-
1
-
-
59649101587
-
Enhanced authentication scheme with anonymity for roaming service in global mobility networks
-
10.1016/j.comcom.2008.11.032
-
Chang, C. C.; Lee, C. Y.; Chiu, Y. C. (2009). Enhanced authentication scheme with anonymity for roaming service in global mobility networks. Computer Communication, 32(4), 611-618.
-
(2009)
Computer Communication
, vol.32
, Issue.4
, pp. 611-618
-
-
Chang, C.C.1
Lee, C.Y.2
Chiu, Y.C.3
-
2
-
-
84879414438
-
Novel untraceable authenticated key agreement protocol suitable for mobile communication
-
Online First T M. doi: 10.1007/s11277-012-0822-0
-
Chang, C. C.; Le, H. D.; Chang, C. H. (2012). Novel untraceable authenticated key agreement protocol suitable for mobile communication. Wireless Personal Communications, Online First T M. doi: 10.1007/s11277-012-0822-0
-
(2012)
Wireless Personal Communications
-
-
Chang, C.C.1
Le, H.D.2
Chang, C.H.3
-
3
-
-
70350435386
-
A fast and efficient handover authentication achieving conditional privacy in V2I networks
-
Choi, J.; Jung, S.; Kim, Y.; Yoo, M. (2009). A fast and efficient handover authentication achieving conditional privacy in V2I networks. In NEW2AN 2009, pp. 291-300.
-
(2009)
NEW2AN 2009
, pp. 291-300
-
-
Choi, J.1
Jung, S.2
Kim, Y.3
Yoo, M.4
-
4
-
-
67651062654
-
A secure and efficient handover authentication based on light-weight Diffie-Hellman on mobile node in FMIPv6
-
Choi, J.; Jung, S. (2008) A secure and efficient handover authentication based on light-weight Diffie-Hellman on mobile node in FMIPv6. IEICE Transactions on Communications, E-91B(2), 605-608.
-
(2008)
IEICE Transactions on Communications
, vol.E-91B
, Issue.2
, pp. 605-608
-
-
Choi, J.1
Jung, S.2
-
5
-
-
84856471625
-
Secure and efficient handover authentication based on bilinear pairing functions
-
10.1109/TWC.2011.110811.111240
-
He, D.; Chen, C.; Chan, S.; Bu, J. (2012). Secure and efficient handover authentication based on bilinear pairing functions. IEEE Transactions on Wireless Communication, 11(1), 48-53.
-
(2012)
IEEE Transactions on Wireless Communication
, vol.11
, Issue.1
, pp. 48-53
-
-
He, D.1
Chen, C.2
Chan, S.3
Bu, J.4
-
6
-
-
84865443877
-
Analysis and improvement of a secure and efficient handover authentication for wireless networks
-
10.1109/LCOMM.2012.061912.120941
-
He, D.; Chen, C.; Chan, S.; Bu, J. (2012). Analysis and improvement of a secure and efficient handover authentication for wireless networks. IEEE Communications Letters, 16(8), 1270-1273.
-
(2012)
IEEE Communications Letters
, vol.16
, Issue.8
, pp. 1270-1273
-
-
He, D.1
Chen, C.2
Chan, S.3
Bu, J.4
-
7
-
-
38549176356
-
SFRIC: A secure fast roaming scheme in wireless LAN using ID-based cryptography
-
Kim, Y.; Ren, W.; Jo, J.; Yang, M.; Jiang, Y.; Zheng, J. (2007). SFRIC: a secure fast roaming scheme in wireless LAN using ID-based cryptography. In Proceedings of ICC.
-
(2007)
Proceedings of ICC
-
-
Kim, Y.1
Ren, W.2
Jo, J.3
Yang, M.4
Jiang, Y.5
Zheng, J.6
-
8
-
-
68849128250
-
Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment
-
10.1016/j.csi.2008.11.002
-
Hsiang, H. C.; Shih, W. K. (2009). Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment. Computer Standards & Interfaces, 31(6), 1118-1123.
-
(2009)
Computer Standards & Interfaces
, vol.31
, Issue.6
, pp. 1118-1123
-
-
Hsiang, H.C.1
Shih, W.K.2
-
9
-
-
54449094667
-
A secure dynamic ID based remote user authentication scheme for multi-server environment
-
10.1016/j.csi.2007.10.007
-
Liao, Y. P.; Wang, S.-S. (2009). A secure dynamic ID based remote user authentication scheme for multi-server environment. Computer Standards & Interfaces, 31(1), 24-29.
-
(2009)
Computer Standards & Interfaces
, vol.31
, Issue.1
, pp. 24-29
-
-
Liao, Y.P.1
Wang, S.-S.2
-
10
-
-
49849096355
-
Efficient multi-server authentication scheme based on one-way hash function without verification table
-
10.1016/j.cose.2008.04.001
-
Tsai, J. L. (2008). Efficient multi-server authentication scheme based on one-way hash function without verification table. Computers & Security, 27(3-4), 115-121.
-
(2008)
Computers & Security
, vol.27
, Issue.3-4
, pp. 115-121
-
-
Tsai, J.L.1
-
11
-
-
78649878863
-
New dynamic ID authentication scheme using smart cards
-
10.1002/dac.1118
-
Tsai, J. L.; Wu, T. C.; Tsai, K. Y. (2010). New dynamic ID authentication scheme using smart cards. International Journal of Communication Systems, 23(12), 1449-1462.
-
(2010)
International Journal of Communication Systems
, vol.23
, Issue.12
, pp. 1449-1462
-
-
Tsai, J.L.1
Wu, T.C.2
Tsai, K.Y.3
-
12
-
-
77956240963
-
A novel remote user authentication scheme for multi-server environment without using smart cards
-
Yeh, K. H.; Lo, N. W. (2010). A novel remote user authentication scheme for multi-server environment without using smart cards. International Journal of Innovative Computing, Information & Control, 6(8), 3467-3478.
-
(2010)
International Journal of Innovative Computing, Information & Control
, vol.6
, Issue.8
, pp. 3467-3478
-
-
Yeh, K.H.1
Lo, N.W.2
-
14
-
-
84855354854
-
A novel authenticated group key agreement protocol for mobile environment
-
10.1007/s12243-011-0241-3
-
Tsai, J. L. (2011). A novel authenticated group key agreement protocol for mobile environment. Annals of Telecommunications, 66(11-12), 663-669.
-
(2011)
Annals of Telecommunications
, vol.66
, Issue.11-12
, pp. 663-669
-
-
Tsai, J.L.1
-
16
-
-
24144433396
-
Evaluating 2-DNF formulas on ciphertexts
-
of LNCS. Springer
-
Boneh, D.; Goh, E.; Nissim, K. (2005). Evaluating 2-DNF formulas on ciphertexts. In Proceedings of 2005 TCC, vol. 3378 of LNCS. Springer, pp. 325-341.
-
(2005)
Proceedings of 2005 TCC
, vol.3378
, pp. 325-341
-
-
Boneh, D.1
Goh, E.2
Nissim, K.3
-
17
-
-
84919085619
-
An improved algorithm for computing logarithms over GF(p) and its cryptographic significance
-
484737 10.1109/TIT.1978.1055817
-
Pohlig, S.; Hellman, M. (1978). An improved algorithm for computing logarithms over GF(p) and its cryptographic significance. IEEE Transactions on Information Theory, 24, 106-110.
-
(1978)
IEEE Transactions on Information Theory
, vol.24
, pp. 106-110
-
-
Pohlig, S.1
Hellman, M.2
-
18
-
-
79956293525
-
Converting pairing-based cryptosystems from composite-order groups to prime-order groups
-
2660482
-
Freeman, D. M. (2010). Converting pairing-based cryptosystems from composite-order groups to prime-order groups. EUROCRYPT, 2010, 44-61.
-
(2010)
EUROCRYPT
, vol.2010
, pp. 44-61
-
-
Freeman, D.M.1
-
19
-
-
78650009814
-
Building efficient fully collusion-resilient traitor tracing and revocation schemes
-
security
-
Garg, S.; Kumarasubramanian, A.; Sahai, A.; Waters, B. (2010). Building efficient fully collusion-resilient traitor tracing and revocation schemes. In Proceedings CCS '10 proceedings of the 17th ACM conference on computer and communications, security, pp. 121-130.
-
(2010)
Proceedings CCS '10 Proceedings of the 17th ACM Conference on Computer and Communications
, pp. 121-130
-
-
Garg, S.1
Kumarasubramanian, A.2
Sahai, A.3
Waters, B.4
-
20
-
-
84873466407
-
Authenticated key agreement secure against dictionary attacks
-
10.1007/3-540-45539-6-11
-
Bellare, M.; Pointcheval, D.; Rogaway, P. (2000). Authenticated key agreement secure against dictionary attacks. EUROCRYPT 2000. LNCS, 1807, 139-155.
-
(2000)
EUROCRYPT 2000. LNCS
, vol.1807
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
22
-
-
2642534140
-
Efficient and mutually authenticated key exchange for low power computing devices
-
Wong, D. S.; Chan, A. H. (2001). Efficient and mutually authenticated key exchange for low power computing devices. In Proceedings of ASIACRYPT'01, pp. 172-289.
-
(2001)
Proceedings of ASIACRYPT'01
, pp. 172-289
-
-
Wong, D.S.1
Chan, A.H.2
-
23
-
-
26444474509
-
ID-based authenticated key agreement for low-power mobile devices
-
Brisbane
-
Choi, K. Y. et al. (2005). ID-based authenticated key agreement for low-power mobile devices. In Proceedings of ACISP'05, Brisbane, pp. 494-505.
-
(2005)
Proceedings of ACISP'05
, pp. 494-505
-
-
Choi, K.Y.1
-
24
-
-
35048854587
-
An efficient signature scheme from bilinear pairings and its applications
-
LNCS
-
Zhang, F.; Safai, R.; Susilo, W. (2004). An efficient signature scheme from bilinear pairings and its applications. Advance in Public Key Cryptography-PKC 2004. LNCS, 2947, 227-290.
-
(2004)
Advance in Public Key Cryptography-PKC 2004
, vol.2947
, pp. 227-290
-
-
Zhang, F.1
Safai, R.2
Susilo, W.3
-
25
-
-
0000901529
-
Security arguments for digital signatures and blind signatures
-
Pointcheval, D.; Stern, J. (2000). Security arguments for digital signatures and blind signatures. Journal of Cryptography, 13, 361-396.
-
(2000)
Journal of Cryptography
, vol.13
, pp. 361-396
-
-
Pointcheval, D.1
Stern, J.2
|