-
2
-
-
54949140749
-
A secure authentication scheme with anonymity for wireless communications
-
Oct.
-
C. Wu, W. Lee, and W. J. Tsaur, "A secure authentication scheme with anonymity for wireless communications," IEEE Communications Letters, vol. 12, no. 10, pp. 722-723, Oct. 2008.
-
(2008)
IEEE Communications Letters
, vol.12
, Issue.10
, pp. 722-723
-
-
Wu, C.1
Lee, W.2
Tsaur, W.J.3
-
3
-
-
0034140374
-
A new remote user authentication scheme using smart cards
-
Feb.
-
M. S. Hwang, and L. H. Li, "A new remote user authentication scheme using smart cards," IEEE Trans. Consumer Electron., vol. 46, no. 1, pp. 28-30, Feb. 2000.
-
(2000)
IEEE Trans. Consumer Electron.
, vol.46
, Issue.1
, pp. 28-30
-
-
Hwang, M.S.1
Li, L.H.2
-
4
-
-
1942423677
-
Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards
-
Feb.
-
W. C. Ku, and S. M. Chen, "Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards," IEEE Trans. Consumer Electron, vol. 50, no. 1, pp. 204-207, Feb. 2004.
-
(2004)
IEEE Trans. Consumer Electron
, vol.50
, Issue.1
, pp. 204-207
-
-
Ku, W.C.1
Chen, S.M.2
-
5
-
-
4043152192
-
Further improvement of an efficient password based remote user authentication scheme using smart cards
-
May
-
E. Yoon, E. Ryu, and K. Yoo, "Further improvement of an efficient password based remote user authentication scheme using smart cards," IEEE Trans. Consumer Electron, vol. 50, no. 2, pp. 612-614, May 2004.
-
(2004)
IEEE Trans. Consumer Electron
, vol.50
, Issue.2
, pp. 612-614
-
-
Yoon, E.1
Ryu, E.2
Yoo, K.3
-
6
-
-
59649086399
-
Weaknesses and improvements of the Yoon-Ryu-Yoo remote user authentication scheme using smart cards
-
Elsevier Mar.
-
H. C. Hsiang, and W. K. Shih "Weaknesses and improvements of the Yoon-Ryu-Yoo remote user authentication scheme using smart cards," Computer Communications, Elsevier, vol. 32, no. 4, pp. 649-652, Mar. 2009.
-
(2009)
Computer Communications
, vol.32
, Issue.4
, pp. 649-652
-
-
Hsiang, H.C.1
Shih, W.K.2
-
7
-
-
84858112506
-
Security flaws in three password-based remote user authentication schemes with smart cards
-
Jan.
-
K.-A. Shim, "Security flaws in three password-based remote user authentication schemes with smart cards," Cryptologia, Taylor and Francis, vol. 36, no. 1, pp. 62-69, Jan. 2012.
-
(2012)
Cryptologia Taylor and Francis
, vol.36
, Issue.1
, pp. 62-69
-
-
Shim, K.-A.1
-
8
-
-
58149383161
-
Multimodal biometric authentication using teeth image and voice in mobile environment
-
Nov.
-
D.-J. Kim, and K.-S. Hong, "Multimodal biometric authentication using teeth image and voice in mobile environment," IEEE Trans. Consumer Electron., vol. 54, no. 4, pp. 1790-1797, Nov. 2008.
-
(2008)
IEEE Trans. Consumer Electron.
, vol.54
, Issue.4
, pp. 1790-1797
-
-
Kim, D.-J.1
Hong, K.-S.2
-
9
-
-
78651406039
-
Person authentication using face, teeth and voice modalities for mobile device security
-
Nov.
-
D.-J. Kim, K.-W. Chung, and K.-S. Hong, "Person authentication using face, teeth and voice modalities for mobile device security", IEEE Trans. Consumer Electron, vol. 56, no. 4, pp. 2678-2685, Nov. 2010.
-
(2010)
IEEE Trans. Consumer Electron
, vol.56
, Issue.4
, pp. 2678-2685
-
-
Kim, D.-J.1
Chung, K.-W.2
Hong, K.-S.3
-
10
-
-
84867306250
-
Illumination-robust face recognition system based on differential components
-
Aug.
-
S.-H. Lee, D.-J. Kim, and J.-H. Cho, "Illumination-robust face recognition system based on differential components," IEEE Trans. Consumer Electron., vol. 58, no. 3, pp. 963-970, Aug. 2012.
-
(2012)
IEEE Trans. Consumer Electron.
, vol.58
, Issue.3
, pp. 963-970
-
-
Lee, S.-H.1
Kim, D.-J.2
Cho, J.-H.3
-
11
-
-
78651401376
-
A secure control protocol for USB mass storage devices
-
Nov.
-
F.-Y. Yang, T.-D. Wu, and S.-H. Chiu, "A secure control protocol for USB mass storage devices," IEEE Trans. Consumer Electron., vol. 56, no. 4, pp. 2339-2343, Nov. 2010.
-
(2010)
IEEE Trans. Consumer Electron.
, vol.56
, Issue.4
, pp. 2339-2343
-
-
Yang, F.-Y.1
Wu, T.-D.2
Chiu, S.-H.3
-
12
-
-
12344258539
-
Efficient identification and signatures for smart cards
-
Springer
-
C. Schnorr, "Efficient identification and signatures for smart cards," Journal of Cryptology, Springer, vol. 4, no. 3, pp. 161-174, 1991.
-
(1991)
Journal of Cryptology
, vol.4
, Issue.3
, pp. 161-174
-
-
Schnorr, C.1
-
13
-
-
84872165930
-
A secure access authentication scheme for removable storage media
-
Binary Information Press Nov.
-
B. Chen, C. Qin, and L. Yu, "A Secure Access Authentication Scheme for Removable Storage Media," Journal of Information & Computational Science, Binary Information Press, vol. 9, no. 15, pp. 4353-4363, Nov. 2012.
-
(2012)
Journal of Information & Computational Science
, vol.9
, Issue.15
, pp. 4353-4363
-
-
Chen, B.1
Qin, C.2
Yu, L.3
-
14
-
-
84880677476
-
Three-factor control protocol based on elliptic curve cryptosystem for universal serial bus mass storage devices
-
Jan.
-
C. Lee, C. Chen, and P. Wu, "Three-factor control protocol based on elliptic curve cryptosystem for universal serial bus mass storage devices," IET Computers & Digital Techniques, vol. 7, no. 1, pp. 48-55, Jan. 2013.
-
(2013)
IET Computers & Digital Techniques
, vol.7
, Issue.1
, pp. 48-55
-
-
Lee, C.1
Chen, C.2
Wu, P.3
-
15
-
-
70349792182
-
An efficient biometrics-based remote user authentication scheme using smart cards
-
Elsevier Jan.
-
C.-T. Li, and M.-S. Hwang, "An efficient biometrics-based remote user authentication scheme using smart cards," Journal of Network and Computer Applications, Elsevier, vol. 33, no. 1, pp. 1-5, Jan. 2010.
-
(2010)
Journal of Network and Computer Applications
, vol.33
, Issue.1
, pp. 1-5
-
-
Li, C.-T.1
Hwang, M.-S.2
-
17
-
-
81855227196
-
Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards
-
Sept.
-
A. Das, "Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards", IET Information Security, vol. 5, no. 3, pp. 145-151, Sept. 2011.
-
(2011)
IET Information Security
, vol.5
, Issue.3
, pp. 145-151
-
-
Das, A.1
-
18
-
-
35048865463
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Proc. 2004 Int. Conf. Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland
-
Y. Dodis, L. Reyzin, and A. Smith, "Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data," in Proc. 2004 Int. Conf. Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, in Lecture Notes in Computer Science, pp. 523-540, 2004.
-
(2004)
Lecture Notes in Computer Science
, pp. 523-540
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
19
-
-
0025386404
-
A logic of authentication
-
Feb.
-
M. Burrows, M. Abadi, and R. Needham, "A logic of authentication," ACM Trans. Computer Systems, vol. 8, no. 1, pp. 18-36, Feb. 1990.
-
(1990)
ACM Trans. Computer Systems
, vol.8
, Issue.1
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
20
-
-
84874108902
-
HOTA: Handover optimized ticket-based authentication in network-based mobility management
-
Elsevier May
-
J.-H. Lee and J.-M. Bonnin, "HOTA: Handover Optimized Ticket-based Authentication in Network-based Mobility Management," Information Sciences, Elsevier, vol. 230, pp. 64-77, May 2013.
-
(2013)
Information Sciences
, vol.230
, pp. 64-77
-
-
Lee, J.-H.1
Bonnin, J.-M.2
-
21
-
-
33747419291
-
Applied cryptography protocols algorithms
-
Wiley
-
B. Schneier, Applied cryptography protocols algorithms, 2nd ed., Wiley, 1996.
-
(1996)
2nd Ed.
-
-
Schneier, B.1
|