-
1
-
-
0019634370
-
Password authentication with insecure communication
-
DOI 10.1145/358790.358797
-
Lamport L (1981) Password authentication with insecure communication. Commun ACM 24:770-772 (Pubitemid 12462508)
-
(1981)
Communications of the ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport Leslie1
-
2
-
-
0000270009
-
Password authentication without using password table
-
10.1016/0020-0190(95)00087-S 0875.68391
-
Horng G (1995) Password authentication without using password table. Inf Process Lett 55:247-250
-
(1995)
Inf Process Lett
, vol.55
, pp. 247-250
-
-
Horng, G.1
-
3
-
-
0002063278
-
Paramita wisdom' password authentication scheme without verification tables
-
10.1016/S0164-1212(98)00006-5
-
Jan JK, Chen YY (1998) Paramita wisdom' password authentication scheme without verification tables. J Syst Softw 42:45-57
-
(1998)
J Syst Softw
, vol.42
, pp. 45-57
-
-
Jan, J.K.1
Chen, Y.Y.2
-
4
-
-
0003224934
-
The S/KEY one-time password, system
-
Haller NM (1995) The S/KEY one-time password, system, RFC1760
-
(1995)
RFC
, vol.1760
-
-
Haller, N.M.1
-
6
-
-
0001459651
-
A dynamic password authentication method by one-way function
-
Shimizu A (1990) A dynamic password authentication method by one-way function. IEICE Trans Inf Syst 73-D-I:630-636
-
(1990)
IEICE Trans Inf Syst
, vol.7350
, pp. 630-636
-
-
Shimizu, A.1
-
8
-
-
0034318245
-
Efficient remote use authentication scheme using smart cards
-
DOI 10.1109/30.920446
-
Sun HM (2000) An efficient remote user authentication scheme using smart cards. IEEE Trans Consum Electron 46(4):958-961 (Pubitemid 32089809)
-
(2000)
IEEE Transactions on Consumer Electronics
, vol.46
, Issue.4
, pp. 958-961
-
-
Sun Hung-Min1
-
9
-
-
0036302680
-
An efficient and practical solution to remote authentication: Smart card
-
DOI 10.1016/S0167-4048(02)00415-7
-
Chein HY, Jan JK, Tseng YM (2002) An efficient and practical solution to remote authentication: smart card. Comput Secur 21(4):372-375 (Pubitemid 34715241)
-
(2002)
Computers and Security
, vol.21
, Issue.4
, pp. 372-375
-
-
Chien, H.-Y.1
Jan, J.-K.2
Tseng, Y.-M.3
-
10
-
-
0742268499
-
Security of Chein et al.'s remote user authentication scheme using smart cards
-
10.1016/S0920-5489(03)00094-1
-
Hsu CL (2004) Security of Chein et al.'s remote user authentication scheme using smart cards. Comput Stand Interfaces 26(3):167-169
-
(2004)
Comput Stand Interfaces
, vol.26
, Issue.3
, pp. 167-169
-
-
Hsu, C.L.1
-
11
-
-
1942423677
-
Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards
-
10.1109/TCE.2004.1277863
-
Ku WC, Chen SM (2004) Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards. IEEE Trans Consum Electron 50(1):204-207
-
(2004)
IEEE Trans Consum Electron
, vol.50
, Issue.1
, pp. 204-207
-
-
Ku, W.C.1
Chen, S.M.2
-
12
-
-
33748126252
-
A password authentication scheme over insecure networks
-
1094.68027 2227799
-
Liao IE, Lee CC, Hwang MS (2006) A password authentication scheme over insecure networks. J Comput Syst Sci 72(4):727-740
-
(2006)
J Comput Syst Sci
, vol.72
, Issue.4
, pp. 727-740
-
-
Liao, I.E.1
Lee, C.C.2
Hwang, M.S.3
-
13
-
-
43649083106
-
Cryptanalysis of a password authentication scheme over insecure networks
-
DOI 10.1016/j.jcss.2007.05.001, PII S0022000007000657
-
Xiang T, Wong KW, Liao X (2008) Cryptanalysis of a password authentication scheme over insecure networks. J Comput Syst Sci 74(5):657-661 (Pubitemid 351685697)
-
(2008)
Journal of Computer and System Sciences
, vol.74
, Issue.5
, pp. 657-661
-
-
Xiang, T.1
Wong, K.-w.2
Liao, X.3
-
14
-
-
34248666700
-
Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards
-
DOI 10.1016/j.csi.2006.11.005, PII S0920548906001322
-
Wang XM, Zhang WF, Zhang JS, Khan MK (2007) Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards. Comput Stand Interfaces 29(5):507-512 (Pubitemid 46771122)
-
(2007)
Computer Standards and Interfaces
, vol.29
, Issue.5
, pp. 507-512
-
-
Wang, X.-M.1
Zhang, W.-F.2
Zhang, J.-S.3
Khan, M.K.4
-
15
-
-
78751642788
-
Cryptanalysis and security enhancement of a 'more efficient & secure dynamic ID-based remote user authentication scheme
-
10.1016/j.comcom.2010.02.011
-
Khan MK, Kim SK, Alghathbar K (2010) Cryptanalysis and security enhancement of a 'more efficient & secure dynamic ID-based remote user authentication scheme. Comput Commun 34(3):305-309
-
(2010)
Comput Commun
, vol.34
, Issue.3
, pp. 305-309
-
-
Khan, M.K.1
Kim, S.K.2
Alghathbar, K.3
-
16
-
-
34548620637
-
Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices
-
DOI 10.1016/j.chaos.2006.05.061, PII S096007790600498X
-
Khan MK, Zhang J, Wang X (2008) Chaotic hash based fingerprint biometric remote user authentication scheme on mobile devices. Chaos, Solitons & Fractals 35(3):519-524 (Pubitemid 47404851)
-
(2008)
Chaos, Solitons and Fractals
, vol.35
, Issue.3
, pp. 519-524
-
-
Khan, M.K.1
Zhang, J.2
Wang, X.3
-
17
-
-
84860659191
-
Mobile device integration of a fingerprint biometric remote authentication scheme
-
10.1002/dac.1277 10.1002/dac.1277
-
Chen CL, Lee CC, Hsu CY (2012) Mobile device integration of a fingerprint biometric remote authentication scheme. Int J Commun Syst 25:585-597. doi: 10.1002/dac.1277
-
(2012)
Int J Commun Syst
, vol.25
, pp. 585-597
-
-
Chen, C.L.1
Lee, C.C.2
Hsu, C.Y.3
-
18
-
-
0037030525
-
Fingerprint-based remote user authentication scheme using smart cards
-
DOI 10.1049/el:20020380
-
Lee JK, Ryu SR, Yoo KY (2002) Fingerprint based remote user authentication scheme using smart cards. Electron Lett 38:554-555 (Pubitemid 34684645)
-
(2002)
Electronics Letters
, vol.38
, Issue.12
, pp. 554-555
-
-
Lee, J.K.1
Ryu, S.R.2
Yoo, K.Y.3
-
19
-
-
4043139259
-
A flexible biometrics remote user authentication scheme
-
10.1016/j.csi.2004.03.003
-
Lin CH, Lai YY (2004) A flexible biometrics remote user authentication scheme. Comput Stand Interfaces 27(1):19-23
-
(2004)
Comput Stand Interfaces
, vol.27
, Issue.1
, pp. 19-23
-
-
Lin, C.H.1
Lai, Y.Y.2
-
20
-
-
33751167604
-
Improving the security of 'a flexible biometrics remote user authentication scheme'
-
DOI 10.1016/j.csi.2006.01.002, PII S0920548906000122
-
Khan MK, Zhang J (2007) Improving the security of 'a flexible biometrics remote user authentication scheme'. Comput Stand Interfaces 29:82-85 (Pubitemid 44773789)
-
(2007)
Computer Standards and Interfaces
, vol.29
, Issue.1
, pp. 82-85
-
-
Khan, M.K.1
Zhang, J.2
-
21
-
-
77952339469
-
A biometric-based user authentication for wireless sensor networks
-
10.1007/s11859-010-0318-2 10.1007/s11859-010-0318-2
-
Yuan J, Jiang C, Jiang Z (2010) A biometric-based user authentication for wireless sensor networks. Wuhan Univ J Nat Sci 15:272-276. doi: 10.1007/s11859-010-0318-2
-
(2010)
Wuhan Univ J Nat Sci
, vol.15
, pp. 272-276
-
-
Yuan, J.1
Jiang, C.2
Jiang, Z.3
-
22
-
-
84866625525
-
Cryptanalysis and security enhancement of Chen et al.'s remote user authentication scheme using smart card
-
10.2478/s13537-012-0003-y
-
Saru K, Gupta MK, Kumar M (2012) Cryptanalysis and security enhancement of Chen et al.'s remote user authentication scheme using smart card. Cent Eur J Comput Sci 2(1):60-75
-
(2012)
Cent Eur J Comput Sci
, vol.2
, Issue.1
, pp. 60-75
-
-
Saru, K.1
Gupta, M.K.2
Kumar, M.3
-
23
-
-
84863229262
-
Improvement of a fingerprint-based remote user authentication scheme
-
Xu J, Zhu WT, Feng DG (2008) Improvement of a fingerprint-based remote user authentication scheme. Int J Secur Appl 2(3):73-80
-
(2008)
Int J Secur Appl
, vol.2
, Issue.3
, pp. 73-80
-
-
Xu, J.1
Zhu, W.T.2
Feng, D.G.3
-
24
-
-
84867158765
-
Security weaknesses of a biometric-based remote user authentication scheme using smart cards
-
An Y (2012) Security weaknesses of a biometric-based remote user authentication scheme using smart cards. Int J Biosci Biotechnol 4(3):21-28
-
(2012)
Int J Biosci Biotechnol
, vol.4
, Issue.3
, pp. 21-28
-
-
An, Y.1
-
25
-
-
84860385112
-
A novel mutual authentication scheme based on fingerprint biometric and nonce using smart cards
-
1274.65012
-
Wang D, Li J (2011) A novel mutual authentication scheme based on fingerprint biometric and nonce using smart cards. Int J Secur Appl 5(4):1-12
-
(2011)
Int J Secur Appl
, vol.5
, Issue.4
, pp. 1-12
-
-
Wang, D.1
Li, J.2
-
28
-
-
54349125537
-
A remote user authentication scheme without using smart cards
-
10.1016/j.csi.2007.11.017
-
Rhee HS, Kwon JO, Lee DH (2009) A remote user authentication scheme without using smart cards. Comput Stand Interfaces 31(1):6-13
-
(2009)
Comput Stand Interfaces
, vol.31
, Issue.1
, pp. 6-13
-
-
Rhee, H.S.1
Kwon, J.O.2
Lee, D.H.3
-
30
-
-
0036566408
-
Examining smart-card security under the threat of power analysis attacks
-
DOI 10.1109/TC.2002.1004593
-
Messerges TS, Dabbish EA, Sloan RH (2002) Examining smart-card security under the threat of power analysis attacks. IEEE Trans Comput 51(5):541-552 (Pubitemid 34550462)
-
(2002)
IEEE Transactions on Computers
, vol.51
, Issue.5
, pp. 541-552
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
-
31
-
-
0034276289
-
Checking before output may not be enough against fault-based cryptanalysis
-
Yen SM, Joye M (2002) Checking before output may not be enough against fault-based cryptanalysis. IEEE Trans Comput 49(9):967-970
-
(2002)
IEEE Trans Comput
, vol.49
, Issue.9
, pp. 967-970
-
-
Yen, S.M.1
Joye, M.2
-
34
-
-
61849087915
-
Cryptanalysis of a mutual authentication scheme based on nonce and smart cards
-
10.1016/j.comcom.2008.12.023
-
Sun DZ, Huai JP, Sun JZ, Li JX (2009) Cryptanalysis of a mutual authentication scheme based on nonce and smart cards. Comput Commun 32(6):1015-1017
-
(2009)
Comput Commun
, vol.32
, Issue.6
, pp. 1015-1017
-
-
Sun, D.Z.1
Huai, J.P.2
Sun, J.Z.3
Li, J.X.4
-
35
-
-
28144456308
-
An attack on the Needham-Schroeder public key authentication protocol
-
10.1016/0020-0190(95)00144-2 0875.94114
-
Lowe G (1995) An attack on the Needham-Schroeder public key authentication protocol. Inf Process Lett 56(3):131-136
-
(1995)
Inf Process Lett
, vol.56
, Issue.3
, pp. 131-136
-
-
Lowe, G.1
-
37
-
-
33846446132
-
Security analysis of a nonce-based user authentication scheme using smart cards
-
DOI 10.1093/ietfec/e90-a.1.299
-
Nam J, Kim S, Park S, Won D (2007) Security analysis of a nonce-based user authentication scheme using smart cards. IEICE Trans Fundam 90(1):299-302 (Pubitemid 46145235)
-
(2007)
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
, vol.E90-A
, Issue.1
, pp. 299-302
-
-
Nam, J.1
Kim, S.2
Park, S.3
Won, D.4
|