메뉴 건너뛰기




Volumn 7, Issue 1, 2013, Pages 48-55

Three-factor control protocol based on elliptic curve cryptosystem for universal serial bus mass storage devices

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION PROTOCOLS; COMMERCIAL ESTABLISHMENTS; COMPUTATIONAL COSTS; ELLIPTIC CURVE CRYPTOSYSTEM; INTERFACE STANDARDS; MASS STORAGE DEVICES; MUTUAL AUTHENTICATION; UNIVERSAL SERIAL BUS;

EID: 84880677476     PISSN: 17518601     EISSN: None     Source Type: Journal    
DOI: 10.1049/iet-cdt.2012.0073     Document Type: Article
Times cited : (76)

References (31)
  • 3
    • 84880670868 scopus 로고    scopus 로고
    • Endpoint security: managing USB-based removable devices with the advent of portable applications
    • Fabian, M.: 'Endpoint security: managing USB-based removable devices with the advent of portable applications'. Proc. 4th Annual Conf. Information Security Curriculum Development, 2007, pp. 28-32
    • (2007) Proc. 4th Annual Conf. Information Security Curriculum Development , pp. 28-32
    • Fabian, M.1
  • 5
    • 57649098365 scopus 로고    scopus 로고
    • ID-based authentication scheme combined with identity based encryption with fingerprint hashing
    • Jiang, W.Q., Huang, Z.Q., Yang, Y.X., Tian, J., Li, L.: 'ID-based authentication scheme combined with identity based encryption with fingerprint hashing', J. China Univ. Posts and Telecommun., 2008, 15, (4), pp. 75-80
    • (2008) J. China Univ. Posts and Telecommun. , vol.15 , Issue.4 , pp. 75-80
    • Jiang, W.Q.1    Huang, Z.Q.2    Yang, Y.X.3    Tian, J.4    Li, L.5
  • 6
    • 1542335451 scopus 로고    scopus 로고
    • Efficient password authenticated key agreement using smart cards
    • Juang, W.S.: 'Efficient password authenticated key agreement using smart cards', Comput. Secur., 2004, 23, (1), pp. 167-173
    • (2004) Comput. Secur. , vol.23 , Issue.1 , pp. 167-173
    • Juang, W.S.1
  • 7
    • 4043139259 scopus 로고    scopus 로고
    • A flexible biometrics remote user authentication scheme
    • Lin, C.H., Lai, Y.Y.: 'A flexible biometrics remote user authentication scheme', Comput. Stand. Interf., 2004, 27, (1), pp. 19-23
    • (2004) Comput. Stand. Interf. , vol.27 , Issue.1 , pp. 19-23
    • Lin, C.H.1    Lai, Y.Y.2
  • 8
    • 26844511307 scopus 로고    scopus 로고
    • An enhanced user authentication scheme for multi-server internet services
    • Tsaur, W.J., Wu, C.C., Lee, W.B.: 'An enhanced user authentication scheme for multi-server internet services', Math. Comput., 2005, 170, (1), pp. 258-266
    • (2005) Math. Comput. , vol.170 , Issue.1 , pp. 258-266
    • Tsaur, W.J.1    Wu, C.C.2    Lee, W.B.3
  • 9
    • 78651401376 scopus 로고    scopus 로고
    • A secure control protocol for USB mass storage devices
    • Yang, F.Y., Wu, T.D., Chiu, S.H.: 'A secure control protocol for USB mass storage devices', IEEE Trans. Consum. Electron., 2010, 56, (4), pp. 2339-2343
    • (2010) IEEE Trans. Consum. Electron. , vol.56 , Issue.4 , pp. 2339-2343
    • Yang, F.Y.1    Wu, T.D.2    Chiu, S.H.3
  • 10
    • 52949137008 scopus 로고    scopus 로고
    • Two-factor mutual authentication based on smart cards and passwords
    • Yang, G., Wong, D.S., Wang, H., Deng, X.: 'Two-factor mutual authentication based on smart cards and passwords', J. Comput. Syst. Sci., 2008, 74, (7), pp. 1160-1172
    • (2008) J. Comput. Syst. Sci. , vol.74 , Issue.7 , pp. 1160-1172
    • Yang, G.1    Wong, D.S.2    Wang, H.3    Deng, X.4
  • 11
    • 79955378910 scopus 로고    scopus 로고
    • Remote mutual authentication and key agreement scheme based on elliptic curve cryptosystem
    • Yoon, E.J.: 'Remote mutual authentication and key agreement scheme based on elliptic curve cryptosystem', Turk. J. Electr. Engng. Comput. Sci., 2011, 19, (3), pp. 335-347
    • (2011) Turk. J. Electr. Engng. Comput. Sci. , vol.19 , Issue.3 , pp. 335-347
    • Yoon, E.J.1
  • 12
    • 64249125305 scopus 로고    scopus 로고
    • An improved smart card based password authentication scheme with provable security
    • Jing, X., Zhu, W.T., Feng, D.G.: 'An improved smart card based password authentication scheme with provable security', Comput. Stand. Interf., 2009, 31, (4), pp. 723-728
    • (2009) Comput. Stand. Interf. , vol.31 , Issue.4 , pp. 723-728
    • Jing, X.1    Zhu, W.T.2    Feng, D.G.3
  • 14
    • 70350569787 scopus 로고    scopus 로고
    • Biometric keys: suitable use cases and achievable information content
    • Plaga, R.: 'Biometric keys: suitable use cases and achievable information content', Int. J. Inf. Secur., 2009, 8, (6), pp. 447-454
    • (2009) Int. J. Inf. Secur. , vol.8 , Issue.6 , pp. 447-454
    • Plaga, R.1
  • 15
    • 51349085440 scopus 로고    scopus 로고
    • Improvement of a fingerprint-based remote user authentication scheme
    • Jing, X., Zhu, W.T., Feng, D.G.: 'Improvement of a fingerprint-based remote user authentication scheme', Int. J. Secur., 2008, 2, (3), pp. 87-92
    • (2008) Int. J. Secur. , vol.2 , Issue.3 , pp. 87-92
    • Jing, X.1    Zhu, W.T.2    Feng, D.G.3
  • 16
    • 79959364857 scopus 로고    scopus 로고
    • A note on type II error under random effects misspecification in generalized linear mixed models
    • Neuhaus, J.M., McCulloch, C.E., Boylan, R.: 'A note on type II error under random effects misspecification in generalized linear mixed models', Biometrics, 2011, 67, (2), pp. 654-656
    • (2011) Biometrics , vol.67 , Issue.2 , pp. 654-656
    • Neuhaus, J.M.1    McCulloch, C.E.2    Boylan, R.3
  • 17
    • 0742302033 scopus 로고    scopus 로고
    • Fundamentals of biometric authentication technologies
    • Wayman, J.L.: 'Fundamentals of biometric authentication technologies', Int. J. Image Graph., 2001, 1, (1), pp. 93-113
    • (2001) Int. J. Image Graph. , vol.1 , Issue.1 , pp. 93-113
    • Wayman, J.L.1
  • 20
    • 85070661605 scopus 로고    scopus 로고
    • The advantages of elliptic curve cryptography for wireless security
    • Lauter, K.: 'The advantages of elliptic curve cryptography for wireless security', IEEE Wirel. Commun. Mag., 2004, 4, (20), pp. 1536-1284
    • (2004) IEEE Wirel. Commun. Mag. , vol.4 , Issue.20 , pp. 1536-1284
    • Lauter, K.1
  • 23
    • 0017018484 scopus 로고
    • New directions in cryptography
    • Diffie, W., Hellman, M.E.: 'New directions in cryptography', IEEE Trans. Inf. Theor., 1976, 22, (6), pp. 644-654
    • (1976) IEEE Trans. Inf. Theor. , vol.22 , Issue.6 , pp. 644-654
    • Diffie, W.1    Hellman, M.E.2
  • 24
    • 84968503742 scopus 로고
    • Elliptic curve cryptosystems
    • Koblitz, K.: 'Elliptic curve cryptosystems', Math. Comput., 1987, 48, (177), pp. 203-209
    • (1987) Math. Comput. , vol.48 , Issue.177 , pp. 203-209
    • Koblitz, K.1
  • 25
    • 0037030525 scopus 로고    scopus 로고
    • Fingerprint-based remote user authentication scheme using smart cards
    • Lee, J.K., Ryu, S.R., Yoo, K.Y.: 'Fingerprint-based remote user authentication scheme using smart cards', Electr. Lett., 2002, 38, (12), pp. 554-555
    • (2002) Electr. Lett. , vol.38 , Issue.12 , pp. 554-555
    • Lee, J.K.1    Ryu, S.R.2    Yoo, K.Y.3
  • 26
    • 23344449693 scopus 로고    scopus 로고
    • ID-based password authentication scheme using smart cards and fingerprints
    • Kim, H.S., Lee, J.K., Yoo, K.Y.: 'ID-based password authentication scheme using smart cards and fingerprints', ACM Oper. Syst. Rev., 2003, 37, (4), pp. 32-41
    • (2003) ACM Oper. Syst. Rev. , vol.37 , Issue.4 , pp. 32-41
    • Kim, H.S.1    Lee, J.K.2    Yoo, K.Y.3
  • 27
    • 33645758252 scopus 로고    scopus 로고
    • Cryptanalysis of an id-based password authentication scheme using smart cards and fingerprints
    • Scott, M.: 'Cryptanalysis of an id-based password authentication scheme using smart cards and fingerprints', ACM Oper. Syst. Rev., 2004, 38, (2), pp. 73-75
    • (2004) ACM Oper. Syst. Rev. , vol.38 , Issue.2 , pp. 73-75
    • Scott, M.1
  • 30
    • 70450285606 scopus 로고    scopus 로고
    • Provably secure remote truly three-factor authentication scheme with privacy protection on biometrics
    • Fan, C.I., Lin, Y.H.: 'Provably secure remote truly three-factor authentication scheme with privacy protection on biometrics', IEEE Trans. Inf. Foren. Secur., 2009, 4, (4), pp. 933-945
    • (2009) IEEE Trans. Inf. Foren. Secur. , vol.4 , Issue.4 , pp. 933-945
    • Fan, C.I.1    Lin, Y.H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.