-
1
-
-
33646261491
-
Authenticated encryption schemes: Current status and key issues
-
Hwang M. S., Liu C. Y., Authenticated encryption schemes: current status and key issues. International Journal of Network Security 2005 1 2 61 73
-
(2005)
International Journal of Network Security
, vol.1
, Issue.2
, pp. 61-73
-
-
Hwang, M.S.1
Liu, C.Y.2
-
2
-
-
9544232528
-
Improved remote authentication scheme with smart card
-
2-s2.0-9544232528 10.1016/j.csi.2004.06.001
-
Lee N.-Y., Chiu Y.-C., Improved remote authentication scheme with smart card. Computer Standards and Interfaces 2005 27 2 177 180 2-s2.0-9544232528 10.1016/j.csi.2004.06.001
-
(2005)
Computer Standards and Interfaces
, vol.27
, Issue.2
, pp. 177-180
-
-
Lee, N.-Y.1
Chiu, Y.-C.2
-
4
-
-
33646236878
-
A simple attack on a recently introduced hash-based strong-password authentication scheme
-
Kim M., Koc C. K., A simple attack on a recently introduced hash-based strong-password authentication scheme. International Journal of Network Security 2005 1 2 77 80
-
(2005)
International Journal of Network Security
, vol.1
, Issue.2
, pp. 77-80
-
-
Kim, M.1
Koc, C.K.2
-
5
-
-
33845458336
-
A dynamic user authentication scheme for wireless sensor networks
-
June 2006 Taichung, Taiwan 2-s2.0-33845458336 10.1109/SUTC.2006.1636182
-
Wong K. H. M., Yuan Z., Jiannong C., Shengwei W., A dynamic user authentication scheme for wireless sensor networks. Proceedings of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC '06) June 2006 Taichung, Taiwan 244 251 2-s2.0-33845458336 10.1109/SUTC.2006.1636182
-
Proceedings of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC '06)
, pp. 244-251
-
-
Wong, K.H.M.1
Yuan, Z.2
Jiannong, C.3
Shengwei, W.4
-
6
-
-
39349093196
-
An improved dynamic user authentication scheme for wireless sensor networks
-
November 2007 Washington, DC, USA 2-s2.0-39349093196 10.1109/GLOCOM.2007. 190
-
Tseng H.-R., Jan R.-H., Yang W., An improved dynamic user authentication scheme for wireless sensor networks. Proceedings of the 50th Annual IEEE Global Telecommunications Conference (GLOBECOM '07) November 2007 Washington, DC, USA 986 990 2-s2.0-39349093196 10.1109/GLOCOM.2007.190
-
Proceedings of the 50th Annual IEEE Global Telecommunications Conference (GLOBECOM '07)
, pp. 986-990
-
-
Tseng, H.-R.1
Jan, R.-H.2
Yang, W.3
-
8
-
-
62449290253
-
A novel dynamic user authentication scheme for wireless sensor networks
-
October 2008 Reykjavik, Iceland 2-s2.0-62449290253 10.1109/ISWCS.2008. 4726128
-
Ko L.-C., A novel dynamic user authentication scheme for wireless sensor networks. Proceedings of the IEEE International Symposium on Wireless Communication Systems (ISWCS '08) October 2008 Reykjavik, Iceland 608 612 2-s2.0-62449290253 10.1109/ISWCS.2008.4726128
-
Proceedings of the IEEE International Symposium on Wireless Communication Systems (ISWCS '08)
, pp. 608-612
-
-
Ko, L.-C.1
-
9
-
-
77956388579
-
User authentication schemes with pseudonymity for ubiquitous sensor network in NGN
-
2-s2.0-77956388579 10.1002/dac.1097
-
Vaidya B., Rodrigues J. J., Park J. H., User authentication schemes with pseudonymity for ubiquitous sensor network in NGN. International Journal of Communication Systems 2010 23 9-10 1201 1222 2-s2.0-77956388579 10.1002/dac.1097
-
(2010)
International Journal of Communication Systems
, vol.23
, Issue.9-10
, pp. 1201-1222
-
-
Vaidya, B.1
Rodrigues, J.J.2
Park, J.H.3
-
10
-
-
0013017020
-
The advanced encryption standard
-
Daemen J., Rijndael R. V., The advanced encryption standard. Dr. Dobb's Journal 2001 26 3 137 139
-
(2001)
Dr. Dobb's Journal
, vol.26
, Issue.3
, pp. 137-139
-
-
Daemen, J.1
Rijndael, R.V.2
-
11
-
-
70349792182
-
An efficient biometrics-based remote user authentication scheme using smart cards
-
2-s2.0-70349792182 10.1016/j.jnca.2009.08.001
-
Li C.-T., Hwang M.-S., An efficient biometrics-based remote user authentication scheme using smart cards. Journal of Network and Computer Applications 2010 33 1 1 5 2-s2.0-70349792182 10.1016/j.jnca.2009.08.001
-
(2010)
Journal of Network and Computer Applications
, vol.33
, Issue.1
, pp. 1-5
-
-
Li, C.-T.1
Hwang, M.-S.2
-
13
-
-
1342275940
-
-
New York, NY, USA Springer
-
Maltoni D., Maio D., Jain A. K., Prabhakar S., Handbook of Fingerprint Recognition 2009 New York, NY, USA Springer
-
(2009)
Handbook of Fingerprint Recognition
-
-
Maltoni, D.1
Maio, D.2
Jain, A.K.3
Prabhakar, S.4
-
14
-
-
0742302036
-
Biometric recognition: Security and privacy concerns
-
2-s2.0-0742302036 10.1109/MSECP.2003.1193209
-
Prabhakar S., Pankanti S., Jain A. K., Biometric recognition: security and privacy concerns. IEEE Security and Privacy 2003 1 2 33 42 2-s2.0-0742302036 10.1109/MSECP.2003.1193209
-
(2003)
IEEE Security and Privacy
, vol.1
, Issue.2
, pp. 33-42
-
-
Prabhakar, S.1
Pankanti, S.2
Jain, A.K.3
-
15
-
-
84893552967
-
A biometric approach for continuous user authentication by fusing hard and soft traits
-
Prakash A., A biometric approach for continuous user authentication by fusing hard and soft traits. International Journal of Network Security 2014 16 1 65 70
-
(2014)
International Journal of Network Security
, vol.16
, Issue.1
, pp. 65-70
-
-
Prakash, A.1
-
16
-
-
70349844594
-
A biometric authentication protocol for 3G mobile systems: Modelled and validated using CSP and rank functions
-
Dimitriadis C. K., Shaikh S. A., A biometric authentication protocol for 3G mobile systems: modelled and validated using CSP and rank functions. International Journal of Network Security 2007 5 1 99 111
-
(2007)
International Journal of Network Security
, vol.5
, Issue.1
, pp. 99-111
-
-
Dimitriadis, C.K.1
Shaikh, S.A.2
-
17
-
-
84863011260
-
Security weaknesses and improvements of a fingerprint-based remote user authentication scheme using smart cards
-
2-s2.0-84856658957 10.4156/ijact.vol4.issue1.2
-
Yang A., Security weaknesses and improvements of a fingerprint-based remote user authentication scheme using smart cards. International Journal of Advancements in Computing Technology 2012 4 3 21 28 2-s2.0-84856658957 10.4156/ijact.vol4.issue1.2
-
(2012)
International Journal of Advancements in Computing Technology
, vol.4
, Issue.3
, pp. 21-28
-
-
Yang, A.1
-
18
-
-
84864950885
-
Security analysis and enhancements of an effective biometric-based remote user authentication scheme using smart cards
-
519723 10.1155/2012/519723
-
Younghwa A. N., Security analysis and enhancements of an effective biometric-based remote user authentication scheme using smart cards. Journal of Biomedicine and Biotechnology 2012 2012 6 519723 10.1155/2012/519723
-
(2012)
Journal of Biomedicine and Biotechnology
, vol.2012
, pp. 6
-
-
Younghwa, A.N.1
-
19
-
-
4043139259
-
A flexible biometrics remote user authentication scheme
-
2-s2.0-4043139259 10.1016/j.csi.2004.03.003
-
Lin C.-H., Lai Y.-Y., A flexible biometrics remote user authentication scheme. Computer Standards and Interfaces 2004 27 1 19 23 2-s2.0-4043139259 10.1016/j.csi.2004.03.003
-
(2004)
Computer Standards and Interfaces
, vol.27
, Issue.1
, pp. 19-23
-
-
Lin, C.-H.1
Lai, Y.-Y.2
-
20
-
-
70349792182
-
An efficient biometrics-based remote user authentication scheme using smart cards
-
2-s2.0-70349792182 10.1016/j.jnca.2009.08.001
-
Li C.-T., Hwang M.-S., An efficient biometrics-based remote user authentication scheme using smart cards. Journal of Network and Computer Applications 2010 33 1 1 5 2-s2.0-70349792182 10.1016/j.jnca.2009.08.001
-
(2010)
Journal of Network and Computer Applications
, vol.33
, Issue.1
, pp. 1-5
-
-
Li, C.-T.1
Hwang, M.-S.2
-
21
-
-
81855227196
-
Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards
-
2-s2.0-81855227196 10.1049/iet-ifs.2010.0125
-
Das A. K., Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards. IET Information Security 2011 5 3 145 151 2-s2.0-81855227196 10.1049/iet-ifs.2010.0125
-
(2011)
IET Information Security
, vol.5
, Issue.3
, pp. 145-151
-
-
Das, A.K.1
-
22
-
-
35248839355
-
New shielding functions to enhance privacy and prevent misuse of biometric templates
-
Lecture Notes in Computer Science
-
Linnartz J. P., Tuyls P., New shielding functions to enhance privacy and prevent misuse of biometric templates. 2688 Proceedings of the Audio and Video-Based Biometric Person Authentication 2003 393 402 Lecture Notes in Computer Science
-
(2003)
Proceedings of the Audio and Video-Based Biometric Person Authentication
, vol.2688
, pp. 393-402
-
-
Linnartz, J.P.1
Tuyls, P.2
|