-
1
-
-
80053053849
-
A novel lightweight authentication scheme with anonymity for roaming service in global mobility networks
-
Wu S, Zhu Y, Pu Q,. A novel lightweight authentication scheme with anonymity for roaming service in global mobility networks. International Journal of Network Management 2011; 21 (5): 384-401.
-
(2011)
International Journal of Network Management
, vol.21
, Issue.5
, pp. 384-401
-
-
Wu, S.1
Zhu, Y.2
Pu, Q.3
-
2
-
-
79952059658
-
Lightweight and provably secure user authentication with anonymity for the global mobility network
-
Chen C, He D, Chan S, Bu J, Gao Y, Fan R,. Lightweight and provably secure user authentication with anonymity for the global mobility network. International Journal of Communication Systems 2011; 24 (3): 347-362.
-
(2011)
International Journal of Communication Systems
, vol.24
, Issue.3
, pp. 347-362
-
-
Chen, C.1
He, D.2
Chan, S.3
Bu, J.4
Gao, Y.5
Fan, R.6
-
3
-
-
79955485356
-
User perceptions of security and usability of single-factor and two-factor authentication in automated telephone banking
-
Gunson N, Marshall D, Morton H, Jack M,. User perceptions of security and usability of single-factor and two-factor authentication in automated telephone banking. Computers and Security 2011; 30 (4): 208-220.
-
(2011)
Computers and Security
, vol.30
, Issue.4
, pp. 208-220
-
-
Gunson, N.1
Marshall, D.2
Morton, H.3
Jack, M.4
-
4
-
-
0019634370
-
Password authentication with insecure communication
-
Lamport L,. Password authentication with insecure communication. Communications of the ACM 1981; 24 (11): 770p-772.
-
(1981)
Communications of the ACM
, vol.24
, Issue.11
-
-
Lamport, L.1
-
6
-
-
28044451335
-
Robust remote authentication scheme with smart cards
-
Fan CI, Chan YC, Zhang CK,. Robust remote authentication scheme with smart cards. Computers and Security 2005; 24 (8): 619-628.
-
(2005)
Computers and Security
, vol.24
, Issue.8
, pp. 619-628
-
-
Fan, C.I.1
Chan, Y.C.2
Zhang, C.K.3
-
7
-
-
84865219379
-
Exploiting hash functions to intensify the remote user authentication scheme
-
Hsieh WB, Leu JS,. Exploiting hash functions to intensify the remote user authentication scheme. Computers and Security 2012; 31 (6): 791-798.
-
(2012)
Computers and Security
, vol.31
, Issue.6
, pp. 791-798
-
-
Hsieh, W.B.1
Leu, J.S.2
-
8
-
-
0033350090
-
Password authentication schemes with smart cards
-
Yang WH, Shieh SP,. Password authentication schemes with smart cards. Computers and Security 1999; 18 (8): 727-733.
-
(1999)
Computers and Security
, vol.18
, Issue.8
, pp. 727-733
-
-
Yang, W.H.1
Shieh, S.P.2
-
9
-
-
80051791613
-
Unconstrained keystroke dynamics authentication with shared secret
-
Giot R, El-Abed M, Hemery B, Rosenberger C,. Unconstrained keystroke dynamics authentication with shared secret. Computers and Security 2011; 30 (6-7): 427-445.
-
(2011)
Computers and Security
, vol.30
, Issue.67
, pp. 427-445
-
-
Giot, R.1
El-Abed, M.2
Hemery, B.3
Rosenberger, C.4
-
10
-
-
0037030525
-
Fingerprint-based remote user authentication scheme using smart cards
-
Lee JK, Ryu SR, Yoo KY,. Fingerprint-based remote user authentication scheme using smart cards. IEEE Electronics Letters 2002; 38 (12): 554-555.
-
(2002)
IEEE Electronics Letters
, vol.38
, Issue.12
, pp. 554-555
-
-
Lee, J.K.1
Ryu, S.R.2
Yoo, K.Y.3
-
11
-
-
4043139259
-
A flexible biometrics remote user authentication scheme
-
Lin CH, Lai YY,. A flexible biometrics remote user authentication scheme. Computer Standards and Interfaces 2004; 27 (1): 19-23.
-
(2004)
Computer Standards and Interfaces
, vol.27
, Issue.1
, pp. 19-23
-
-
Lin, C.H.1
Lai, Y.Y.2
-
12
-
-
33751167604
-
Improving the security of a flexible biometrics remote user authentication scheme
-
Khan MK, Zhang J,. Improving the security of a flexible biometrics remote user authentication scheme. Computer Standards and Interfaces 2007; 29 (1): 82-85.
-
(2007)
Computer Standards and Interfaces
, vol.29
, Issue.1
, pp. 82-85
-
-
Khan, M.K.1
Zhang, J.2
-
14
-
-
63049116480
-
An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem
-
Yang JH, Chang CC,. An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. Computers and Security 2009; 28 (3-4): 138-143.
-
(2009)
Computers and Security
, vol.28
, Issue.34
, pp. 138-143
-
-
Yang, J.H.1
Chang, C.C.2
-
16
-
-
0000112683
-
Elliptic curve cryptosystem
-
Koblitz N., Elliptic curve cryptosystem. Mathematics of Computation 1987; 48: 203-209.
-
(1987)
Mathematics of Computation
, vol.48
, pp. 203-209
-
-
Koblitz, N.1
-
18
-
-
11244267013
-
-
LNCS, Springer: New York, USA.
-
Hankerson D, Menezes A, Vanstone S,. Guide to Elliptic Curve Cryptography. LNCS, Springer: New York, USA, 2004.
-
(2004)
Guide to Elliptic Curve Cryptography
-
-
Hankerson, D.1
Menezes, A.2
Vanstone, S.3
-
20
-
-
78650630535
-
A novel key agreement protocol based on bilinear pairing
-
Zhang WJ, Han YH, Liu LL,. A novel key agreement protocol based on bilinear pairing. In 3rd International Conference on Biomedical Engineering and Informatics (BMEI), Vol. 7, 2010; 2717-2720.
-
(2010)
3rd International Conference on Biomedical Engineering and Informatics (BMEI)
, vol.7
, pp. 2717-2720
-
-
Zhang, W.J.1
Han, Y.H.2
Liu, L.L.3
-
21
-
-
77649261628
-
-
PhD thesis, Stanford University, 2009 [9 May ]
-
Gentry C,. A fully homomorphic encryption scheme. PhD thesis, Stanford University, 2009. Available: http://crypto.stanford.edu/craig [9 May 2013 ].
-
(2013)
A Fully Homomorphic Encryption Scheme
-
-
Gentry, C.1
-
23
-
-
82955235553
-
An efficient and secure mobile payment protocol for restricted connectivity scenarios in vehicular ad hoc network
-
Li W, Wen Q, Su Q, Jin Z,. An efficient and secure mobile payment protocol for restricted connectivity scenarios in vehicular ad hoc network. Computer Communications 2012; 35 (2): 188-195.
-
(2012)
Computer Communications
, vol.35
, Issue.2
, pp. 188-195
-
-
Li, W.1
Wen, Q.2
Su, Q.3
Jin, Z.4
-
24
-
-
34548129922
-
ID-based digital signature scheme on the elliptic curve cryptosystem
-
Chung YF, Huang KH, Lai F, Chen TS,. ID-based digital signature scheme on the elliptic curve cryptosystem. Computer Standards and Interfaces 2007; 29 (6): 601-604.
-
(2007)
Computer Standards and Interfaces
, vol.29
, Issue.6
, pp. 601-604
-
-
Chung, Y.F.1
Huang, K.H.2
Lai, F.3
Chen, T.S.4
|