2012/340861
-
Al-Saidi N. M., Said M. R. M., Othman W. A. M., Password authentication based on fractal coding scheme. Journal of Applied Mathematics 2012 2012 16 340861 10.1155/2012/340861
-
(2012)
Journal of Applied Mathematics
, vol.2012
, pp. 16
-
-
Al-Saidi, N.M.1
Said, M.R.M.2
Othman, W.A.M.3
-
8
-
-
84863637154
-
A security-performance-balanced user authentication scheme for wireless sensor networks
-
382810 10.1155/2012/382810
-
Yoo S. G., Park K. Y., Kim J., A security-performance-balanced user authentication scheme for wireless sensor networks. International Journal of Distributed Sensor Networks 2012 2012 11 382810 10.1155/2012/382810
-
(2012)
International Journal of Distributed Sensor Networks
, vol.2012
, pp. 11
-
-
Yoo, S.G.1
Park, K.Y.2
Kim, J.3
-
10
-
-
84877260877
-
An efficient key-policy attribute-based encryption scheme with constant ciphertext length
-
10.1155/2013/810969 810969
-
Wang C., Luo J., An efficient key-policy attribute-based encryption scheme with constant ciphertext length. Mathematical Problems in Engineering 2013 2013 7 10.1155/2013/810969 810969
-
(2013)
Mathematical Problems in Engineering
, vol.2013
, pp. 7
-
-
Wang, C.1
Luo, J.2
-
11
-
-
84944291851
-
Overview of the GSM system and protocol architecture
-
Rahnema M., Overview of the GSM system and protocol architecture. IEEE Communications Magazine 1993 31 4 92 100
-
(1993)
IEEE Communications Magazine
, vol.31
, Issue.4
, pp. 92-100
-
-
Rahnema, M.1
-
13
-
-
77951274055
-
Identity-based authenticated key agreement protocols without bilinear pairings
-
2-s2.0-77951274055 10.1093/ietfec/e91-a.12.3833
-
Cao X., Kou W., Yu Y., Sun R., Identity-based authenticated key agreement protocols without bilinear pairings. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences 2008 91 12 3833 3836 2-s2.0-77951274055 10.1093/ietfec/e91-a.12.3833
-
(2008)
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
, vol.91
, Issue.12
, pp. 3833-3836
-
-
Cao, X.1
Kou, W.2
Yu, Y.3
Sun, R.4
-
14
-
-
74549221711
-
An efficient protocol for authenticated key agreement
-
MR1962800 ZBL1016.94025 2-s2.0-0037343565 10.1023/A:1022595222606
-
Law L., Menezes A., Qu M., Solinas J., Vanstone S., An efficient protocol for authenticated key agreement. Designs, Codes, and Cryptography 2003 28 2 119 134 MR1962800 ZBL1016.94025 2-s2.0-0037343565 10.1023/A:1022595222606
-
(2003)
Designs, Codes, and Cryptography
, vol.28
, Issue.2
, pp. 119-134
-
-
Law, L.1
Menezes, A.2
Qu, M.3
Solinas, J.4
Vanstone, S.5
-
15
-
-
84876518744
-
Unsupervised user similarity mining in gsm sensor networks
-
10.1155/2013/589610 589610
-
Chen E., Unsupervised user similarity mining in gsm sensor networks. The Scientific World Journal 2013 2013 11 10.1155/2013/589610 589610
-
(2013)
The Scientific World Journal
, vol.2013
, pp. 11
-
-
Chen, E.1
-
16
-
-
84871369625
-
Fluorescence, decay time, and structural change of laser dye cresyl violet in solution due to microwave irradiation at gsm 900/1800 mobile phone frequencies
-
10.1155/2012/965426 965426
-
Bayrakceken F., Yegin K., Fluorescence, decay time, and structural change of laser dye cresyl violet in solution due to microwave irradiation at gsm 900/1800 mobile phone frequencies. International Journal of Photoenergy 2012 2012 4 10.1155/2012/965426 965426
-
(2012)
International Journal of Photoenergy
, vol.2012
, pp. 4
-
-
Bayrakceken, F.1
Yegin, K.2
-
17
-
-
24144458508
-
A new two-party identity-based authenticated key agreement
-
Topics in Cryptology - CT-RSA 2005 - The Cryptographers' Track at the RSA Conference 2005
-
McCullagh N., Barreto P. S. L. M., A new two-party identity-based authenticated key agreement. Topics in Cryptology-CT-RSA 2005 2005 3376 Berlin, Germany Springer 262 274 10.1007/978-3-540-30574-3-18 MR2174382 ZBL1079.94563 (Pubitemid 41231216)
-
(2005)
Lecture Notes in Computer Science
, vol.3376
, pp. 262-274
-
-
McCullagh, N.1
Barreto, P.S.L.M.2
-
20
-
-
0033332268
-
Secure communication mechanisms for GSM networks
-
DOI 10.1109/30.809184
-
Lo C.-C., Chen Y.-J., Secure communication mechanisms for GSM networks. IEEE Transactions on Consumer Electronics 1999 45 4 1074 1080 2-s2.0-0033332268 10.1109/30.809184 (Pubitemid 30561606)
-
(1999)
IEEE Transactions on Consumer Electronics
, vol.45
, Issue.4
, pp. 1074-1080
-
-
Lo, C.-C.1
Chen, Y.-J.2
-
21
-
-
79959194506
-
A security scheme for dependable key insertion in mobile embedded devices
-
2-s2.0-79959194506 10.1155/2011/820454 820454
-
Klimm A., Glas B., Wachs M., Vogel S., Müller-Glaser K. D., Becker J., A security scheme for dependable key insertion in mobile embedded devices. International Journal of Reconfigurable Computing 2011 2011 19 2-s2.0-79959194506 10.1155/2011/820454 820454
-
(2011)
International Journal of Reconfigurable Computing
, vol.2011
, pp. 19
-
-
Klimm, A.1
Glas, B.2
Wachs, M.3
Vogel, S.4
Müller-Glaser, K.D.5
Becker, J.6
-
22
-
-
80052674106
-
BVS: A lightweight forward and backward secure scheme for PMU communications in smart grid
-
2-s2.0-80052674106 10.1155/2011/382147 382147
-
Ren W., Song J., Lei M., Ren Y., BVS: a lightweight forward and backward secure scheme for PMU communications in smart grid. International Journal of Digital Multimedia Broadcasting 2011 2011 9 2-s2.0-80052674106 10.1155/2011/382147 382147
-
(2011)
International Journal of Digital Multimedia Broadcasting
, vol.2011
, pp. 9
-
-
Ren, W.1
Song, J.2
Lei, M.3
Ren, Y.4
-
23
-
-
84856812293
-
Revisiting sum of residues modular multiplication
-
2-s2.0-84856812293 10.1155/2010/657076 657076 MR2738316 ZBL1229.94046
-
Kong Y., Phillips B., Revisiting sum of residues modular multiplication. Journal of Electrical and Computer Engineering 2010 2010 9 2-s2.0-84856812293 10.1155/2010/657076 657076 MR2738316 ZBL1229.94046
-
(2010)
Journal of Electrical and Computer Engineering
, vol.2010
, pp. 9
-
-
Kong, Y.1
Phillips, B.2
-
24
-
-
84863699190
-
Authentication and integrity in the smart grid: An empirical study in substation automation systems
-
10.1155/2012/175262 175262
-
Lu X., Wang W., Ma J., Authentication and integrity in the smart grid: an empirical study in substation automation systems. International Journal of Distributed Sensor Networks 2012 2012 13 10.1155/2012/175262 175262
-
(2012)
International Journal of Distributed Sensor Networks
, vol.2012
, pp. 13
-
-
Lu, X.1
Wang, W.2
Ma, J.3
-
25
-
-
84880141803
-
-
Certicom Research: Standard for efficient cryptography - SEC 1: Elliptic curve cryptography, 2000
-
Certicom Research: Standard for efficient cryptography-SEC 1: Elliptic curve cryptography, 2000, http://www.secg.org/
-
-
-
-
27
-
-
84877308219
-
A new user authentication protocol for wireless sensor networks using elliptic curves cryptography
-
730831 10.1155/2013/730831
-
Shi W., Gong P., A new user authentication protocol for wireless sensor networks using elliptic curves cryptography. International Journal of Distributed Sensor Networks 2013 2013 7 730831 10.1155/2013/730831
-
(2013)
International Journal of Distributed Sensor Networks
, vol.2013
, pp. 7
-
-
Shi, W.1
Gong, P.2
-
28
-
-
79952847670
-
Adaptable security in wireless sensor networks by using reconfigurable ECC hardware coprocessors
-
2-s2.0-79952847670 10.1155/2010/740823 740823
-
Portilla J., Otero A., de la Torre E., Riesgo T., Stecklina O., Peter S., Langendörfer P., Adaptable security in wireless sensor networks by using reconfigurable ECC hardware coprocessors. International Journal of Distributed Sensor Networks 2011 2011 12 2-s2.0-79952847670 10.1155/2010/740823 740823
-
(2011)
International Journal of Distributed Sensor Networks
, vol.2011
, pp. 12
-
-
Portilla, J.1
Otero, A.2
De La Torre, E.3
Riesgo, T.4
Stecklina, O.5
Peter, S.6
Langendörfer, P.7
-
29
-
-
84880141347
-
-
NIST Special Publication 800-56: recommendation on key establishment schemes, Draft 2.0, 2003
-
National Institute of Standards and Technology,. NIST Special Publication 800-56: recommendation on key establishment schemes, Draft 2.0, 2003, http://csrc.nist.gov/groups/ST/toolkit/index.html
-
-
-
-
31
-
-
78049296439
-
A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges
-
MR2653321 ZBL1193.94069 2-s2.0-78049296439 10.1016/j.ins.2010.04.002
-
Cao X., Kou W., Du X., A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges. Information Sciences 2010 180 15 2895 2903 MR2653321 ZBL1193.94069 2-s2.0-78049296439 10.1016/j.ins.2010.04. 002
-
(2010)
Information Sciences
, vol.180
, Issue.15
, pp. 2895-2903
-
-
Cao, X.1
Kou, W.2
Du, X.3
-
33
-
-
0022811943
-
Proposal for identity-based key distribution systems
-
Okamoto E., Proposal for identity-based key distribution systems. Electronics Letters 1986 22 24 1283 1284 2-s2.0-0022811943 (Pubitemid 17525449)
-
(1986)
Electronics Letters
, vol.22
, Issue.24
, pp. 1283-1284
-
-
Okamoto, E.1
-
34
-
-
0038680685
-
Efficient ID-based authenticated key agreement protocol based on Weil pairing
-
2-s2.0-0038680685 10.1049/el:20030448
-
Shim K., Efficient ID-based authenticated key agreement protocol based on Weil pairing. Electronics Letters 2003 39 8 653 654 2-s2.0-0038680685 10.1049/el:20030448
-
(2003)
Electronics Letters
, vol.39
, Issue.8
, pp. 653-654
-
-
Shim, K.1
-
35
-
-
0037142442
-
Identity-based authenticated key agreement protocol based on Weil pairing
-
DOI 10.1049/el:20020387
-
Smart N. P., Identity-based authenticated key agreement protocol based on Weil pairing. Electronics Letters 2002 38 13 630 632 2-s2.0-0037142442 10.1049/el:20020387 (Pubitemid 34725603)
-
(2002)
Electronics Letters
, vol.38
, Issue.13
, pp. 630-632
-
-
Smart, N.P.1
-
36
-
-
34347390578
-
Key distribution system for mail systems using ID-related information directory
-
2-s2.0-34347390578
-
Tanaka K., Okamoto E., Key distribution system for mail systems using ID-related information directory. Computers and Security 1991 10 1 25 33 2-s2.0-34347390578
-
(1991)
Computers and Security
, vol.10
, Issue.1
, pp. 25-33
-
-
Tanaka, K.1
Okamoto, E.2
-
38
-
-
33748173666
-
Revisit of mccullagh-barreto two-party id-based authenticated key agreement protocols
-
Choo K., Revisit of mccullagh-barreto two-party id-based authenticated key agreement protocols. International Journal of Network Security 2005 1 3 154 160
-
(2005)
International Journal of Network Security
, vol.1
, Issue.3
, pp. 154-160
-
-
Choo, K.1
-
39
-
-
77952742569
-
An improved key agreement protocol based on chaos
-
MR2652676 ZBL1222.94039 2-s2.0-77952742569 10.1016/j.cnsns.2010.02.014
-
Wang X., Zhao J., An improved key agreement protocol based on chaos. Communications in Nonlinear Science and Numerical Simulation 2010 15 12 4052 4057 MR2652676 ZBL1222.94039 2-s2.0-77952742569 10.1016/j.cnsns.2010.02.014
-
(2010)
Communications in Nonlinear Science and Numerical Simulation
, vol.15
, Issue.12
, pp. 4052-4057
-
-
Wang, X.1
Zhao, J.2
-
40
-
-
33751227507
-
A novel key agreement protocol based on chaotic maps
-
DOI 10.1016/j.ins.2006.07.026, PII S0020025506002246
-
Xiao D., Liao X., Deng S., A novel key agreement protocol based on chaotic maps. Information Sciences 2007 177 4 1136 1142 MR2288747 2-s2.0-33751227507 10.1016/j.ins.2006.07.026 (Pubitemid 44791324)
-
(2007)
Information Sciences
, vol.177
, Issue.4
, pp. 1136-1142
-
-
Xiao, D.1
Liao, X.2
Deng, S.3
-
41
-
-
43049150816
-
Security of a key agreement protocol based on chaotic maps
-
DOI 10.1016/j.chaos.2007.01.017, PII S0960077907000343
-
Han S., Security of a key agreement protocol based on chaotic maps. Chaos, Solitons and Fractals 2008 38 3 764 768 MR2423362 ZBL1146.94304 2-s2.0-43049150816 10.1016/j.chaos.2007.01.017 (Pubitemid 351633025)
-
(2008)
Chaos, Solitons and Fractals
, vol.38
, Issue.3
, pp. 764-768
-
-
Han, S.1
-
43
-
-
62949175202
-
Chaotic map based key agreement with/out clock synchronization
-
MR2512932 ZBL1197.94190 2-s2.0-62949175202 10.1016/j.chaos.2007.06.030
-
Han S., Chang E., Chaotic map based key agreement with/out clock synchronization. Chaos, Solitons and Fractals 2009 39 3 1283 1289 MR2512932 ZBL1197.94190 2-s2.0-62949175202 10.1016/j.chaos.2007.06.030
-
(2009)
Chaos, Solitons and Fractals
, vol.39
, Issue.3
, pp. 1283-1289
-
-
Han, S.1
Chang, E.2
-
44
-
-
78650310667
-
Cryptanalysis on a parallel keyed hash function based on chaotic neural network
-
2-s2.0-78650310667 10.1016/j.neucom.2010.05.011
-
Wang X.-Y., Zhao J.-F., Cryptanalysis on a parallel keyed hash function based on chaotic neural network. Neurocomputing 2010 73 16-18 3224 3228 2-s2.0-78650310667 10.1016/j.neucom.2010.05.011
-
(2010)
Neurocomputing
, vol.73
, Issue.16-18
, pp. 3224-3228
-
-
Wang, X.-Y.1
Zhao, J.-F.2
-
45
-
-
23144460039
-
Security of public-key cryptosystems based on Chebyshev polynomials
-
DOI 10.1109/TCSI.2005.851701
-
Bergamo P., D'Arco P., de Santis A., Kocarev L., Security of public-key cryptosystems based on Chebyshev polynomials. IEEE Transactions on Circuits and Systems I 2005 52 7 1382 1393 MR2167459 2-s2.0-23144460039 10.1109/TCSI.2005. 851701 (Pubitemid 41078438)
-
(2005)
IEEE Transactions on Circuits and Systems I: Regular Papers
, vol.52
, Issue.7
, pp. 1382-1393
-
-
Bergamo, P.1
D'Arco, P.2
De Santis, A.3
Kocarev, L.4
-
46
-
-
78049382801
-
An anonymous key agreement protocol based on chaotic maps
-
MR2736063 ZBL1221.94057 2-s2.0-78049382801 10.1016/j.cnsns.2010.08.015
-
Niu Y., Wang X., An anonymous key agreement protocol based on chaotic maps. Communications in Nonlinear Science and Numerical Simulation 2011 16 4 1986 1992 MR2736063 ZBL1221.94057 2-s2.0-78049382801 10.1016/j.cnsns.2010.08.015
-
(2011)
Communications in Nonlinear Science and Numerical Simulation
, vol.16
, Issue.4
, pp. 1986-1992
-
-
Niu, Y.1
Wang, X.2
-
48
-
-
84867684250
-
White-light interferometric method for secure key distribution
-
2-s2.0-77958067572 10.1007/s11227-010-0488-x
-
Haist T., Osten W., White-light interferometric method for secure key distribution. The Journal of Supercomputing 2012 62 2 656 662 2-s2.0-77958067572 10.1007/s11227-010-0488-x
-
(2012)
The Journal of Supercomputing
, vol.62
, Issue.2
, pp. 656-662
-
-
Haist, T.1
Osten, W.2
-
49
-
-
84875267060
-
A scalable server for key distribution and its application to accounting
-
Álvarez-Bermejo J., Antequera N., García-Rubio R., López-Ramos J., A scalable server for key distribution and its application to accounting. The Journal of Supercomputing 2013 64 1 132 143
-
(2013)
The Journal of Supercomputing
, vol.64
, Issue.1
, pp. 132-143
-
-
Álvarez-Bermejo, J.1
Antequera, N.2
García-Rubio, R.3
López-Ramos, J.4
-
50
-
-
84880150887
-
-
Wi-Fi Direct, 2012
-
Wikipedia,. Wi-Fi Direct, 2012, http://en.wikipedia.org/wiki/Wi-Fi- Direct/
-
-
-
Wikipedia1
-
51
-
-
84880173013
-
-
Bluetooth specification, 2012
-
Bluetooth S.,. Bluetooth specification, 2012, http://www.Bluetooth.com/
-
-
-
Bluetooth, S.1
-
52
-
-
0035668782
-
An overview of the Bluetooth wireless technology
-
DOI 10.1109/35.968817
-
Bisdikian C., An overview of the Bluetooth wireless technology. IEEE Communications Magazine 2001 39 12 86 94 2-s2.0-0035668782 10.1109/35.968817 (Pubitemid 34022248)
-
(2001)
IEEE Communications Magazine
, vol.39
, Issue.12
, pp. 86-94
-
-
Bisdikian, C.1
|