-
1
-
-
84865219379
-
Exploiting hash functions to intensify the remote user authentication scheme
-
Hsieh WB, Leu V. Exploiting hash functions to intensify the remote user authentication scheme. Computers & Security 2012; 31:791-798.
-
(2012)
Computers & Security
, vol.31
, pp. 791-798
-
-
Hsieh, W.B.1
Leu, V.2
-
2
-
-
0035506864
-
A remote password authentication scheme for multi-server architecture using neural networks
-
Li LH, Lin IC, Hwang MS. A remote password authentication scheme for multi-server architecture using neural networks. IEEE Transactions on Neural Networks 2001; 12(6):1498-1504.
-
(2001)
IEEE Transactions on Neural Networks
, vol.12
, Issue.6
, pp. 1498-1504
-
-
Li, L.H.1
Lin, I.C.2
Hwang, M.S.3
-
3
-
-
4043167845
-
Security improvement on a timestamp-based password authentication scheme
-
Wang YJ, Li JH. Security improvement on a timestamp-based password authentication scheme. IEEE Transactions on Consumer Electronics 2004; 50(2):580-582.
-
(2004)
IEEE Transactions on Consumer Electronics
, vol.50
, Issue.2
, pp. 580-582
-
-
Wang, Y.J.1
Li, J.H.2
-
6
-
-
84871953187
-
Improvement of a security enhanced one-time two-factor authentication and key agreement scheme
-
Xie Q. Improvement of a security enhanced one-time two-factor authentication and key agreement scheme. Scientia Iranica 2012; 19(6):1856-1860.
-
(2012)
Scientia Iranica
, vol.19
, Issue.6
, pp. 1856-1860
-
-
Xie, Q.1
-
7
-
-
84855301449
-
A new authenticated key agreement for session initiation protocol
-
Xie Q. A new authenticated key agreement for session initiation protocol. International Journal of Communication Systems 2012; 25(1):47-54.
-
(2012)
International Journal of Communication Systems
, vol.25
, Issue.1
, pp. 47-54
-
-
Xie, Q.1
-
8
-
-
84864760957
-
Cryptanalysis of a communication-efficient three-party password authenticated key exchange protocol
-
Wu S, Pu Q, Wang S, He D. Cryptanalysis of a communication-efficient three-party password authenticated key exchange protocol. Information Sciences 2012; 215:83-96.
-
(2012)
Information Sciences
, vol.215
, pp. 83-96
-
-
Wu, S.1
Pu, Q.2
Wang, S.3
He, D.4
-
9
-
-
10044260029
-
An efficient password authenticated key exchange protocol for imbalanced wireless networks
-
Chang YF, Chang CC, Yang JH, An efficient password authenticated key exchange protocol for imbalanced wireless networks. Computer Standards & Interfaces 2005; 27(3):313-322.
-
(2005)
Computer Standards & Interfaces
, vol.27
, Issue.3
, pp. 313-322
-
-
Chang, Y.F.1
Chang, C.C.2
Yang, J.H.3
-
17
-
-
59649083248
-
A more efficient and secure dynamic ID-based remote user authentication scheme
-
Wang YY, Liu JY, Xiao FX, DanJ. A more efficient and secure dynamic ID-based remote user authentication scheme. Computer Communications 2009; 32(4):583-585.
-
(2009)
Computer Communications
, vol.32
, Issue.4
, pp. 583-585
-
-
Wang, Y.Y.1
Liu, J.Y.2
Xiao, F.X.3
Dan, J.4
-
18
-
-
84855269122
-
On security of a practical three-party key exchange protocol with round efficiency
-
Lee CC, Chang YF. On security of a practical three-party key exchange protocol with round efficiency. Information Technology and Control 2008; 37(4):333-335.
-
(2008)
Information Technology and Control
, vol.37
, Issue.4
, pp. 333-335
-
-
Lee, C.C.1
Chang, Y.F.2
-
19
-
-
77953721873
-
Privacy-preserving collaborative recommender systems
-
Zhan J, Hsieh CL, Wang IC, Hsu TS, Liau CJ, Wang DW. Privacy-preserving collaborative recommender systems. IEEE Transactions on Systems, Man, and Cybernetics-Part C: Applications and Reviews 2010; 40(4):472-476.
-
(2010)
IEEE Transactions on Systems, Man, and Cybernetics-Part C: Applications and Reviews
, vol.40
, Issue.4
, pp. 472-476
-
-
Zhan, J.1
Hsieh, C.L.2
Wang, I.C.3
Hsu, T.S.4
Liau, C.J.5
Wang, D.W.6
-
20
-
-
79953037029
-
Practical electronic auction scheme with strong anonymity and bidding privacy
-
Li MJ, Juan JST, Tsai JHC. Practical electronic auction scheme with strong anonymity and bidding privacy. Information Sciences 2011; 181(12):2576-2586.
-
(2011)
Information Sciences
, vol.181
, Issue.12
, pp. 2576-2586
-
-
Li, M.J.1
Juan, J.S.T.2
Jhc, T.3
-
21
-
-
79953332145
-
An efficient identity-based protocol for private matching
-
Zhong S, Chen T. An efficient identity-based protocol for private matching. International Journal of Communication Systems 2011; 24(4):2576-2586.
-
(2011)
International Journal of Communication Systems
, vol.24
, Issue.4
, pp. 2576-2586
-
-
Zhong, S.1
Chen, T.2
-
23
-
-
84878523698
-
-
In Press, Corrected Proof, Available online 25 July
-
Li F, Zhang M, Takagi T. Identity-based partially blind signature in the standard model for electronic cash, Mathematical and Computer Modelling, In Press, Corrected Proof, Available online 25 July 2012. doi: 10.1016/j-mcm.2012.07.009
-
(2012)
Identity-based Partially Blind Signature in the Standard Model for Electronic Cash, Mathematical and Computer Modelling
-
-
Li, F.1
Zhang, M.2
Takagi, T.3
-
24
-
-
84860822201
-
Times limited accountable anonymous online Submission control system from single-verifier k-times group signature
-
Zhao X, Zhang F. Times limited accountable anonymous online Submission control system from single-verifier k-times group signature. Informatica 2012; 36:75-82.
-
(2012)
Informatica
, vol.36
, pp. 75-82
-
-
Zhao, X.1
Zhang, F.2
-
25
-
-
73449149289
-
Security of dynamic ID-based remote user authentication scheme
-
Seoul, Korea
-
Chang YF, Chang HC. Security of dynamic ID-based remote user authentication scheme, Proceedings of NCM 2009, Seoul, Korea, pp. 2108-2110, 2009.
-
(2009)
Proceedings of NCM 2009
, pp. 2108-2110
-
-
Chang, Y.F.1
Chang, H.C.2
|