-
1
-
-
84904062321
-
-
Accessed Jan 2013
-
AVISPA: Automated validation of internet security protocols and applications. http://www.avispa-project.org/. Accessed Jan 2013.
-
-
-
-
2
-
-
84904055078
-
-
Accessed Sept 2013
-
AVISPA: AVISPA Web Tool. http://www.avispa-project.org/web-interface/ expert.php/. Accessed Sept 2013.
-
AVISPA: AVISPA Web Tool
-
-
-
3
-
-
84881359003
-
A biometric authentication scheme for telecare medicine information systems with nonce
-
Awasthi, A. K., and Srivastava, K., A biometric authentication scheme for telecare medicine information systems with nonce. J. Med. Syst. 37(5):1-4, 2013.
-
(2013)
J. Med. Syst.
, vol.37
, Issue.5
, pp. 1-4
-
-
Awasthi, A.K.1
Srivastava, K.2
-
4
-
-
19744367735
-
OFMC: A symbolic model checker for security protocols
-
DOI 10.1007/s10207-004-0055-7
-
Basin, D., Modersheim, S., and Vigano, L., OFMC: A symbolic model checker for security protocols. Int. J. Inf. Sec. 4(3):181-208, 2005. (Pubitemid 40743365)
-
(2005)
International Journal of Information Security
, vol.4
, Issue.3
, pp. 181-208
-
-
Basin, D.1
Modersheim, S.2
Vigano, L.3
-
5
-
-
84872112386
-
An uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care
-
Chang, Y.-F., Yu, S.-H., and Shiao, D.-R., An uniqueness-and-anonymity- preserving remote user authentication scheme for connected health care. J. Med. Syst. 37:9902, 2013.
-
(2013)
J. Med. Syst.
, vol.37
, pp. 9902
-
-
Chang, Y.-F.1
Yu, S.-H.2
Shiao, D.-R.3
-
6
-
-
84872112386
-
An uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care
-
Chang, Y.-F., Yu, S.-H., and Shiao, D.-R., An uniqueness-and-anonymity- preserving remote user authentication scheme for connected health care. J. Med. Syst. 37:1-9, 2013.
-
(2013)
J. Med. Syst.
, vol.37
, pp. 1-9
-
-
Chang, Y.-F.1
Yu, S.-H.2
Shiao, D.-R.3
-
7
-
-
81855227196
-
Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards
-
Das, A. K., Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards. IET Inf. Sec. 5(3):145-151, 2011.
-
(2011)
IET Inf. Sec.
, vol.5
, Issue.3
, pp. 145-151
-
-
Das, A.K.1
-
8
-
-
84890560968
-
A secure and effective user authentication and privacy preserving protocol with smart cards for wireless communications
-
Das, A. K., A secure and effective user authentication and privacy preserving protocol with smart cards for wireless communications. Netw. Sci. 2(1-2):12-27, 2013.
-
(2013)
Netw. Sci.
, vol.2
, Issue.1-2
, pp. 12-27
-
-
Das, A.K.1
-
9
-
-
84877090869
-
A secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care
-
Das, A. K., and Goswami, A., A secure and efficient uniqueness-and- anonymity-preserving remote user authentication scheme for connected health care. J. Med. Syst. 37(3):1-16, 2013.
-
(2013)
J. Med. Syst.
, vol.37
, Issue.3
, pp. 1-16
-
-
Das, A.K.1
Goswami, A.2
-
10
-
-
84878621601
-
A novel proxy signature scheme based on user hierarchical access control policy
-
Das, A. K., Massand, A., and Patil, S., A novel proxy signature scheme based on user hierarchical access control policy. J. King Saud University - Comput. Inf. Sci. 25(2):219-228, 2013.
-
(2013)
J. King Saud University - Comput. Inf. Sci.
, vol.25
, Issue.2
, pp. 219-228
-
-
Das, A.K.1
Massand, A.2
Patil, S.3
-
11
-
-
84862699099
-
Cryptanalysis and improvement of an access control in user hierarchy based on elliptic curve cryptosystem
-
Das, A. K., Paul, N. R., and Tripathy, L., Cryptanalysis and improvement of an access control in user hierarchy based on elliptic curve cryptosystem. Inf. Sci. 209:80-92, 2012.
-
(2012)
Inf. Sci.
, vol.209
, pp. 80-92
-
-
Das, A.K.1
Paul, N.R.2
Tripathy, L.3
-
12
-
-
84883262804
-
An improved and effective secure password-based authentication and key agreement scheme using smart cards for the telecare medicine information system
-
Das, A. K., and Bruhadeshwar, B., An improved and effective secure password-based authentication and key agreement scheme using smart cards for the telecare medicine information system. J. Med. Syst. 37(5):1-17, 2013.
-
(2013)
J. Med. Syst.
, vol.37
, Issue.5
, pp. 1-17
-
-
Das, A.K.1
Bruhadeshwar, B.2
-
13
-
-
4043122631
-
A dynamic ID-based remote user authentication scheme
-
Das, M. L., Saxena, A., and Gulati, V. P., A dynamic ID-based remote user authentication scheme. IEEE Trans. Consum. Electron. 50(2):629-631, 2004.
-
(2004)
IEEE Trans. Consum. Electron.
, vol.50
, Issue.2
, pp. 629-631
-
-
Das, M.L.1
Saxena, A.2
Gulati, V.P.3
-
14
-
-
0020720357
-
On the security of public key protocols
-
Dolev, D., and Yao, A., On the security of public key protocols. IEEE Trans. Inf. Theory. 29(2):198-208, 1983.
-
(1983)
IEEE Trans. Inf. Theory.
, vol.29
, Issue.2
, pp. 198-208
-
-
Dolev, D.1
Yao, A.2
-
15
-
-
0034140374
-
A new remote user authentication scheme using smart cards
-
Hwang, M.-S., and Li, L.-H., A new remote user authentication scheme using smart cards. IEEE Trans. Consum. Electron. 46(1): 28-30, 2000.
-
(2000)
IEEE Trans. Consum. Electron.
, vol.46
, Issue.1
, pp. 28-30
-
-
Hwang, M.-S.1
Li, L.-H.2
-
17
-
-
84892599400
-
Smart card based remote user authentication schemes: A survey
-
Jaspher, G., Kathrine, W., Kirubakaran, E., and Prakash, P., Smart card based remote user authentication schemes: A survey. Procedia Eng. 38:1318-1326, 2012.
-
(2012)
Procedia Eng.
, vol.38
, pp. 1318-1326
-
-
Jaspher, G.1
Kathrine, W.2
Kirubakaran, E.3
Prakash, P.4
-
18
-
-
12344259813
-
Biohashing: Two factor authentication featuring fingerprint data and tokenised random number
-
DOI 10.1016/j.patcog.2004.04.011, PII S0031320304001876
-
Jina, A. T. B., Linga, D. N. C., and Goh, A., Biohashing: Two factor authentication featuring fingerprint data and tokenised random number. Pattern Recog. 37(11):2245-2255, 2004. (Pubitemid 40134555)
-
(2004)
Pattern Recognition
, vol.37
, Issue.11
, pp. 2245-2255
-
-
Jin, A.T.B.1
Ling, D.N.C.2
Goh, A.3
-
19
-
-
78751642788
-
Cryptanalysis and security enhancement of a 'more efficient & secure dynamic ID-based remote user authentication scheme'
-
Khan, M. K., Kim, S.-K., and Alghathbar, K., Cryptanalysis and security enhancement of a 'more efficient & secure dynamic ID-based remote user authentication scheme'. Comput Commun. 34(3):305-309, 2011.
-
(2011)
Comput Commun.
, vol.34
, Issue.3
, pp. 305-309
-
-
Khan, M.K.1
Kim, S.-K.2
Alghathbar, K.3
-
20
-
-
84939573910
-
Differential power analysis
-
LNCS
-
Kocher, P., Jaffe, J., and Jun, B., Differential power analysis. In: Proceedings of Advances in Cryptology - CRYPTO'99, LNCS. Vol. 1666, pp. 388-397, 1999.
-
(1999)
Proceedings of Advances in Cryptology - CRYPTO'99
, vol.1666
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
21
-
-
0019634370
-
Password authentification with insecure communication
-
Lamport, L., Password authentification with insecure communication. Commun. ACM. 24(11):770-772, 1981.
-
(1981)
Commun. ACM.
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
22
-
-
70349792182
-
An efficient biometric-based remote user authentication scheme using smart cards
-
Li, C.-T., and Hwang, M.-S., An efficient biometric-based remote user authentication scheme using smart cards. J. Netw. Comput. Appl. 33:1-5, 2010.
-
(2010)
J. Netw. Comput. Appl.
, vol.33
, pp. 1-5
-
-
Li, C.-T.1
Hwang, M.-S.2
-
23
-
-
79960231400
-
A robust remote user authentication scheme against smart card security breach
-
LNCS
-
Li, C.-T., Lee, C.-C., Liu, C.-J., and Lee, C.-W., A robust remote user authentication scheme against smart card security breach. In: Proceedings of Data and Applications Security and Privacy XXV, LNCS. VOl. 6818, pp. 231-238, 2011.
-
(2011)
Proceedings of Data and Applications Security and Privacy XXV
, vol.6818
, pp. 231-238
-
-
Li, C.-T.1
Lee, C.-C.2
Liu, C.-J.3
Lee, C.-W.4
-
24
-
-
78649335192
-
Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards
-
Li, X., Niu, J.-W., Ma, J., Wang, W.-D., and Liu, C.-L., Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards. J. Netw. Comput. Appl. 34:73-79, 2011.
-
(2011)
J. Netw. Comput. Appl.
, vol.34
, pp. 73-79
-
-
Li, X.1
Niu, J.-W.2
Ma, J.3
Wang, W.-D.4
Liu, C.-L.5
-
25
-
-
33750533142
-
An improved BioHashing for human authentication
-
DOI 10.1016/j.patcog.2006.05.030, PII S0031320306002482
-
Lumini, A., and Nanni, L., An improved BioHashing for human authentication. Pattern Recog. 40(3):1057-1065, 2007. (Pubitemid 44667748)
-
(2007)
Pattern Recognition
, vol.40
, Issue.3
, pp. 1057-1065
-
-
Lumini, A.1
Nanni, L.2
-
26
-
-
84860376061
-
Dynamic ID-based remote user password authentication schemes using smart cards: A review
-
Madhusudhan, R., and Mittal, R. C., Dynamic ID-based remote user password authentication schemes using smart cards: A review. J. Netw. Comput. Appl. 35(4):1235-1248, 2012.
-
(2012)
J. Netw. Comput. Appl.
, vol.35
, Issue.4
, pp. 1235-1248
-
-
Madhusudhan, R.1
Mittal, R.C.2
-
27
-
-
0036566408
-
Examining smart-card security under the threat of power analysis attacks
-
DOI 10.1109/TC.2002.1004593
-
Messerges, T. S., Dabbish, E. A., and Sloan, R. H., Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Comput. 51(5):541-552, 2002. (Pubitemid 34550462)
-
(2002)
IEEE Transactions on Computers
, vol.51
, Issue.5
, pp. 541-552
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
-
28
-
-
84873351776
-
An effective and secure key-management scheme for hierarchical access control in e-medicine system
-
Odelu, V., Das, A. K., and Goswami, A., An effective and secure key-management scheme for hierarchical access control in e-medicine system. J. Med. Syst. 37(2):1-18, 2013.
-
(2013)
J. Med. Syst.
, vol.37
, Issue.2
, pp. 1-18
-
-
Odelu, V.1
Das, A.K.2
Goswami, A.3
-
29
-
-
59649083248
-
A more efficient and secure dynamic ID-based remote user authentication scheme
-
Wang, Y.-Y., Liu, J.-Y., Xiao, F.-X., and Dan, J., A more efficient and secure dynamic ID-based remote user authentication scheme. Comput. Commun. 32(4):583-585, 2009.
-
(2009)
Comput. Commun.
, vol.32
, Issue.4
, pp. 583-585
-
-
Wang, Y.-Y.1
Liu, J.-Y.2
Xiao, F.-X.3
Dan, J.4
-
30
-
-
9644303109
-
One-way hash function construction based on the chaotic map with changeable-parameter
-
Xiao, D., Liao, X., and Deng, S., One-way hash function construction based on the chaotic map with changeable-parameter. Chaos, Solitons Fractals. 241:65-71, 2005.
-
(2005)
Chaos, Solitons Fractals.
, vol.241
, pp. 65-71
-
-
Xiao, D.1
Liao, X.2
Deng, S.3
|