-
1
-
-
0019634370
-
Password authentication with insecure communication
-
Lamport L. Password authentication with insecure communication. Communications of the ACM 1987; 24(11):770-772.
-
(1987)
Communications of the ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
3
-
-
34248666700
-
Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards
-
Wang XM, Zhang WF, Jhang JS, Khan MK. Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards. Computer Standards and Interfaces 2007; 29:507-512.
-
(2007)
Computer Standards and Interfaces
, vol.29
, pp. 507-512
-
-
Wang, X.M.1
Zhang, W.F.2
Jhang, J.S.3
Khan, M.K.4
-
4
-
-
0036302680
-
An efficient and practical solution to remote authentication: Smart card
-
Chien HY, Jan JK, Tseng YM. An efficient and practical solution to remote authentication: smart card. Computers & Security 2002; 21(4):372-375.
-
(2002)
Computers & Security
, vol.21
, Issue.4
, pp. 372-375
-
-
Chien, H.Y.1
Jan, J.K.2
Tseng, Y.M.3
-
5
-
-
78751642788
-
Cryptanalysis and security enhancement of a ?more efficient & secure dynamic ID-based remote user authentication scheme'
-
Khan MK, Kim SK, Alghathbar K. Cryptanalysis and security enhancement of a ?more efficient & secure dynamic ID-based remote user authentication scheme'. Computer Communications 2010; 34(3):305-309.
-
(2010)
Computer Communications
, vol.34
, Issue.3
, pp. 305-309
-
-
Khan, M.K.1
Kim, S.K.2
Alghathbar, K.3
-
6
-
-
9544227377
-
Sremote user authentication scheme using smart cards
-
Improvement of Chien et al.
-
Lee SW, Kim HS, Yoo KY. Improvement of Chien et al.'s remote user authentication scheme using smart cards. Computer Standards & Interfaces 2005; 27(2):181-183.
-
(2005)
Computer Standards & Interfaces
, vol.27
, Issue.2
, pp. 181-183
-
-
Lee, S.W.1
Kim, H.S.2
Yoo, K.Y.3
-
7
-
-
84866625525
-
Cryptanalysis and security enhancement of Chen et al.'s remote user authentication scheme using smart card
-
Kumari S, Gupta MK, Kumar M. Cryptanalysis and security enhancement of Chen et al.'s remote user authentication scheme using smart card. Central European Journal of Computer Science 2012; 2(1):60-75.
-
(2012)
Central European Journal of Computer Science
, vol.2
, Issue.1
, pp. 60-75
-
-
Kumari, S.1
Gupta, M.K.2
Kumar, M.3
-
8
-
-
78650606014
-
Comments on symmetric key encryption based smart card authentication scheme
-
IEEE Cairo, Egypt, 2-4 November
-
Pippal RS, Jaidhar CD, Tapaswi S. Comments on symmetric key encryption based smart card authentication scheme. Proceedings of the Second International Conference on Computer Technology and Development (ICCTD). IEEE: Cairo, Egypt, 2-4 November 2010; 482-484.
-
(2010)
Proceedings of the Second International Conference on Computer Technology and Development (ICCTD)
, pp. 482-484
-
-
Pippal, R.S.1
Jaidhar, C.D.2
Tapaswi, S.3
-
9
-
-
77955312905
-
Advanced smart card based password authentication protocol
-
Song R. Advanced smart card based password authentication protocol. Computer Standards & Interfaces 2010; 32(5):321-325.
-
(2010)
Computer Standards & Interfaces
, vol.32
, Issue.5
, pp. 321-325
-
-
Song, R.1
-
10
-
-
77952983609
-
An improvement of Xu et al. 's authentication scheme using smart cards
-
ACM: Bangalore, Karnataka, India
-
Sood SK, Sarje AK, Singh K. An improvement of Xu et al.'s authentication scheme using smart cards. Proceedings of The Third Annual ACM Bangalore Conference (COMPUTE' 10). ACM: Bangalore, Karnataka, India, 2010; 1-5.
-
(2010)
Proceedings of the Third Annual ACM Bangalore Conference (COMPUTE'10)
, pp. 1-5
-
-
Sood, S.K.1
Sarje, A.K.2
Singh, K.3
-
11
-
-
64249125305
-
An improved smart card based password authentication scheme with provable security
-
Xu J, Zhu WT, Feng DG. An improved smart card based password authentication scheme with provable security. Computer Standards & Interfaces 2009; 31(4):723-728.
-
(2009)
Computer Standards & Interfaces
, vol.31
, Issue.4
, pp. 723-728
-
-
Xu, J.1
Zhu, W.T.2
Feng, D.G.3
-
13
-
-
84866619118
-
An improved efficient remote password authentication scheme with smart card over insecure networks
-
Kumar M, Gupta MK, Kumari S. An improved efficient remote password authentication scheme with smart card over insecure networks. International Journal of Network Security 2011; 13(3): 167-177.
-
(2011)
International Journal of Network Security
, vol.13
, Issue.3
, pp. 167-177
-
-
Kumar, M.1
Gupta, M.K.2
Kumari, S.3
-
14
-
-
79952059658
-
Lightweight and provably secure user authentication with anonymity for the global mobility network
-
Chen C, He D, Chan S, Bu J, Gao Y, Fan R. Lightweight and provably secure user authentication with anonymity for the global mobility network. International Journal of Communication Systems 2011; 24(3):347-362.
-
(2011)
International Journal of Communication Systems
, vol.24
, Issue.3
, pp. 347-362
-
-
Chen, C.1
He, D.2
Chan, S.3
Bu, J.4
Gao, Y.5
Fan, R.6
-
15
-
-
79959763451
-
Cryptanalysis of Hsiang-Shih's authentication scheme for multi-server architecture
-
Yeh KH, Lo NW, Li Y. Cryptanalysis of Hsiang-Shih's authentication scheme for multi-server architecture. International Journal of Communication Systems 2011; 24(7):829-836.
-
(2011)
International Journal of Communication Systems
, vol.24
, Issue.7
, pp. 829-836
-
-
Yeh, K.H.1
Lo, N.W.2
Li, Y.3
-
17
-
-
84859161671
-
Towards generalized ID-based user authentication for mobile multi-server environment
-
Chuang YH, Tseng YM. Towards generalized ID-based user authentication for mobile multi-server environment, International Journal of Communication Systems 2012; 25(4):447-460.
-
(2012)
International Journal of Communication Systems
, vol.25
, Issue.4
, pp. 447-460
-
-
Chuang, Y.H.1
Tseng, Y.M.2
-
18
-
-
84870350603
-
Cryptanalysis of a dynamic ID-based remote user authentication with key agreement scheme
-
Tang H, Liu X. Cryptanalysis of a dynamic ID-based remote user authentication with key agreement scheme. International Journal of Communication Systems 2012; 25(12):1639-1644.
-
(2012)
International Journal of Communication Systems
, vol.25
, Issue.12
, pp. 1639-1644
-
-
Tang, H.1
Liu, X.2
-
24
-
-
0036566408
-
Examining smart card security under the threat of power analysis attacks
-
Messerges TS, Dabbish EA, Sloan RH. Examining smart card security under the threat of power analysis attacks. IEEE Transactions on Computers 2002; 51(5):541-552.
-
(2002)
IEEE Transactions on Computers
, vol.51
, Issue.5
, pp. 541-552
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
|