-
1
-
-
79959763451
-
Cryptanalysis of Hsiang–Shih's authentication scheme for multi-server architecture
-
Yeh KH, Lo NW, Li YJ. Cryptanalysis of Hsiang–Shih's authentication scheme for multi-server architecture. International Journal of Communication Systems 2011; 24(7):829–836.
-
(2011)
International Journal of Communication Systems
, vol.24
, Issue.7
, pp. 829-836
-
-
Yeh, K.H.1
Lo, N.W.2
Li, Y.J.3
-
2
-
-
79952059658
-
Lightweight and provably secure user authentication with anonymity for the global mobility network
-
Chen C, He DJ, Chan SM, Bu JJ, Gao Y, Fan R. Lightweight and provably secure user authentication with anonymity for the global mobility network. International Journal of Communication Systems 2011; 24(3):347–362.
-
(2011)
International Journal of Communication Systems
, vol.24
, Issue.3
, pp. 347-362
-
-
Chen, C.1
He, D.J.2
Chan, S.M.3
Bu, J.J.4
Gao, Y.5
Fan, R.6
-
3
-
-
84870350603
-
Cryptanalysis of a dynamic ID-based remote user authentication with key agreement scheme
-
Tang HB, Liu XS. Cryptanalysis of a dynamic ID-based remote user authentication with key agreement scheme. International Journal of Communication Systems 2012; 25(12):1639–1644.
-
(2012)
International Journal of Communication Systems
, vol.25
, Issue.12
, pp. 1639-1644
-
-
Tang, H.B.1
Liu, X.S.2
-
4
-
-
84859161671
-
Towards generalized ID-based user authentication for mobile multi-server environment
-
Chuang YH, Tseng YM. Towards generalized ID-based user authentication for mobile multi-server environment. International Journal of Communication Systems 2012; 25(4):447–460.
-
(2012)
International Journal of Communication Systems
, vol.25
, Issue.4
, pp. 447-460
-
-
Chuang, Y.H.1
Tseng, Y.M.2
-
7
-
-
84864058187
-
A more secure authentication scheme for telecare medicine information systems
-
He D, Chen J, Zhang R. A more secure authentication scheme for telecare medicine information systems. Journal of Medical Systems 2012; 36(3):1989–1995.
-
(2012)
Journal of Medical Systems
, vol.36
, Issue.3
, pp. 1989-1995
-
-
He, D.1
Chen, J.2
Zhang, R.3
-
8
-
-
84863985527
-
A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography
-
He D, Chen J, Chen Y. A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography. Security and Communication Networks 2012; 5(12):1423–1429. DOI: 10.1002/sec.506.
-
(2012)
Security and Communication Networks
, vol.5
, Issue.12
, pp. 1423-1429
-
-
He, D.1
Chen, J.2
Chen, Y.3
-
9
-
-
84891688392
-
Anonymous two-factor authentication for consumer roaming service in Global Mobility Networks
-
He D, Kumar N, Lee J-H. Anonymous two-factor authentication for consumer roaming service in Global Mobility Networks. IEEE Transactions on Consumer Electronics 2013; 59(4):811–817.
-
(2013)
IEEE Transactions on Consumer Electronics
, vol.59
, Issue.4
, pp. 811-817
-
-
He, D.1
Kumar, N.2
Lee, J.-H.3
-
10
-
-
85027949488
-
Robust biometrics-based authentication scheme for multi-server environment
-
He D, Wang D. Robust biometrics-based authentication scheme for multi-server environment. IEEE Systems Journal 2014. DOI: 10.1109/JSYST.2014.2301517.
-
(2014)
IEEE Systems Journal
-
-
He, D.1
Wang, D.2
-
11
-
-
62349142332
-
Analysis of smart card-based remote user authentication schemes
-
Las Vegas, USA
-
Song R, Korba L, Yee G. Analysis of smart card-based remote user authentication schemes. Proceedings of the 2007 International Conference on Security and Management, Las Vegas, USA, 2007; 323–329.
-
(2007)
Proceedings of the 2007 International Conference on Security and Management
, pp. 323-329
-
-
Song, R.1
Korba, L.2
Yee, G.3
-
13
-
-
77955312905
-
Advanced smartcard based password authentication protocol
-
Song R. Advanced smartcard based password authentication protocol. Computer Standards and Interfaces 2010; 32(5):321–325.
-
(2010)
Computer Standards and Interfaces
, vol.32
, Issue.5
, pp. 321-325
-
-
Song, R.1
-
14
-
-
77952983609
-
An improvement of Xu et al.'s authentication scheme using smartcards
-
Bangalore, Karnataka, India
-
Sood SK, Sarje AK, Singh K, An improvement of Xu et al.'s authentication scheme using smartcards. Proceedings of the Third Annual ACM Bangalore Conference, Bangalore, Karnataka, India, 2010; 17–25.
-
(2010)
Proceedings of the Third Annual ACM Bangalore Conference
, pp. 17-25
-
-
Sood, S.K.1
Sarje, A.K.2
Singh, K.3
-
15
-
-
64249125305
-
An improved smartcard based password authentication scheme with provable security
-
Xu J, Zhu WT, Feng DG. An improved smartcard based password authentication scheme with provable security. Computer Standards and Interfaces 2009; 31(4):723–728.
-
(2009)
Computer Standards and Interfaces
, vol.31
, Issue.4
, pp. 723-728
-
-
Xu, J.1
Zhu, W.T.2
Feng, D.G.3
-
19
-
-
84939573910
-
Differential power analysis
-
LNCS, Springer Berlin Heidelberg
-
Kocher P, Jaffe J, Jun B. Differential power analysis. Proceedings of Advances in Cryptology (Crypto’99), LNCS, Springer Berlin Heidelberg, 1999; 388–397.
-
(1999)
Proceedings of Advances in Cryptology (Crypto’99)
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
21
-
-
64249169230
-
Weaknesses and improvement of Wang et al.'s remote user password authentication scheme for resource-limited environments
-
Chung H-R, Ku W-C, Tsaur M-J. Weaknesses and improvement of Wang et al.'s remote user password authentication scheme for resource-limited environments. Computer Standards and Interfaces 2009; 31: 863–868.
-
(2009)
Computer Standards and Interfaces
, vol.31
, pp. 863-868
-
-
Chung, H.-R.1
Ku, W.-C.2
Tsaur, M.-J.3
-
22
-
-
84914669082
-
Cryptanalysis and improvement of ‘a robust smart-card-based remote user password authentication scheme’
-
Kumari S, Khan MK. Cryptanalysis and improvement of ‘a robust smart-card-based remote user password authentication scheme’. International Journal of Communication Systems 2013. DOI: 10.1002/dac.2590.
-
(2013)
International Journal of Communication Systems
-
-
Kumari, S.1
Khan, M.K.2
-
24
-
-
38149061118
-
-
Cryptology ePrint Archieve, Report 2005/129
-
Cheng Z, Nistazakis M, Comley R, Vasiu L. On the indistinguishability-based security model of key agreement protocols-simple cases. Cryptology ePrint Archieve, Report 2005/129, 2005.
-
(2005)
On the indistinguishability-based security model of key agreement protocols-simple cases
-
-
Cheng, Z.1
Nistazakis, M.2
Comley, R.3
Vasiu, L.4
-
26
-
-
57049121750
-
Certificateless authenticated two-party key agreement protocols
-
Mandt T, Tan C. Certificateless authenticated two-party key agreement protocols. Proceedings of the ASIAN, 2008; 37–44.
-
(2008)
Proceedings of the ASIAN
, pp. 37-44
-
-
Mandt, T.1
Tan, C.2
-
27
-
-
78651562638
-
Cryptanalysis of identity-based authenticated key agreement protocols from parings
-
Hou M, Xu Q, Shanqing G, Jiang H. Cryptanalysis of identity-based authenticated key agreement protocols from parings. Journal of Networks 2010; 5(7):826–855.
-
(2010)
Journal of Networks
, vol.5
, Issue.7
, pp. 826-855
-
-
Hou, M.1
Xu, Q.2
Shanqing, G.3
Jiang, H.4
-
28
-
-
78751642788
-
Cryptanalysis and security enhancement of a ‘more efficient & secure dynamic ID-based remote user authentication scheme’
-
Khan MK, Kim S-K, Alghathbr K. Cryptanalysis and security enhancement of a ‘more efficient & secure dynamic ID-based remote user authentication scheme’. Computer Communications 2011; 34: 305–309.
-
(2011)
Computer Communications
, vol.34
, pp. 305-309
-
-
Khan, M.K.1
Kim, S.-K.2
Alghathbr, K.3
-
29
-
-
68849128250
-
Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment
-
Hsiang H-C, Shis W-K. Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment. Computer Standards and Interfaces 2009; 31: 1118–1123.
-
(2009)
Computer Standards and Interfaces
, vol.31
, pp. 1118-1123
-
-
Hsiang, H.-C.1
Shis, W.-K.2
|