-
1
-
-
0019634370
-
Password authentication with insecure communication
-
Lamport L. Password authentication with insecure communication. Communications of the ACM 1981; 24(11):770-772.
-
(1981)
Communications of the ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
3
-
-
52949137008
-
Two-factor mutual authentication based on smart cards and passwords
-
Yang G, Wong D, Wang H, Deng X. Two-factor mutual authentication based on smart cards and passwords. Journal of Computer and System Sciences 2008; 74(7):1160-1172.
-
(2008)
Journal of Computer and System Sciences
, vol.74
, Issue.7
, pp. 1160-1172
-
-
Yang, G.1
Wong, D.2
Wang, H.3
Deng, X.4
-
4
-
-
59649083248
-
A more efficient and secure dynamic ID-based remote user authentication scheme
-
Wang Y, Liu J, Xiao F, Dan J. A more efficient and secure dynamic ID-based remote user authentication scheme. Computer Communications 2009; 32(4):583-585.
-
(2009)
Computer Communications
, vol.32
, Issue.4
, pp. 583-585
-
-
Wang, Y.1
Liu, J.2
Xiao, F.3
Dan, J.4
-
5
-
-
77955133201
-
A secure remote authentication scheme preserving user anonymity with non-tamper resistant smart cards
-
Horng W, Lee C, Peng J. A secure remote authentication scheme preserving user anonymity with non-tamper resistant smart cards. WSEAS Transactions on Information Science and Applications 2010; 7(5):619-628.
-
(2010)
WSEAS Transactions on Information Science and Applications
, vol.7
, Issue.5
, pp. 619-628
-
-
Horng, W.1
Lee, C.2
Peng, J.3
-
6
-
-
78049322666
-
Two robust remote user authentication protocols using smart cards
-
Yeh KH, Su C, Lo NW, Li Y, Hung YX. Two robust remote user authentication protocols using smart cards. Journal of Systems and Software 2010; 83(12):2556-2565.
-
(2010)
Journal of Systems and Software
, vol.83
, Issue.12
, pp. 2556-2565
-
-
Yeh, K.H.1
Su, C.2
Lo, N.W.3
Li, Y.4
Hung, Y.X.5
-
8
-
-
78751642788
-
Cryptanalysis and security enhancement of a more efficient and secure dynamic ID-based remote user authentication scheme'
-
Khan M, Kim S, Alghathbar K. Cryptanalysis and security enhancement of a more efficient and secure dynamic ID-based remote user authentication scheme'. Computer Communications 2011; 34(3):305-309.
-
(2011)
Computer Communications
, vol.34
, Issue.3
, pp. 305-309
-
-
Khan, M.1
Kim, S.2
Alghathbar, K.3
-
9
-
-
79956361026
-
Secure dynamic identity-based authentication scheme using smart cards
-
Sood SK. Secure dynamic identity-based authentication scheme using smart cards. Information Security Journal: A Global Perspective 2011; 20(2):67-77.
-
(2011)
Information Security Journal: A Global Perspective
, vol.20
, Issue.2
, pp. 67-77
-
-
Sood, S.K.1
-
10
-
-
84863239521
-
Cryptanalysis and improvement of Sood et al.'s dynamic ID-based authentication scheme
-
Ramanujam R, Ramaswamy S (eds), LNCS. Springer: Berlin/Heidelberg
-
Ma CG, Wang D, Zhang QM. Cryptanalysis and improvement of Sood et al.'s dynamic ID-based authentication scheme. In ICDCIT 2012, Vol. 7154, Ramanujam R, Ramaswamy S (eds), LNCS. Springer: Berlin/Heidelberg, 2012; 141-152.
-
(2012)
ICDCIT 2012
, vol.7154
, pp. 141-152
-
-
Ma, C.G.1
Wang, D.2
Zhang, Q.M.3
-
11
-
-
84868139535
-
Cryptanalysis and security enhancement of a remote user authentication scheme using smart cards
-
Wang D, Ma CG. Cryptanalysis and security enhancement of a remote user authentication scheme using smart cards. The Journal of China Universities of Posts and Telecommunications 2012; 19(5):104-114.
-
(2012)
The Journal of China Universities of Posts and Telecommunications
, vol.19
, Issue.5
, pp. 104-114
-
-
Wang, D.1
Ma, C.G.2
-
12
-
-
84863056589
-
Robust smart-cards-based user authentication scheme with user anonymity
-
Wu SH, Zhu YF, Pu Q. Robust smart-cards-based user authentication scheme with user anonymity. Security and Communication Networks 2012; 5(2):236-248.
-
(2012)
Security and Communication Networks
, vol.5
, Issue.2
, pp. 236-248
-
-
Wu, S.H.1
Zhu, Y.F.2
Pu, Q.3
-
13
-
-
84864344507
-
Secure password-based remote user authentication scheme with non-tamper resistant smart cards
-
Cuppens-Boulahia N, Cuppens F, Garcia-Alfaro J (eds), LNCS Springer: Berlin/Heidelberg
-
Wang D, Ma CG, Wu P. Secure password-based remote user authentication scheme with non-tamper resistant smart cards. In 26th Annual IFIP Conference on Data and Applications Security and Privacy (DBSEC 2012), Vol. 7371, Cuppens-Boulahia N, Cuppens F, Garcia-Alfaro J (eds), LNCS. Springer: Berlin/Heidelberg, 2012; 114-121.
-
(2012)
26th Annual IFIP Conference on Data and Applications Security and Privacy (DBSEC 2012)
, vol.7371
, pp. 114-121
-
-
Wang, D.1
Ma, C.G.2
Wu, P.3
-
15
-
-
84901208308
-
Robust smart card based password authentication scheme against smart card security breach
-
[Accessed on 21 July 2012]
-
Wang D, Ma CG. Robust smart card based password authentication scheme against smart card security breach. Cryptology ePrint Archive. Report 2012/439, 2012. (Available from: http://eprint.iacr.org/2012/439.pdf). [Accessed on 21 July 2012].
-
(2012)
Cryptology EPrint Archive. Report 2012/439
-
-
Wang, D.1
Ma, C.G.2
-
16
-
-
64249125305
-
An improved smart card based password authentication scheme with provable security
-
Xu J, Zhu W, Feng D. An improved smart card based password authentication scheme with provable security. Computer Standards & Interfaces 2009; 31(4):723-728.
-
(2009)
Computer Standards & Interfaces
, vol.31
, Issue.4
, pp. 723-728
-
-
Xu, J.1
Zhu, W.2
Feng, D.3
-
17
-
-
0000474763
-
Differential power analysis
-
LNCS Springer: Berlin/Heidelberg
-
Kocher P, Jaffe J, Jun B. Differential power analysis. In Advances in Cryptology-CRYPTO 1999, Vol. 1666, LNCS. Springer: Berlin/Heidelberg, 1999; 789-789.
-
(1999)
Advances in Cryptology-CRYPTO 1999
, vol.1666
, pp. 789-789
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
18
-
-
0036566408
-
Examining smart-card security under the threat of power analysis attacks
-
Messerges TS, Dabbish EA, Sloan RH. Examining smart-card security under the threat of power analysis attacks. IEEE Transactions on Computers 2002; 51(5):541-552.
-
(2002)
IEEE Transactions on Computers
, vol.51
, Issue.5
, pp. 541-552
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
-
19
-
-
84856099707
-
Side-channel analysis of cryptographic rfids with analog demodulation
-
Juels A, Paar C (eds), LNCS Springer: Berlin/Heidelberg
-
Kasper T, Oswald D, Paar C. Side-channel analysis of cryptographic rfids with analog demodulation. In RFIDSEC 2012, Vol. 7055, Juels A, Paar C (eds), LNCS. Springer: Berlin/Heidelberg, 2012; 61-77.
-
(2012)
RFIDSEC 2012
, vol.7055
, pp. 61-77
-
-
Kasper, T.1
Oswald, D.2
Paar, C.3
-
20
-
-
77955312905
-
Advanced smart card based password authentication protocol
-
Song R. Advanced smart card based password authentication protocol. Computer Standards & Interfaces 2010; 32(5):321-325.
-
(2010)
Computer Standards & Interfaces
, vol.32
, Issue.5
, pp. 321-325
-
-
Song, R.1
-
22
-
-
84858082073
-
An improved dynamic ID-based remote user authentication with key agreement scheme
-
Wen F, Li X. An improved dynamic ID-based remote user authentication with key agreement scheme. Computers & Electrical Engineering 2012; 38(2):381-387.
-
(2012)
Computers & Electrical Engineering
, vol.38
, Issue.2
, pp. 381-387
-
-
Wen, F.1
Li, X.2
-
23
-
-
33846446132
-
Security analysis of a nonce-based user authentication scheme using smart cards
-
Nam J, Kim S, Won D. Security analysis of a nonce-based user authentication scheme using smart cards. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences 2007; 90(1):299-302.
-
(2007)
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
, vol.90
, Issue.1
, pp. 299-302
-
-
Nam, J.1
Kim, S.2
Won, D.3
-
24
-
-
43649083106
-
Cryptanalysis of a password authentication scheme over insecure networks
-
Xiang T, Wong K, Liao X. Cryptanalysis of a password authentication scheme over insecure networks. Journal of Computer and system Sciences 2008; 74(5):657-661.
-
(2008)
Journal of Computer and System Sciences
, vol.74
, Issue.5
, pp. 657-661
-
-
Xiang, T.1
Wong, K.2
Liao, X.3
-
25
-
-
84911986679
-
Cryptanalysis of song's advanced smart card based password authentication protocol
-
abs/1111.2744
-
Tapiador JE, Hernandez-Castro JC, Peris-Lopez P, Clark JA. Cryptanalysis of song's advanced smart card based password authentication protocol. CoRR 2011; abs/1111.2744.
-
(2011)
CoRR
-
-
Tapiador, J.E.1
Hernandez-Castro, J.C.2
Peris-Lopez, P.3
Clark, J.A.4
-
26
-
-
84858112506
-
Security flaws in three password-based remote user authentication schemes with smart cards
-
Shim K. Security flaws in three password-based remote user authentication schemes with smart cards. Cryptologia 2012; 36(1):62-69.
-
(2012)
Cryptologia
, vol.36
, Issue.1
, pp. 62-69
-
-
Shim, K.1
-
27
-
-
84876151110
-
Security flaws in a smart card based authentication scheme for multi-server environment
-
He D, Wu S. Security flaws in a smart card based authentication scheme for multi-server environment. Wireless Personal Communications 2012. DOI: 10.1007/s11277-012-0696-1.
-
(2012)
Wireless Personal Communications
-
-
He, D.1
Wu, S.2
-
28
-
-
79959763451
-
Cryptanalysis of Hsiang-Shih's authentication scheme for multi-server architecture
-
Yeh K, Lo N, Li Y. Cryptanalysis of Hsiang-Shih's authentication scheme for multi-server architecture. International Journal of Communication Systems 2011; 24(7):829-836.
-
(2011)
International Journal of Communication Systems
, vol.24
, Issue.7
, pp. 829-836
-
-
Yeh, K.1
Lo, N.2
Li, Y.3
-
29
-
-
84860614830
-
A new dynamic ID-based remote user authentication scheme with forward secrecy
-
Wang H, Zou L, Huang G, He J, Pang C, Zhang H, Zhao D, Yi Z (eds), LNCS Springer: Berlin/Heidelberg
-
Ma CG, Wang D, Zhao P, Wang YH. A new dynamic ID-based remote user authentication scheme with forward secrecy. In APWeb'12, Vol. 7234, Wang H, Zou L, Huang G, He J, Pang C, Zhang H, Zhao D, Yi Z (eds), LNCS. Springer: Berlin/Heidelberg, 2012; 199-211.
-
(2012)
APWeb'12
, vol.7234
, pp. 199-211
-
-
Ma, C.G.1
Wang, D.2
Zhao, P.3
Wang, Y.H.4
-
30
-
-
84871579251
-
Cryptanalysis of two dynamic id-based remote user authentication schemes for multi-server architecture
-
Xu L, Bertino E, Mu Y (eds), LNCS Springer: Berlin/Heidelberg
-
Wang D, Ma CG, Zhao S, Zhou C. Cryptanalysis of two dynamic id-based remote user authentication schemes for multi-server architecture. In Proceedingg of 6th International Conference on Network and System Security (NSS 2012), Vol. 7645, Xu L, Bertino E, Mu Y (eds), LNCS. Springer: Berlin/Heidelberg, 2012; 462-475.
-
(2012)
Proceedingg of 6th International Conference on Network and System Security (NSS 2012)
, vol.7645
, pp. 462-475
-
-
Wang, D.1
Ma, C.G.2
Zhao, S.3
Zhou, C.4
-
31
-
-
84871602807
-
Secure password-based remote user authentication scheme with non-tamper resistant smart cards
-
Park JJ (ed.), LNCS Springer: Berlin/Heidelberg
-
Wang D, Ma CG, Zhao S, Zhou C. Secure password-based remote user authentication scheme with non-tamper resistant smart cards. In 9th IFIP International Conference on Network and Parallel Computing (NPC 2012), Vol. 7513, Park JJ (ed.), LNCS. Springer: Berlin/Heidelberg, 2012; 110-118.
-
(2012)
9th IFIP International Conference on Network and Parallel Computing (NPC 2012)
, vol.7513
, pp. 110-118
-
-
Wang, D.1
Ma, C.G.2
Zhao, S.3
Zhou, C.4
-
33
-
-
0040231044
-
Foiling the cracker: A survey of, and improvements to, password security
-
Anaheim, CA, USA. Berkeley, CA, USA: USENIX Association, August
-
Klein DV. Foiling the cracker: a survey of, and improvements to, password security. Proceedings of the 2nd USENIX Security Workshop, Anaheim, CA, USA. Berkeley, CA, USA: USENIX Association, August 1990; 5-14.
-
(1990)
Proceedings of the 2nd USENIX Security Workshop
, pp. 5-14
-
-
Klein, D.V.1
-
34
-
-
77953306210
-
Password strength: An empirical analysis
-
San Diego, CA, USA, May
-
Dell'Amico M, Michiardi P, Roudier Y. Password strength: an empirical analysis. Proceedings of INFOCOM 2010, IEEE, San Diego, CA, USA, May 2010; 1-9.
-
(2010)
Proceedings of INFOCOM 2010, IEEE
, pp. 1-9
-
-
Dell'Amico, M.1
Michiardi, P.2
Roudier, Y.3
-
35
-
-
84957019437
-
Privacy protection for transactions of digital goods
-
Qing S, Okamoto T, Zhou J (eds), LNCS Springer: Berlin/Heidelberg
-
Bao F, Deng R. Privacy protection for transactions of digital goods. In ICICS 2001, Vol. 2229, Qing S, Okamoto T, Zhou J (eds), LNCS. Springer: Berlin/Heidelberg, 2001; 202-213.
-
(2001)
ICICS 2001
, vol.2229
, pp. 202-213
-
-
Bao, F.1
Deng, R.2
-
36
-
-
41149155794
-
Mobile privacy in wireless networks-revisited
-
March
-
Tang C, Wu D. Mobile privacy in wireless networks-revisited. IEEE Transactions on Wireless Communications March 2008; 7(3):1035-1042.
-
(2008)
IEEE Transactions on Wireless Communications
, vol.7
, Issue.3
, pp. 1035-1042
-
-
Tang, C.1
Wu, D.2
-
38
-
-
84911986325
-
A real-world analysis of kerberos password security
-
San Diego, CA, USA, March
-
Wu T. A real-world analysis of kerberos password security. Proceedings of NDSS'99, Internet Soc., San Diego, CA, USA, March 1998; 1-14.
-
(1998)
Proceedings of NDSS'99, Internet Soc
, pp. 1-14
-
-
Wu, T.1
-
39
-
-
84878356177
-
The science of guessing: Analyzing an anonymized corpus of 70 million passwords
-
San Francisco, CA, USA, May
-
Bonneau J. The science of guessing: analyzing an anonymized corpus of 70 million passwords. 33th IEEE Symposium on Security and Privacy (S&P 2012), IEEE Computer Society, San Francisco, CA, USA, May 2012; 538-552.
-
(2012)
33th IEEE Symposium on Security and Privacy (S&P 2012), IEEE Computer Society
, pp. 538-552
-
-
Bonneau, J.1
-
40
-
-
84856217617
-
An enhanced and security dynamic identity based authentication protocol for multi-server architecture using smart cards
-
Li X, Xiong Y, Ma J, Wang W. An enhanced and security dynamic identity based authentication protocol for multi-server architecture using smart cards. Journal of Network and Computer Applications 2012; 35(2):763-769.
-
(2012)
Journal of Network and Computer Applications
, vol.35
, Issue.2
, pp. 763-769
-
-
Li, X.1
Xiong, Y.2
Ma, J.3
Wang, W.4
-
41
-
-
78751645363
-
Robust authentication and key agreement scheme preserving the privacy of secret key
-
Wang RC, Juang WS, Lei CL. Robust authentication and key agreement scheme preserving the privacy of secret key. Computer Communications 2011; 34(3):274-280.
-
(2011)
Computer Communications
, vol.34
, Issue.3
, pp. 274-280
-
-
Wang, R.C.1
Juang, W.S.2
Lei, C.L.3
-
44
-
-
79251600218
-
A secure dynamic identity based authentication protocol for multi-server architecture
-
Sood S, Sarje A, Singh K. A secure dynamic identity based authentication protocol for multi-server architecture. Journal of Network and Computer Applications 2011; 34(2):609-618.
-
(2011)
Journal of Network and Computer Applications
, vol.34
, Issue.2
, pp. 609-618
-
-
Sood, S.1
Sarje, A.2
Singh, K.3
-
46
-
-
75449106985
-
Anonymity enhancement on robust and efficient password-authenticated key agreement using smart cards
-
Li X, Qiu W, Zheng D, Chen K, Li J. Anonymity enhancement on robust and efficient password-authenticated key agreement using smart cards. IEEE Transactions on Industrial Electronics 2010; 57(2):793-800.
-
(2010)
IEEE Transactions on Industrial Electronics
, vol.57
, Issue.2
, pp. 793-800
-
-
Li, X.1
Qiu, W.2
Zheng, D.3
Chen, K.4
Li, J.5
-
47
-
-
78049329614
-
Security enhancement on an improvement on two remote user authentication schemes using smart cards
-
Chen T, Hsiang H, Shih W. Security enhancement on an improvement on two remote user authentication schemes using smart cards. Future Generation Computer Systems 2011; 27(4):377-380.
-
(2011)
Future Generation Computer Systems
, vol.27
, Issue.4
, pp. 377-380
-
-
Chen, T.1
Hsiang, H.2
Shih, W.3
-
48
-
-
84957794888
-
Forward secrecy and its application to future mobile communications security
-
Imai H, Zheng Y (eds), LNCS Springer: Berlin/Heidelberg
-
Park D, Boyd C, Moon SJ. Forward secrecy and its application to future mobile communications security. In PKC 2000, Vol. 1751, Imai H, Zheng Y (eds), LNCS. Springer: Berlin/Heidelberg, 2000; 433-445.
-
(2000)
PKC 2000
, vol.1751
, pp. 433-445
-
-
Park, D.1
Boyd, C.2
Moon, S.J.3
-
49
-
-
79957996699
-
Further improved remote user authentication scheme
-
Kim J, Choi H, Copeland J. Further improved remote user authentication scheme. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences 2011; 94(6):1426-1433.
-
(2011)
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
, vol.94
, Issue.6
, pp. 1426-1433
-
-
Kim, J.1
Choi, H.2
Copeland, J.3
|