-
1
-
-
33747171940
-
The importance of proofs of security for key establishment protocols. Formal analysis of Jan-Chen, Yang-Shen-Shieh, Kim-Huh-Hwang-Lee, Lin-Sun-Hwang, and Yeh-Sun protocols
-
DOI 10.1016/j.comcom.2005.10.030, PII S0140366405004202
-
K. -K. R. Choo, C. Boyd, and Y. Hitchcock, "The Importance of Proofs of Security for Key Establishment Protocols: Formal Analysis of Jan-Chen, Yang-Shen-Shieh, Kim-Huh-Hwang-Lee, Lin-Sun-Hwang, Yeh-Sun Protocols, " Comput. Commun., vol. 29, no. 15, pp. 2788-2797, Sept. 2006. (Pubitemid 44232964)
-
(2006)
Computer Communications
, vol.29
, Issue.15
, pp. 2788-2797
-
-
Raymond Choo, K.-K.1
Boyd, C.2
Hitchcock, Y.3
-
2
-
-
0036302680
-
An efficient and practical solution to remote authentication: Smart card
-
DOI 10.1016/S0167-4048(02)00415-7
-
H. Chien, J. Jan, and Y. Tseng, "An Efficient and Practical Solution to Remote Authentication: Smart Card, " Comput. Security, vol. 21, no. 4, pp. 372-375, Aug. 2002. (Pubitemid 34715241)
-
(2002)
Computers and Security
, vol.21
, Issue.4
, pp. 372-375
-
-
Chien, H.-Y.1
Jan, J.-K.2
Tseng, Y.-M.3
-
3
-
-
34247505487
-
Security enhancement of an ic-card-based remote login mechanism
-
June
-
T. F. Cheng, J. S. Lee, and C. C. Chang, "Security Enhancement of an IC-Card-Based Remote Login Mechanism, " Comput. Netw., vol. 51, no. 9, pp. 2280-2287, June 2007.
-
(2007)
Comput. Netw.
, vol.51
, Issue.9
, pp. 2280-2287
-
-
Cheng, T.F.1
Lee, J.S.2
Chang, C.C.3
-
4
-
-
28044451335
-
Robust remote authentication scheme with smart cards
-
DOI 10.1016/j.cose.2005.03.006, PII S0167404805000477
-
C. -I. Fan, Y. -C. Chan, and Z. -K. Zhang, "Robust Remote Authentication Scheme with Smart Cards, " Comput. Security, vol. 24, no. 8, pp. 619-628, Nov. 2005. (Pubitemid 41690975)
-
(2005)
Computers and Security
, vol.24
, Issue.8
, pp. 619-628
-
-
Fan, C.-I.1
Chan, Y.-C.2
Zhang, Z.-K.3
-
5
-
-
51249099350
-
A k-nearestneighbor approach for user authentication through biometric keystroke dynamics
-
Beijing, China, May
-
J. Hu, D. Gingrich, and A. Sentosa, "A k-NearestNeighbor Approach for User Authentication Through Biometric Keystroke Dynamics, " in Proc. IEEE ICC Conf., Beijing, China, May 2008, pp. 1556-1560.
-
(2008)
Proc. IEEE ICC Conf.
, pp. 1556-1560
-
-
Hu, J.1
Gingrich, D.2
Sentosa, A.3
-
6
-
-
0742268499
-
Security of Chien et al. 'S Remote User Authentication Scheme Using Smart Cards
-
May
-
C. L. Hsu, "Security of Chien et al. 's Remote User Authentication Scheme Using Smart Cards, " Comput. Stand. Interfaces, vol. 26, no. 3, pp. 167-169, May 2004.
-
(2004)
Comput. Stand. Interfaces
, vol.26
, Issue.3
, pp. 167-169
-
-
Hsu, C.L.1
-
7
-
-
79959689122
-
A generic framework for three-factor authentication: Preserving security and privacy in distributed systems
-
Aug.
-
X. Huang, Y. Xiang, A. Chonka, J. Zhou, and R. H. Deng, "A Generic Framework for Three-Factor Authentication: Preserving Security And Privacy in Distributed Systems, " IEEE Trans. Parallel Distrib. Syst., vol. 22, no. 8, pp. 1390-1397, Aug. 2011.
-
(2011)
IEEE Trans. Parallel Distrib. Syst.
, vol.22
, Issue.8
, pp. 1390-1397
-
-
Huang, X.1
Xiang, Y.2
Chonka, A.3
Zhou, J.4
Deng, R.H.5
-
8
-
-
62549133356
-
Robust and efficient password authenticated key agreement using smart cards
-
June
-
W. S. Juang, S. T. Chen, and H. T. Liaw, "Robust and Efficient Password Authenticated Key Agreement Using Smart Cards, " IEEE Trans. Ind. Electron., vol. 55, no. 6, pp. 2551-2556, June 2008.
-
(2008)
IEEE Trans. Ind. Electron.
, vol.55
, Issue.6
, pp. 2551-2556
-
-
Juang, W.S.1
Chen, S.T.2
Liaw, H.T.3
-
9
-
-
1942423677
-
Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards
-
Feb.
-
W. C. Ku and S. M. Chen, "Weaknesses and Improvements of an Efficient Password Based Remote User Authentication Scheme Using Smart Cards, " IEEE Trans. Consum. Electron., vol. 50, no. 1, pp. 204-207, Feb. 2004.
-
(2004)
IEEE Trans. Consum. Electron.
, vol.50
, Issue.1
, pp. 204-207
-
-
Ku, W.C.1
Chen, S.M.2
-
10
-
-
84939573910
-
Differential power analysis
-
vol. LNCS 1666, M. J. Wiener, Ed., vol. LNCS 1666
-
P. C. Kocher, J. Jaffe, and B. Jun, "Differential Power Analysis, " in Proc. Adv. CRYPTO, vol. LNCS 1666, M. J. Wiener, Ed., 1999, vol. LNCS 1666, pp. 388-397.
-
(1999)
Proc. Adv. CRYPTO
, pp. 388-397
-
-
Kocher, P.C.1
Jaffe, J.2
Jun, B.3
-
11
-
-
0019634370
-
Password authentication with insecure communication
-
Nov.
-
L. Lamport, "Password Authentication with Insecure Communication, " Commun. ACM., vol. 24, no. 11, pp. 770-772, Nov. 1981.
-
(1981)
Commun. ACM.
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
12
-
-
33750133438
-
Security enhancement on a new authentication scheme with anonymity for wireless environments
-
DOI 10.1109/TIE.2006.881998
-
C. Lee, M. Hwang, and I. Liao, "Security Enhancement on a New Authentication SchemewithAnonymity forWireless Environments, " IEEE Trans. Ind. Electron., vol. 53, no. 5, pp. 1683-1687, Oct. 2006. (Pubitemid 44593519)
-
(2006)
IEEE Transactions on Industrial Electronics
, vol.53
, Issue.5
, pp. 1683-1687
-
-
Lee, C.-C.1
Hwang, M.-S.2
Liao, I.-E.3
-
13
-
-
82555196697
-
Becan: A bandwidth-efficient cooperative authentication scheme for filtering injected false data in wireless sensor networks
-
Jan.
-
R. Lu, X. Lin, H. Zhu, X. Liang, and X. Shen, "BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks, " IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 1, pp. 32-43, Jan. 2012.
-
(2012)
IEEE Trans. Parallel Distrib. Syst.
, vol.23
, Issue.1
, pp. 32-43
-
-
Lu, R.1
Lin, X.2
Zhu, H.3
Liang, X.4
Shen, X.5
-
14
-
-
9544227377
-
Improvement of Chien et al. 'S Remote User Authentication Scheme Using Smart Cards
-
Jan.
-
S. W. Lee, H. S. Kim, and K. Y. Yoo, "Improvement of Chien et al. 's Remote User Authentication Scheme Using Smart Cards, " Comput. Stand. Interfaces, vol. 27, no. 2, pp. 181-183, Jan. 2005.
-
(2005)
Comput. Stand. Interfaces
, vol.27
, Issue.2
, pp. 181-183
-
-
Lee, S.W.1
Kim, H.S.2
Yoo, K.Y.3
-
15
-
-
44549086640
-
A new mutual authentication scheme based onnonce and smart cards
-
June
-
J. Y. Liu, A. M. Zhou, and M. X. Gao, "A New Mutual Authentication Scheme Based onNonce and Smart Cards, " Comput. Commun., vol. 31, no. 10, pp. 2205-2209, June 2008.
-
(2008)
Comput. Commun.
, vol.31
, Issue.10
, pp. 2205-2209
-
-
Liu, J.Y.1
Zhou, A.M.2
Gao, M.X.3
-
16
-
-
84891804845
-
Certificateless remote anonymous authentication schemes for wireless body area networks
-
Feb. [Online]. Available
-
J. Liu, Z. Zhang, X. Chen, and K. S. Kwak. (2014, Feb. ). Certificateless Remote Anonymous Authentication Schemes for Wireless Body Area Networks. IEEE Trans. Parallel Distrib. Syst. [Online]. 25(2), pp. 332-342. Available: http://doi. ieeecomputersociety. org/10. 1109/TPDS. 2013. 145.
-
(2014)
IEEE Trans. Parallel Distrib. Syst.
, vol.25
, Issue.2
, pp. 332-342
-
-
Liu, J.1
Zhang, Z.2
Chen, X.3
Kwak, K.S.4
-
17
-
-
0036566408
-
Examining smart-card security under the threat of power analysis attacks
-
DOI 10.1109/TC.2002.1004593
-
T. S. Messerges, E. A. Dabbish, and R. H. Sloan, "Examining Smart-Card Security Under the Threat of Power Analysis Attacks, " IEEE Trans. Comput., vol. 51, no. 5, pp. 541-552, May 2002. (Pubitemid 34550462)
-
(2002)
IEEE Transactions on Computers
, vol.51
, Issue.5
, pp. 541-552
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
-
18
-
-
54349125537
-
Aremoteuserauthentication scheme withoutusing smartcards
-
Jan.
-
H. S. Rhee, J. O. Kwon, andD. H. Lee, "ARemoteUserAuthentication Scheme withoutUsing SmartCards, " Comput. Stand. Interfaces, vol. 31, no. 1, pp. 6-13, Jan. 2009.
-
(2009)
Comput. Stand. Interfaces
, vol.31
, Issue.1
, pp. 6-13
-
-
Rhee, H.S.1
Kwon, J.O.2
Lee, A.H.3
-
19
-
-
0034318245
-
An efficient remote user authentication scheme using smart cards
-
Nov.
-
H. Sun, "An Efficient Remote User Authentication Scheme Using Smart Cards, " IEEE Trans. Consum. Electron., vol. 46, no. 4, pp. 958-961, Nov. 2000.
-
(2000)
IEEE Trans. Consum. Electron.
, vol.46
, Issue.4
, pp. 958-961
-
-
Sun, H.1
-
20
-
-
67649386419
-
Improvements of Juang et al. 'S Password-Authenticated Key Agreement Scheme Using Smart Cards
-
June
-
D. Z. Sun, J. P. Huai, J. Z. Sun, J. X. Li, J. W. Zhang, and Z. Y. Feng, "Improvements of Juang et al. 's Password-Authenticated Key Agreement Scheme Using Smart Cards, " IEEE Trans. Ind. Electron., vol. 56, no. 6, pp. 2284-2291, June 2009.
-
(2009)
IEEE Trans. Ind. Electron.
, vol.56
, Issue.6
, pp. 2284-2291
-
-
Sun, D.Z.1
Huai, J.P.2
Sun, J.Z.3
Li, J.X.4
Zhang, J.W.5
Feng, Z.Y.6
-
21
-
-
27144545000
-
Weakness and improvement on Wang-Li-Tie's user-friendly remote authentication scheme
-
DOI 10.1016/j.amc.2005.01.013, PII S0096300305000573
-
D. Z. Sun, J. D. Zhong, and Y. Sun, "Weakness and Improvement on Wang-Li-Tie's User-Friendly Remote Authentication Scheme, " Appl. Math. Comput., vol. 170, no. 2, pp. 1185-1193, Nov. 2005. (Pubitemid 41497826)
-
(2005)
Applied Mathematics and Computation
, vol.170
, Issue.2
, pp. 1185-1193
-
-
Sun, D.-Z.1
Zhong, J.-D.2
Sun, Y.3
-
22
-
-
84862518455
-
Mobile device access control: An improved correction based face authentication scheme and its java me application
-
July
-
K. Xi, J. Hu, and F. Han, "Mobile Device Access Control: An Improved Correction Based Face Authentication Scheme and Its Java ME Application, " Curr. Comput., Pract. Exp., vol. 24, no. 10, pp. 1066-1085, July 2011.
-
(2011)
Curr. Comput., Pract. Exp.
, vol.24
, Issue.10
, pp. 1066-1085
-
-
Xi, K.1
Hu, J.2
Han, F.3
-
23
-
-
64249125305
-
An improved smart card based password authentication scheme with provable security
-
June
-
J. Xu, W. -T. Zhu, and D. -G. Feng, "An Improved Smart Card Based Password Authentication Scheme With Provable Security, " Comput. Stand. Inter., vol. 31, no. 4, pp. 723-728, June 2009.
-
(2009)
Comput. Stand. Inter.
, vol.31
, Issue.4
, pp. 723-728
-
-
Xu, J.1
Zhu, W.-T.2
Feng, D.-G.3
-
24
-
-
0033350090
-
Password authentication schemes with smart cards
-
DOI 10.1016/S0167-4048(99)80136-9
-
W. Yang and S. Shieh, "Password Authentication Schemes with Smart Cards, " Comput. Security, vol. 18, no. 8, pp. 727-733, 1999. (Pubitemid 30518700)
-
(1999)
Computers and Security
, vol.18
, Issue.8
, pp. 727-733
-
-
Yang, W.-H.1
Shieh, S.-P.2
-
25
-
-
4043152192
-
Further improvement of an efficient password based remote user authentication scheme using smart cards
-
May
-
E. J. Yoon, E. K. Ryu, and K. Y. Yoo, "Further Improvement of an Efficient Password Based Remote User Authentication Scheme Using Smart Cards, " IEEE Trans. Consum. Electron., vol. 50, no. 2, pp. 612-614, May 2004.
-
(2004)
IEEE Trans. Consum. Electron.
, vol.50
, Issue.2
, pp. 612-614
-
-
Yoon, E.J.1
Ryu, E.K.2
Yoo, K.Y.3
|