-
1
-
-
0019634370
-
Password authentication with insecure communication
-
Lamport L,. Password authentication with insecure communication. Communications of the ACM 1987; 24 (11): 770-772.
-
(1987)
Communications of the ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
2
-
-
0034140374
-
A new remote user authentication scheme using smart cards
-
Hwang MS, Li LH,. A new remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics 2000; 46 (1): 28-30.
-
(2000)
IEEE Transactions on Consumer Electronics
, vol.46
, Issue.1
, pp. 28-30
-
-
Hwang, M.S.1
Li, L.H.2
-
3
-
-
84872223681
-
A secure password-based remote user authentication scheme without smart cards
-
Chen BL, Kuo WC, Wuu LC,. A secure password-based remote user authentication scheme without smart cards. Information Technology and Control 2012; 41 (1): 53-59.
-
(2012)
Information Technology and Control
, vol.41
, Issue.1
, pp. 53-59
-
-
Chen, B.L.1
Kuo, W.C.2
Wuu, L.C.3
-
4
-
-
0036302680
-
An efficient and practical solution to remote authentication: Smart card
-
Chien HY, Jan JK, Tseng YM,. An efficient and practical solution to remote authentication: Smart card. Computers & Security 2002; 21 (4): 372-375.
-
(2002)
Computers & Security
, vol.21
, Issue.4
, pp. 372-375
-
-
Chien, H.Y.1
Jan, J.K.2
Tseng, Y.M.3
-
5
-
-
62949130774
-
Two-factor user authentication in wireless sensor networks
-
Das ML,. Two-factor user authentication in wireless sensor networks. IEEE Transactions on Wireless Communications 2009; 8 (3): 1086-1090.
-
(2009)
IEEE Transactions on Wireless Communications
, vol.8
, Issue.3
, pp. 1086-1090
-
-
Das, M.L.1
-
6
-
-
9544227377
-
Improvement of Chien et al.'s remote user authentication scheme using smart cards
-
Lee SW, Kim HS, Yoo KY,. Improvement of Chien et al.'s remote user authentication scheme using smart cards. Computer Standards & Interfaces 2005; 27 (2): 181-183.
-
(2005)
Computer Standards & Interfaces
, vol.27
, Issue.2
, pp. 181-183
-
-
Lee, S.W.1
Kim, H.S.2
Yoo, K.Y.3
-
8
-
-
78650606014
-
Comments on symmetric key encryption based smart card authentication scheme
-
Pippal RS, Jaidhar CD, Tapaswi S,. Comments on symmetric key encryption based smart card authentication scheme. Proceedings of the Second International Conference on Computer Technology and Development (ICCTD), Cairo, Egypt, 2-4 November 2010; 482-484.
-
(2010)
Proceedings of the Second International Conference on Computer Technology and Development (ICCTD), Cairo, Egypt, 2-4 November
, pp. 482-484
-
-
Pippal, R.S.1
Jaidhar, C.D.2
Tapaswi, S.3
-
9
-
-
77955312905
-
Advanced smart card based password authentication protocol
-
Song R,. Advanced smart card based password authentication protocol. Computer Standards & Interfaces 2010; 32 (5): 321-325.
-
(2010)
Computer Standards & Interfaces
, vol.32
, Issue.5
, pp. 321-325
-
-
Song, R.1
-
10
-
-
77952983609
-
An improvement of Xu et al.'s authentication scheme using smart cards
-
Sood SK, Sarje AK, Singh K,. An improvement of Xu et al.'s authentication scheme using smart cards. Proceedings of The Third Annual ACM Bangalore Conference, Bangalore, Karnataka, India, 2010; 1-5.
-
(2010)
Proceedings of the Third Annual ACM Bangalore Conference, Bangalore, Karnataka, India
, pp. 1-5
-
-
Sood, S.K.1
Sarje, A.K.2
Singh, K.3
-
11
-
-
64249125305
-
An improved smart card based password authentication scheme with provable security
-
Xu J, Zhu WT, Feng DG,. An improved smart card based password authentication scheme with provable security. Computer Standards & Interfaces 2009; 31 (4): 723-728.
-
(2009)
Computer Standards & Interfaces
, vol.31
, Issue.4
, pp. 723-728
-
-
Xu, J.1
Zhu, W.T.2
Feng, D.G.3
-
12
-
-
52949137008
-
Two-factor mutual authentication based on smart cards and passwords
-
Yang G, Wong DS, Wang H, Deng X,. Two-factor mutual authentication based on smart cards and passwords. Journal of Computer and System Sciences 2008; 74: 1160-1172.
-
(2008)
Journal of Computer and System Sciences
, vol.74
, pp. 1160-1172
-
-
Yang, G.1
Wong, D.S.2
Wang, H.3
Deng, X.4
-
13
-
-
79959763451
-
Cryptanalysis of Hsiang-Shih's authentication scheme for multi-server architecture
-
Yeh KH, Lo NW, Li Y,. Cryptanalysis of Hsiang-Shih's authentication scheme for multi-server architecture. IJCS: International Journal of Communication Systems 2011; 24 (7): 829-836.
-
(2011)
IJCS: International Journal of Communication Systems
, vol.24
, Issue.7
, pp. 829-836
-
-
Yeh, K.H.1
Lo, N.W.2
Li, Y.3
-
14
-
-
0000474763
-
Differential power analysis
-
Kocher P, Jaffe J, Jun B,. Differential power analysis. Advances in Cryptology, CRYPTO'99 1999; 1666: 788-797.
-
(1999)
Advances in Cryptology, CRYPTO'99
, vol.1666
, pp. 788-797
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
15
-
-
0036566408
-
Examining smart card security under the threat of power analysis attacks
-
Messerges TS, Dabbish EA, Sloan RH,. Examining smart card security under the threat of power analysis attacks. IEEE Transactions on Computers 2002; 51 (5): 541-552.
-
(2002)
IEEE Transactions on Computers
, vol.51
, Issue.5
, pp. 541-552
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
|