-
1
-
-
79959763451
-
Cryptanalysis of Hsiang–Shih's authentication scheme for multi-server architecture
-
Yeh KH, Lo NW, Li YJ. Cryptanalysis of Hsiang–Shih's authentication scheme for multi-server architecture. International Journal of Communication Systems 2011; 24(7):829–836.
-
(2011)
International Journal of Communication Systems
, vol.24
, Issue.7
, pp. 829-836
-
-
Yeh, K.H.1
Lo, N.W.2
Li, Y.J.3
-
2
-
-
79952059658
-
Lightweight and provably secure user authentication with anonymity for the global mobility network
-
Chen C, He DJ, Chan SM, Bu JJ, Gao Y, Fan R. Lightweight and provably secure user authentication with anonymity for the global mobility network. International Journal of Communication Systems 2011; 24(3):347–362.
-
(2011)
International Journal of Communication Systems
, vol.24
, Issue.3
, pp. 347-362
-
-
Chen, C.1
He, D.J.2
Chan, S.M.3
Bu, J.J.4
Gao, Y.5
Fan, R.6
-
3
-
-
84870350603
-
Cryptanalysis of a dynamic ID-based remote user authentication with key agreement scheme
-
Tang HB, Liu XS. Cryptanalysis of a dynamic ID-based remote user authentication with key agreement scheme. International Journal of Communication Systems 2012; 25(12):1639–1644.
-
(2012)
International Journal of Communication Systems
, vol.25
, Issue.12
, pp. 1639-1644
-
-
Tang, H.B.1
Liu, X.S.2
-
4
-
-
84879602205
-
Efficient three-party key exchange protocols with round efficiency
-
Youn T-Y, Kang E, Lee C. Efficient three-party key exchange protocols with round efficiency. Telecommunication Systems 2013; 52(2):1367–1376.
-
(2013)
Telecommunication Systems
, vol.52
, Issue.2
, pp. 1367-1376
-
-
Youn, T.-Y.1
Kang, E.2
Lee, C.3
-
5
-
-
84859161671
-
Towards generalized ID-based user authentication for mobile multi-server environment
-
Chuang YH, Tseng Y-M. Towards generalized ID-based user authentication for mobile multi-server environment. International Journal of Communication Systems 2012; 25(4):447–460.
-
(2012)
International Journal of Communication Systems
, vol.25
, Issue.4
, pp. 447-460
-
-
Chuang, Y.H.1
Tseng, Y.-M.2
-
6
-
-
84988227377
-
Improvement of robust smart-card-based password authentication scheme
-
posted on, to appear in print)
-
Jian Q, Ma J, Li G. Improvement of robust smart-card-based password authentication scheme. International Journal of Communication Systems posted on 2013. DOI 10.1002/dac.2644, (to appear in print).
-
(2013)
International Journal of Communication Systems
-
-
Jian, Q.1
Ma, J.2
Li, G.3
-
8
-
-
84899037889
-
Design and analysis of an improved smartcard based remote user password authentication scheme
-
posted on, to appear in print)
-
Islam SH. Design and analysis of an improved smartcard based remote user password authentication scheme. International Journal of Communication Systems posted on 2014. DOI 10.1002/dac.2793, (to appear in print).
-
(2014)
International Journal of Communication Systems
-
-
Islam, S.H.1
-
9
-
-
84922001116
-
Robust anonymous authentication protocol for healthcare applications using wireless medical sensor networks
-
posted on 2014. to appear in print)
-
He D, Kumar K, Khan MK. Robust anonymous authentication protocol for healthcare applications using wireless medical sensor networks. Multimedia Systems posted on 2014. DOI 10.1007/s00530-013-0346-9, (to appear in print).
-
Multimedia Systems
-
-
He, D.1
Kumar, K.2
Khan, M.K.3
-
10
-
-
85027949488
-
Robust biometrics-based authentication scheme for multi-server environment
-
posted on, to appear in print)
-
He D, Wang D. Robust biometrics-based authentication scheme for multi-server environment. IEEE Systems Journal posted on 2014. DOI 10.1109/JSYST.2014.2301517, (to appear in print).
-
(2014)
IEEE Systems Journal
-
-
He, D.1
Wang, D.2
-
11
-
-
84898048082
-
Enhanced three-factor security protocol for USB consumer storage devices
-
He D, Kumar N, Lee J-H. Enhanced three-factor security protocol for USB consumer storage devices. IEEE Transactions on Consumer Electronics 2014; 60(1):30–37.
-
(2014)
IEEE Transactions on Consumer Electronics
, vol.60
, Issue.1
, pp. 30-37
-
-
He, D.1
Kumar, N.2
Lee, J.-H.3
-
12
-
-
84891688392
-
Anonymous two-factor authentication for consumer roaming service in global mobility networks
-
He D, Kumar N, Khan MK, Lee J-H. Anonymous two-factor authentication for consumer roaming service in global mobility networks. IEEE Transactions on Consumer Electronics (2013) 2013; 59(4):811–817.
-
(2013)
IEEE Transactions on Consumer Electronics (2013)
, vol.59
, Issue.4
, pp. 811-817
-
-
He, D.1
Kumar, N.2
Khan, M.K.3
Lee, J.-H.4
-
13
-
-
84911988880
-
Security flaws in two improved remote user authentication schemes using smart cards
-
posted on, to appear in print)
-
Ma C-G, Wang D, Zhao S-D. Security flaws in two improved remote user authentication schemes using smart cards. International Journal of Communication Systems, posted on 2012. DOI 10.1002/dac.2468, (to appear in print).
-
(2012)
International Journal of Communication Systems
-
-
Ma, C.-G.1
Wang, D.2
Zhao, S.-D.3
-
15
-
-
84914669082
-
Robust smartcard-based remote user password authentication scheme
-
posted on, to appear in print)
-
Kumari S, Khan MK. Robust smartcard-based remote user password authentication scheme. International Journal of Communication Systems posted on 2013. DOI 10.1002/dac.2590, (to appear in print).
-
(2013)
International Journal of Communication Systems
-
-
Kumari, S.1
Khan, M.K.2
-
16
-
-
84856471625
-
Secure and efficient handover authentication based on bilinear pairing functions
-
He D, Chen C, Chan S, Bu J. Secure and efficient handover authentication based on bilinear pairing functions. IEEE Transactions on Wireless Communication 2012; 11(1):48–53.
-
(2012)
IEEE Transactions on Wireless Communication
, vol.11
, Issue.1
, pp. 48-53
-
-
He, D.1
Chen, C.2
Chan, S.3
Bu, J.4
-
17
-
-
84865443877
-
Analysis and improvement of a secure and efficient handover authentication for wireless networks
-
He D, Chen C, Chan S, Bu J. Analysis and improvement of a secure and efficient handover authentication for wireless networks. IEEE Communications Letters 2012; 16(8):1270–1273.
-
(2012)
IEEE Communications Letters
, vol.16
, Issue.8
, pp. 1270-1273
-
-
He, D.1
Chen, C.2
Chan, S.3
Bu, J.4
-
18
-
-
84890563211
-
Secure handover authentication protocol based on bilinear pairings
-
posted on, (to appear in print)
-
Tsai J-L, Lo N-W, Wu T-C. Secure handover authentication protocol based on bilinear pairings. Wireless Personal Communications posted on 2013. DOI: 10.1007/s11277-013-1246-1, (to appear in print).
-
(2013)
Wireless Personal Communications
-
-
Tsai, J.-L.1
Lo, N.-W.2
Wu, T.-C.3
-
19
-
-
24144433396
-
Evaluating 2-DNF formulas on ciphertexts
-
Cambridge, MA, US
-
Boneh D, Goh E, Nissim K. Evaluating 2-DNF formulas on ciphertexts. Proceedings of the Second Theory of Cryptography Conference, Cambridge, MA, USA, Vol. 3378, 2005; 325–341.
-
(2005)
Proceedings of the Second Theory of Cryptography Conference
, vol.3378
, pp. 325-341
-
-
Boneh, D.1
Goh, E.2
Nissim, K.3
-
20
-
-
84919085619
-
An improved algorithm for computing logarithms over GF(p) and its cryptographic significance
-
Pohlig S, Hellman M. An improved algorithm for computing logarithms over GF(p) and its cryptographic significance. IEEE Transactions on Information Theory 1978; 24:106–110.
-
(1978)
IEEE Transactions on Information Theory
, vol.24
, pp. 106-110
-
-
Pohlig, S.1
Hellman, M.2
-
21
-
-
77954639466
-
Converting pairing-based cryptosystems from composite-order groups to primeorder groups
-
French Riviera, Franc
-
Freeman DM. Converting pairing-based cryptosystems from composite-order groups to primeorder groups. Proceedings of the Advances in Cryptology (EUROCRYPT'10), French Riviera, France, Vol. 6110, 2010; 44–61.
-
(2010)
Proceedings of the Advances in Cryptology (EUROCRYPT'10)
, vol.6110
, pp. 44-61
-
-
Freeman, D.M.1
-
22
-
-
0037623983
-
Identity-based encryption from the Weil pairing
-
Boneh D, Franklin M. Identity-based encryption from the Weil pairing. SIAM Journal on Computing 2003; 32(3):586–615.
-
(2003)
SIAM Journal on Computing
, vol.32
, Issue.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
23
-
-
0027726717
-
Random oracles are practical: a paradigm for designing efficient protocols
-
Fairfax, VA, US
-
Ballare M, Rogaway P. Random oracles are practical: a paradigm for designing efficient protocols. Proceedings of the 1st ACM Conference on Computer and Communications Security (CCS'93), Fairfax, VA, USA, 1993; 62–73.
-
(1993)
Proceedings of the 1st ACM Conference on Computer and Communications Security (CCS'93)
, pp. 62-73
-
-
Ballare, M.1
Rogaway, P.2
-
24
-
-
84879603468
-
Cryptanalysis and improvement on a parallel keyed hash function based on chaotic neural network
-
Wang X, Guo W, Zhang W, Khan MK, Alghathbar K. Cryptanalysis and improvement on a parallel keyed hash function based on chaotic neural network. Telecommunication Systems 2013; 52(2):515–524.
-
(2013)
Telecommunication Systems
, vol.52
, Issue.2
, pp. 515-524
-
-
Wang, X.1
Guo, W.2
Zhang, W.3
Khan, M.K.4
Alghathbar, K.5
-
25
-
-
84889263311
-
Provably secure and pairing-free certificateless digital signature scheme using elliptic curve cryptography
-
Islam HS, Biswas GP. Provably secure and pairing-free certificateless digital signature scheme using elliptic curve cryptography. International Journal of Computer Mathematics 2013; 90(11):2244–2258.
-
(2013)
International Journal of Computer Mathematics
, vol.90
, Issue.11
, pp. 2244-2258
-
-
Islam, H.S.1
Biswas, G.P.2
-
26
-
-
84870878817
-
A pairing-free identity-based authenticated group key agreement protocol for imbalanced mobile networks
-
Islam HS, Biswas GP. A pairing-free identity-based authenticated group key agreement protocol for imbalanced mobile networks. Annals of Telecommunications 2012; 67(11-12):547–558.
-
(2012)
Annals of Telecommunications
, vol.67
, Issue.11-12
, pp. 547-558
-
-
Islam, H.S.1
Biswas, G.P.2
-
30
-
-
0000901529
-
Security arguments for digital signatures and blind signatures
-
Pointcheval D, Stern J. Security arguments for digital signatures and blind signatures. Journal of Cryptology 2000; 13:361–396.
-
(2000)
Journal of Cryptology
, vol.13
, pp. 361-396
-
-
Pointcheval, D.1
Stern, J.2
-
31
-
-
0000537828
-
Efficient identification and signatures for smart cards
-
Houthalen, Belgiu
-
Schnorr CP. Efficient identification and signatures for smart cards. Proceedings of the Cryptology (Crypto'89), Houthalen, Belgium, Vol. 435, 1990; 239–251.
-
(1990)
Proceedings of the Cryptology (Crypto'89)
, vol.435
, pp. 239-251
-
-
Schnorr, C.P.1
-
32
-
-
54449094667
-
A secure dynamic ID based remote user authentication scheme for multi-server environment
-
Liao YP, Wang SS. A secure dynamic ID based remote user authentication scheme for multi-server environment. Computer Standards & Interfaces 2009; 31(1):24–29.
-
(2009)
Computer Standards & Interfaces
, vol.31
, Issue.1
, pp. 24-29
-
-
Liao, Y.P.1
Wang, S.S.2
-
33
-
-
68849128250
-
Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment
-
Hsiang HC, Shih WK. Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment. Computer Standards & Interfaces 2009; 31(6):1118–1123.
-
(2009)
Computer Standards & Interfaces
, vol.31
, Issue.6
, pp. 1118-1123
-
-
Hsiang, H.C.1
Shih, W.K.2
-
34
-
-
78751648745
-
A strong user authentication scheme with smart cards for wireless communications
-
He D, Ma M, Zhang Y, Chen C, Bu J. A strong user authentication scheme with smart cards for wireless communications. Computer Communication 2011; 34(3):367–374.
-
(2011)
Computer Communication
, vol.34
, Issue.3
, pp. 367-374
-
-
He, D.1
Ma, M.2
Zhang, Y.3
Chen, C.4
Bu, J.5
-
35
-
-
67651062654
-
A secure and efficient handover authentication based on light-weight Diffie–Hellman on mobile node in FMIPv6
-
Choi J, Jung S. A secure and efficient handover authentication based on light-weight Diffie–Hellman on mobile node in FMIPv6. IEICE Transactions on Communications 2008; E-91B(2):605–608.
-
(2008)
IEICE Transactions on Communications
, vol.E-91B
, Issue.2
, pp. 605-608
-
-
Choi, J.1
Jung, S.2
-
36
-
-
70350435386
-
A fast and efficient handover authentication achieving conditional privacy in V2I networks
-
St. Petersburg, Russi
-
Choi J, Jung S, Kim Y, Yoo M. A fast and efficient handover authentication achieving conditional privacy in V2I networks. Proceedings of the 9th International Conference on NEW2AN and Second Conference on Smart Spaces and Next Generation Wired/Wireless Networking, St. Petersburg, Russia, Vol. 5764, 2009; 291–300.
-
(2009)
Proceedings of the 9th International Conference on NEW2AN and Second Conference on Smart Spaces and Next Generation Wired/Wireless Networking
, vol.5764
, pp. 291-300
-
-
Choi, J.1
Jung, S.2
Kim, Y.3
Yoo, M.4
-
37
-
-
75449110407
-
A handover authentication using credentials based on chameleon hashing
-
Choi J, Jung S. A handover authentication using credentials based on chameleon hashing. IEEE Communications Letters 2010; 14(1):54–56.
-
(2010)
IEEE Communications Letters
, vol.14
, Issue.1
, pp. 54-56
-
-
Choi, J.1
Jung, S.2
-
38
-
-
74549210063
-
Universal authentication protocols for anonymous wireless communications
-
Yang G, Huang Q, Wong DS, Deng X. Universal authentication protocols for anonymous wireless communications. IEEE Transactions on Wireless Communications 2010; 9(1):168–174.
-
(2010)
IEEE Transactions on Wireless Communications
, vol.9
, Issue.1
, pp. 168-174
-
-
Yang, G.1
Huang, Q.2
Wong, D.S.3
Deng, X.4
-
39
-
-
79951676054
-
Privacy-preserving universal authentication protocol for wireless communications
-
He D, Bu J, Chan S, Chen C, Yin M. Privacy-preserving universal authentication protocol for wireless communications. IEEE Transactions on Wireless Communications 2011; 10(2):431–436.
-
(2011)
IEEE Transactions on Wireless Communications
, vol.10
, Issue.2
, pp. 431-436
-
-
He, D.1
Bu, J.2
Chan, S.3
Chen, C.4
Yin, M.5
-
40
-
-
85028765277
-
Perfectly-secure key distribution for dynamic conferences
-
Santa Barbara, Californi
-
Blundo C, Santis AD, Herzberg A, Kutten S, Vaccaro U, Yung M, Perfectly-secure key distribution for dynamic conferences. Proceeding of the Advances in Cryptology (Crypto'92), Santa Barbara, California, Vol. 740; 471–486.
-
Proceeding of the Advances in Cryptology (Crypto'92)
, vol.740
, pp. 471-486
-
-
Blundo, C.1
Santis, A.D.2
Herzberg, A.3
Kutten, S.4
Vaccaro, U.5
Yung, M.6
-
41
-
-
84855353789
-
An ID-based proxy signature schemes without bilinear pairings
-
He D, Chen J, Hu J. An ID-based proxy signature schemes without bilinear pairings. Annals of Telecommunications 2011; 66(11-12):657–662.
-
(2011)
Annals of Telecommunications
, vol.66
, Issue.11-12
, pp. 657-662
-
-
He, D.1
Chen, J.2
Hu, J.3
-
42
-
-
84969991717
-
-
2nd edn, Encyclopedia of Cryptography and Security, Springer, US
-
Solinas JA. Generalized Mersenne Prime (2nd edn), Encyclopedia of Cryptography and Security. Springer: USA, 2011; 509–510.
-
(2011)
Generalized Mersenne Prime
, pp. 509-510
-
-
Solinas, J.A.1
|