-
1
-
-
0019634370
-
Password authentication with insecure communication
-
Lamport L. Password authentication with insecure communication. Communications of the ACM 1981, 24(11):770-772.
-
(1981)
Communications of the ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
2
-
-
0033704170
-
Methods for protecting password transmission
-
Peyravian M., Zunic N. Methods for protecting password transmission. Computers and Security 2000, 19(5):466-469.
-
(2000)
Computers and Security
, vol.19
, Issue.5
, pp. 466-469
-
-
Peyravian, M.1
Zunic, N.2
-
3
-
-
0041698517
-
A remote user authentication scheme using hash functions
-
Lee C.C., Li L.H., Hwang M.S. A remote user authentication scheme using hash functions. ACM Operating Systems Review 2002, 36(4):23-29.
-
(2002)
ACM Operating Systems Review
, vol.36
, Issue.4
, pp. 23-29
-
-
Lee, C.C.1
Li, L.H.2
Hwang, M.S.3
-
4
-
-
7644232640
-
Weaknesses of Lee-Li-Hwang's Hash-based password authentication scheme
-
Ku W.C., Chen C.M., Lee H.L. Weaknesses of Lee-Li-Hwang's Hash-based password authentication scheme. ACM Operating Systems Review 2003, 37(4):19-25.
-
(2003)
ACM Operating Systems Review
, vol.37
, Issue.4
, pp. 19-25
-
-
Ku, W.C.1
Chen, C.M.2
Lee, H.L.3
-
5
-
-
33645790506
-
A secure user authentication scheme using hash functions
-
Yoon E.J., Ruy E.K., Roo K.Y. A secure user authentication scheme using hash functions. ACM Operating Systems Review 2004, 38(2):62-68.
-
(2004)
ACM Operating Systems Review
, vol.38
, Issue.2
, pp. 62-68
-
-
Yoon, E.J.1
Ruy, E.K.2
Roo, K.Y.3
-
6
-
-
33646469746
-
Weaknesses of Yoon-Ryu-Yoo's hash-based password authentication scheme
-
Ku W.C., Chaing M.H., Chang S.T. Weaknesses of Yoon-Ryu-Yoo's hash-based password authentication scheme. ACM Operating Systems Review 2005, 39(1):85-89.
-
(2005)
ACM Operating Systems Review
, vol.39
, Issue.1
, pp. 85-89
-
-
Ku, W.C.1
Chaing, M.H.2
Chang, S.T.3
-
7
-
-
0036556279
-
Improvement on Peyravian-Zunic's password authentication schemes
-
E85-B
-
Hwang J.J., Yeh T.C. Improvement on Peyravian-Zunic's password authentication schemes. IEICE Transactions on Communications 2002, E85-B(4):823-825.
-
(2002)
IEICE Transactions on Communications
, Issue.4
, pp. 823-825
-
-
Hwang, J.J.1
Yeh, T.C.2
-
8
-
-
0142007776
-
Cryptanalysis of a variant of Peyravian-Zunic's password authentication scheme
-
E86-B
-
Ku W.C., Chen C.M., Hui L. Cryptanalysis of a variant of Peyravian-Zunic's password authentication scheme. IEICE Transactions on Communications 2002, E86-B(5):1682-1684.
-
(2002)
IEICE Transactions on Communications
, Issue.5
, pp. 1682-1684
-
-
Ku, W.C.1
Chen, C.M.2
Hui, L.3
-
9
-
-
0037282439
-
A password authentication scheme with secure password updating
-
Lin C.L., Hwang T. A password authentication scheme with secure password updating. Computers and Security 2003, 22(1):68-72.
-
(2003)
Computers and Security
, vol.22
, Issue.1
, pp. 68-72
-
-
Lin, C.L.1
Hwang, T.2
-
10
-
-
33144456748
-
Secure remote user access over insecure networks
-
Peyravian M., Jeffries C. Secure remote user access over insecure networks. Computer Communications 2006, 29(5):660-667.
-
(2006)
Computer Communications
, vol.29
, Issue.5
, pp. 660-667
-
-
Peyravian, M.1
Jeffries, C.2
-
11
-
-
33751177550
-
Security flaws of remote user access over insecure networks
-
Shim K.A. Security flaws of remote user access over insecure networks. Computer communications 2006, 30(1):117-121.
-
(2006)
Computer communications
, vol.30
, Issue.1
, pp. 117-121
-
-
Shim, K.A.1
-
13
-
-
70350136722
-
Improvement upon mutual password authentication scheme
-
L. Zhu, S. Yu, X. Zhang, Improvement upon mutual password authentication scheme, International seminar on business and information management, 2008, pp. 400-403.
-
(2008)
International seminar on business and information management
, pp. 400-403
-
-
Zhu, L.1
Yu, S.2
Zhang, X.3
-
15
-
-
51749125085
-
A new modified remote user authentication scheme using smartcards
-
Shen Z.H. A new modified remote user authentication scheme using smartcards. Applied Mathematics 2008, 23(3):371-376.
-
(2008)
Applied Mathematics
, vol.23
, Issue.3
, pp. 371-376
-
-
Shen, Z.H.1
-
16
-
-
44549086640
-
A new mutual authentication scheme based on nonce and smartcards
-
Jia Y.L., Jhou A.M., Gao M.X. A new mutual authentication scheme based on nonce and smartcards. Computer Communications 2008, 31(10):2205-2209.
-
(2008)
Computer Communications
, vol.31
, Issue.10
, pp. 2205-2209
-
-
Jia, Y.L.1
Jhou, A.M.2
Gao, M.X.3
-
17
-
-
43049128557
-
Efficient password authenticated key agreement using bilinear pairings
-
Juang W.S., Nien W.K. Efficient password authenticated key agreement using bilinear pairings. Mathematical and Computer Modelling 2008, 47(11-12):1238-1245.
-
(2008)
Mathematical and Computer Modelling
, vol.47
, Issue.11-12
, pp. 1238-1245
-
-
Juang, W.S.1
Nien, W.K.2
-
18
-
-
61849096169
-
More secure remote user authentication scheme
-
Kim S.K., Chung M.G. More secure remote user authentication scheme. Computer Communications 2009, 32(6):1018-1021.
-
(2009)
Computer Communications
, vol.32
, Issue.6
, pp. 1018-1021
-
-
Kim, S.K.1
Chung, M.G.2
-
19
-
-
64249125305
-
An improved smart card based password authentication scheme with provable security
-
Xu J., Zhu W.T., Feng D.G. An improved smart card based password authentication scheme with provable security. Computer Standards and Interfaces 2009, 31(4):723-728.
-
(2009)
Computer Standards and Interfaces
, vol.31
, Issue.4
, pp. 723-728
-
-
Xu, J.1
Zhu, W.T.2
Feng, D.G.3
-
20
-
-
84875286190
-
An enhanced remote user authentication scheme with smart card
-
Kumar M. An enhanced remote user authentication scheme with smart card. International Journal of Network Security 2010, 10(3):175-184.
-
(2010)
International Journal of Network Security
, vol.10
, Issue.3
, pp. 175-184
-
-
Kumar, M.1
-
21
-
-
70349792182
-
An efficient biometrics-based remote user authentication scheme using smart cards
-
Li C.T., Hwang M.S. An efficient biometrics-based remote user authentication scheme using smart cards. Journal of Network and Computer Applications 2010, 33(1):1-5.
-
(2010)
Journal of Network and Computer Applications
, vol.33
, Issue.1
, pp. 1-5
-
-
Li, C.T.1
Hwang, M.S.2
-
22
-
-
34248666700
-
Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards
-
Wang X.M., Zhang W.F., Zhang J.S., Khan M.K. Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards. Computer Standards and Interfaces 2007, 29:507-512.
-
(2007)
Computer Standards and Interfaces
, vol.29
, pp. 507-512
-
-
Wang, X.M.1
Zhang, W.F.2
Zhang, J.S.3
Khan, M.K.4
-
23
-
-
43649083106
-
Cryptanalysis of a password authentication scheme over insecure networks
-
Xiang T., Wong K.W., Liao X. Cryptanalysis of a password authentication scheme over insecure networks. Journal of Computer and System Sciences 2008, 74(5):657-661.
-
(2008)
Journal of Computer and System Sciences
, vol.74
, Issue.5
, pp. 657-661
-
-
Xiang, T.1
Wong, K.W.2
Liao, X.3
-
24
-
-
59649086399
-
Weaknesses and improvements of the Yoon-Ryu-Yoo remote user authentication scheme using smart cards
-
Hsiang H.C., Shih W.K. Weaknesses and improvements of the Yoon-Ryu-Yoo remote user authentication scheme using smart cards. Computer Communications 2009, 32(4):649-652.
-
(2009)
Computer Communications
, vol.32
, Issue.4
, pp. 649-652
-
-
Hsiang, H.C.1
Shih, W.K.2
-
26
-
-
64249169230
-
Weaknesses and improvement of Wang et al.'s remote user password authentication scheme for resource-limited environments
-
Chung H.R., Ku W.C., Tsaur M.J. Weaknesses and improvement of Wang et al.'s remote user password authentication scheme for resource-limited environments. Computer Standards and Interfaces 2009, 31(4):863-868.
-
(2009)
Computer Standards and Interfaces
, vol.31
, Issue.4
, pp. 863-868
-
-
Chung, H.R.1
Ku, W.C.2
Tsaur, M.J.3
-
28
-
-
84939573910
-
Differential power analysis
-
LNCS
-
P. Kocher, J. Jaffe, B. Jun, Differential power analysis, in: Proceedings of Advances in Cryptology- Crypto'99, LNCS, 1999, pp. 388-397.
-
(1999)
Proceedings of Advances in Cryptology- Crypto'99
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
29
-
-
0036566408
-
Examining smart-card security under the threat of power analysis attacks
-
Messerges T.S., Dabbish E.A., Sloan R.H. Examining smart-card security under the threat of power analysis attacks. IEEE Transactions on Computers 2002, 51(5):541-552.
-
(2002)
IEEE Transactions on Computers
, vol.51
, Issue.5
, pp. 541-552
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
-
30
-
-
11244267013
-
-
Springer-Verlag, New York, USA
-
Hankerson D., Menezes A., Vanstone S. Guide to Elliptic Curve Cryptography 2004, Springer-Verlag, New York, USA.
-
(2004)
Guide to Elliptic Curve Cryptography
-
-
Hankerson, D.1
Menezes, A.2
Vanstone, S.3
-
33
-
-
0037623983
-
Identity-based encryption from the Weil pairing
-
Boneh D., Franklin M. Identity-based encryption from the Weil pairing. SIAM Journal on Computing 2003, 32:586-615.
-
(2003)
SIAM Journal on Computing
, vol.32
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
35
-
-
23044474013
-
Evidence that XTR is more secure than supersingular elliptic curve cryptosystems
-
Verheul E.R. Evidence that XTR is more secure than supersingular elliptic curve cryptosystems. Journal of Cryptology 2004, 17(4):277-296.
-
(2004)
Journal of Cryptology
, vol.17
, Issue.4
, pp. 277-296
-
-
Verheul, E.R.1
-
36
-
-
68849128250
-
Improvement of the secure dynamic ID based remote user authenticationnext term scheme for multi-server environment
-
Hsiang H.C., Shiha W.K. Improvement of the secure dynamic ID based remote user authenticationnext term scheme for multi-server environment. Computer Standards and Interfaces 2009, 31(6):1118-1123.
-
(2009)
Computer Standards and Interfaces
, vol.31
, Issue.6
, pp. 1118-1123
-
-
Hsiang, H.C.1
Shiha, W.K.2
-
37
-
-
76349104839
-
Cryptanalysis of a remote user authentication scheme based on bilinear pairing
-
Yan Y.H., Wang D.S., Li J.P., Li L.G. Cryptanalysis of a remote user authentication scheme based on bilinear pairing. In: IEEE ICACIA 2009, 73-76.
-
(2009)
In: IEEE ICACIA
, pp. 73-76
-
-
Yan, Y.H.1
Wang, D.S.2
Li, J.P.3
Li, L.G.4
-
38
-
-
78651562638
-
Cryptanalysis of identity-based authenticated key agreement protocols from parings
-
Hou M., Xu Q., Shanqing G., Jiang H. Cryptanalysis of identity-based authenticated key agreement protocols from parings. Journal of Networks 2010, 5(7):826-855.
-
(2010)
Journal of Networks
, vol.5
, Issue.7
, pp. 826-855
-
-
Hou, M.1
Xu, Q.2
Shanqing, G.3
Jiang, H.4
-
39
-
-
70350437139
-
Security in key agreement: two-party certificateless schemes
-
Master's thesis, University of Waterloo, Canada
-
C.M. Swanson, Security in key agreement: two-party certificateless schemes, Master's thesis, University of Waterloo, Canada, 2008.
-
(2008)
-
-
Swanson, C.M.1
-
40
-
-
35048860626
-
Analysis of key exchange protocols and their use for building secure channels
-
Springer-Verlag, LNCS
-
R. Canetti, H. Krawczyk, Analysis of key exchange protocols and their use for building secure channels, In: Proceedings of Advances in Cryptology-Eurocrypt'01, Springer-Verlag, LNCS, 2001, pp. 453-474.
-
(2001)
Proceedings of Advances in Cryptology-Eurocrypt'01
, pp. 453-474
-
-
Canetti, R.1
Krawczyk, H.2
-
41
-
-
38149061118
-
On the indistinguishability-based security model of key agreement protocols-simple cases
-
Cryptology ePrint Archieve, Report 2005/129
-
Z. Cheng, M. Nistazakis, R. Comley, L. Vasiu, On the indistinguishability-based security model of key agreement protocols-simple cases, Cryptology ePrint Archieve, Report 2005/129, 2005.
-
(2005)
-
-
Cheng, Z.1
Nistazakis, M.2
Comley, R.3
Vasiu, L.4
-
42
-
-
49949116357
-
Certificateless authenticated two-party key agreement protocols
-
Springer-Verlag, LNCS
-
T. Mandt, C. Tan, Certificateless authenticated two-party key agreement protocols, in: Proceedings of the ASIAN 2006, Springer-Verlag, LNCS, 4435, 2008, pp. 37-44.
-
(2008)
Proceedings of the ASIAN 2006
, vol.4435
, pp. 37-44
-
-
Mandt, T.1
Tan, C.2
-
43
-
-
0141642166
-
On the security of some password authentication protocols
-
Hsieh B.T, Sun H.M., Hwang T. On the security of some password authentication protocols. Informatica 2003, 14(2):195-204.
-
(2003)
Informatica
, vol.14
, Issue.2
, pp. 195-204
-
-
Hsieh, B.T.1
Sun, H.M.2
Hwang, T.3
-
45
-
-
34548129922
-
ID-based digital signature scheme on the elliptic curve cryptosystem
-
Chung Y.F., Huang K.H., Lai F., Chen T.S. ID-based digital signature scheme on the elliptic curve cryptosystem. Computer Standards and Interfaces 2007, 29(6):601-604.
-
(2007)
Computer Standards and Interfaces
, vol.29
, Issue.6
, pp. 601-604
-
-
Chung, Y.F.1
Huang, K.H.2
Lai, F.3
Chen, T.S.4
|