-
1
-
-
0025386404
-
A logic of authentication
-
Burrows, M., Abadi, M., and Needham, R., A logic of authentication. ACM Trans. Comput. Syst. 8(1):18-36, 1990.
-
(1990)
ACM Trans. Comput. Syst.
, vol.8
, Issue.1
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
2
-
-
84872112386
-
An uniqueness-and-anonymity-preserving remote user authentication scheme for connected healthcare
-
Chang, Y.-F., Yu, S.-H., and Shiao, D.-R., An uniqueness-and-anonymity- preserving remote user authentication scheme for connected healthcare. J. Med. Syst. 37:9902, 2013.
-
(2013)
J. Med. Syst.
, vol.37
, pp. 9902
-
-
Chang, Y.-F.1
Yu, S.-H.2
Shiao, D.-R.3
-
3
-
-
84867867616
-
An efficient and secure dynamic ID-based authentication scheme for Telecare medical information systems
-
Chen, H. M., Lo, J. W., and Yeh, C. K., An efficient and secure dynamic ID-based authentication scheme for Telecare medical information systems. J. Med. Syst. 36(6):3907-3915, 2012.
-
(2012)
J. Med. Syst.
, vol.36
, Issue.6
, pp. 3907-3915
-
-
Chen, H.M.1
Lo, J.W.2
Yeh, C.K.3
-
4
-
-
81855227196
-
Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards
-
Das, A. K., Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards. IET Inf. Secur. 5(3):145-151, 2011.
-
(2011)
IET Inf. Secur.
, vol.5
, Issue.3
, pp. 145-151
-
-
Das, A.K.1
-
5
-
-
84877090869
-
A secure and efficient uniqueness -and-anonymity-preserving remote user authentication scheme for connected health care
-
Das, A. K., and Goswami, A., A secure and efficient uniqueness -and-anonymity-preserving remote user authentication scheme for connected health care. J. Med. Syst. 37:9948, 2013.
-
(2013)
J. Med. Syst.
, vol.37
, pp. 9948
-
-
Das, A.K.1
Goswami, A.2
-
6
-
-
62949130774
-
Two-factor user authentication in wireless sensor networks
-
Das, M. L., Two-factor user authentication in wireless sensor networks. IEEE Trans. Wirel. Commun. 8(3):1086-1090, 2009.
-
(2009)
IEEE Trans. Wirel. Commun.
, vol.8
, Issue.3
, pp. 1086-1090
-
-
Das, M.L.1
-
7
-
-
0034140374
-
A new remote user authentication scheme using smart cards
-
Hwang, M. S., and Li, L. H., A new remote user authentication scheme using smart cards. IEEE Trans. Consum. Electron. 46(1):28-30, 2000.
-
(2000)
IEEE Trans. Consum. Electron.
, vol.46
, Issue.1
, pp. 28-30
-
-
Hwang, M.S.1
Li, L.H.2
-
8
-
-
12344259813
-
Biohashing: Two factor authentication featuring fingerprint data and tokenised random number
-
Jina, A. T. B., Linga, D. N. C., and Goh, A., Biohashing: Two factor authentication featuring fingerprint data and tokenised random number. Pattern Recogn. 37(11):2245-2255, 2004.
-
(2004)
Pattern Recogn.
, vol.37
, Issue.11
, pp. 2245-2255
-
-
Jina, A.T.B.1
Linga, D.N.C.2
Goh, A.3
-
9
-
-
34548620637
-
Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices
-
Khan, M. K., Zhang, J., and Wang, X., Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices. Chaos Solitons Fractals 35(3):519-524, 2008.
-
(2008)
Chaos Solitons Fractals
, vol.35
, Issue.3
, pp. 519-524
-
-
Khan, M.K.1
Zhang, J.2
Wang, X.3
-
10
-
-
84939573910
-
Differential power analysis
-
LNCS
-
Kocher, P., Jaffe, J., and Jun, B., Differential power analysis. In: Proceedings of Advances in Cryptology-CRYPTO'99. Vol. 1666, pp. 388-397. LNCS, 1999.
-
(1999)
Proceedings of Advances in Cryptology-CRYPTO'99
, vol.1666
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
11
-
-
9544232528
-
Improved remote authentication scheme with smart card
-
Lee, N. Y., and Chiu, Y. C., Improved remote authentication scheme with smart card. Comput. Stand. Interfac. 27(2):177-180, 2005.
-
(2005)
Comput. Stand. Interfac.
, vol.27
, Issue.2
, pp. 177-180
-
-
Lee, N.Y.1
Chiu, Y.C.2
-
12
-
-
70349792182
-
An efficient biometric-based remote user authentication scheme using smart cards
-
Li, C.-T., and Hwang, M.-S., An efficient biometric-based remote user authentication scheme using smart cards. J. Netw. Comput. Appl. 33:1-5, 2010.
-
(2010)
J. Netw. Comput. Appl.
, vol.33
, pp. 1-5
-
-
Li, C.-T.1
Hwang, M.-S.2
-
13
-
-
78649335192
-
Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards
-
Li, X., Niu, J.-W., Ma, J., Wang, W.-D., and Liu, C.-L., Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards. J. Netw. Comput. Appl. 34:73-79, 2011.
-
(2011)
J. Netw. Comput. Appl.
, vol.34
, pp. 73-79
-
-
Li, X.1
Niu, J.-W.2
Ma, J.3
Wang, W.-D.4
Liu, C.-L.5
-
14
-
-
33750533142
-
An improved BioHashing for human authentication
-
Lumini, A., and Nanni, L., An improved BioHashing for human authentication. Pattern Recogn. 40(3):1057-1065, 2007.
-
(2007)
Pattern Recogn.
, vol.40
, Issue.3
, pp. 1057-1065
-
-
Lumini, A.1
Nanni, L.2
-
15
-
-
0036566408
-
Examining smart-card security under the threat of power analysis attacks
-
1901004
-
Messerges, T. S., Dabbish, E. A., and Sloan, R. H., Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Comput. 51(5):541-552, 2002.
-
(2002)
IEEE Trans. Comput.
, vol.51
, Issue.5
, pp. 541-552
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
-
16
-
-
84891627161
-
A robust smart card-based anonymous user authentication protocol for wireless communications
-
10.1002/sec.816
-
Wen, F. T., Susilo, W., and Yang, G. M., A robust smart card-based anonymous user authentication protocol for wireless communications. Secur. Comm. Networks, 2013 doi: 10.1002/sec.816.
-
(2013)
Secur. Comm. Networks. 2013
-
-
Wen, F.T.1
Susilo, W.2
Yang, G.M.3
-
17
-
-
84890555385
-
A secure effective anonymous user authentication scheme for roaming service in global mobility networks
-
10.1007/s11277-013-1243-4
-
Wen, F. T., Susilo, W., and Yang, G. M., A secure effective anonymous user authentication scheme for roaming service in global mobility networks. Wirel. Pers. Commun., 2013. doi: 10.1007/s11277-013-1243-4.
-
(2013)
Wirel. Pers. Commun.
-
-
Wen, F.T.1
Susilo, W.2
Yang, G.M.3
-
18
-
-
84864061174
-
A secure authentication scheme for Telecare medicine information systems
-
Wu, Z.-Y., Lee, Y.-C., Lai, F., Lee, H.-C., and Chung, Y., A secure authentication scheme for Telecare medicine information systems. J. Med. Syst. 36(3):1529-35, 2010.
-
(2010)
J. Med. Syst.
, vol.36
, Issue.3
, pp. 1529-1535
-
-
Wu, Z.-Y.1
Lee, Y.-C.2
Lai, F.3
Lee, H.-C.4
Chung, Y.5
-
19
-
-
84864058187
-
A more secure authentication scheme for telecare medicine information systems
-
He, D.-B. H., Jianhua, C., and Rui, Z., A more secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1989-1995, 2012.
-
(2012)
J. Med. Syst.
, vol.36
, Issue.3
, pp. 1989-1995
-
-
He, D.-B.1
Jianhua, C.2
Rui, Z.3
-
20
-
-
52949137008
-
Two-factor mutual authentication based on smart cards and passwords
-
2454061
-
Yang, G., Wong, D. S., Wang, H., Deng, X., Two-factor mutual authentication based on smart cards and passwords. J. Computer Syst. Sci. 74(7):1160-1172, 2008.
-
(2008)
J. Computer Syst. Sci.
, vol.74
, Issue.7
, pp. 1160-1172
-
-
Yang, G.1
Wong, D.S.2
Wang, H.3
Deng, X.4
|