-
2
-
-
34547541295
-
A remote user authentication scheme using bilinear pairings and ECC, ISDA'06
-
Jinan, China
-
Jia Z, Zhang Y, Shao H, Lin Y, Wang J. A remote user authentication scheme using bilinear pairings and ECC, ISDA'06. IEEE Sixth International Conference on Intelligent Systems Design and Applications, 2006, vol. 2, Jinan, China, 2006; 1091-1094.
-
(2006)
IEEE Sixth International Conference on Intelligent Systems Design and Applications, 2006
, vol.2
, pp. 1091-1094
-
-
Jia, Z.1
Zhang, Y.2
Shao, H.3
Lin, Y.4
Wang, J.5
-
3
-
-
47849133252
-
Security enhancement of a remote user authentication scheme using bilinear pairings and ECC
-
NPC Workshops, Dalian, China
-
Vo DL, Kim K. Security enhancement of a remote user authentication scheme using bilinear pairings and ECC, IEEE IFIP International Conference on Network and Parallel Computing Workshops, 2007. NPC Workshops, Dalian, China, 2007; 144-147.
-
(2007)
IEEE IFIP International Conference on Network and Parallel Computing Workshops, 2007
, pp. 144-147
-
-
Vo, D.L.1
Kim, K.2
-
6
-
-
79957605527
-
An improvement of remote authentication and key agreement schemes
-
Lee CC, Li CT, Huang KY, Huang SY. An improvement of remote authentication and key agreement schemes. Journal of Circuits, Systems, and Computers 2011; 20(4): 697-707.
-
(2011)
Journal of Circuits, Systems, and Computers
, vol.20
, Issue.4
, pp. 697-707
-
-
Lee, C.C.1
Li, C.T.2
Huang, K.Y.3
Huang, S.Y.4
-
7
-
-
80053379375
-
A robust remote user authentication scheme using smart card
-
Li CT, Lee CC. A robust remote user authentication scheme using smart card. Information Technology and Control 2011; 40(3): 236-245.
-
(2011)
Information Technology and Control
, vol.40
, Issue.3
, pp. 236-245
-
-
Li, C.T.1
Lee, C.C.2
-
8
-
-
84869789541
-
Security enhancements of an improved timestamp-based remote user authentication scheme
-
SecTech, CA, CES3 2012, Springer, Jeju Island, Korea
-
An Y. Security enhancements of an improved timestamp-based remote user authentication scheme, International Conferences, SecTech, CA, CES3 2012, Springer, Jeju Island, Korea, 2012; 54-61.
-
(2012)
International Conferences
, pp. 54-61
-
-
An, Y.1
-
9
-
-
84860659191
-
Mobile device integration of a fingerprint biometric remote authentication scheme
-
Chen CL, Lee CC, Hsu CY. Mobile device integration of a fingerprint biometric remote authentication scheme. International Journal of Communication Systems 2012; 25(5): 585-597.
-
(2012)
International Journal of Communication Systems
, vol.25
, Issue.5
, pp. 585-597
-
-
Chen, C.L.1
Lee, C.C.2
Hsu, C.Y.3
-
10
-
-
84892506781
-
Design of improved password authentication and update scheme based on elliptic curve cryptography
-
Hafizul Islam S, Biswas G. Design of improved password authentication and update scheme based on elliptic curve cryptography. Mathematical and Computer Modelling 2013; 57(11-12): 2703C2717.
-
(2013)
Mathematical and Computer Modelling
, vol.57
, Issue.11-12
, pp. 2703C2717
-
-
Hafizul Islam, S.1
Biswas, G.2
-
11
-
-
78650459565
-
An enhanced two-factor user authentication scheme in wireless sensor networks
-
He D, Gao Y, Chan S, Chen C, Bu J. An enhanced two-factor user authentication scheme in wireless sensor networks. Ad Hoc & Sensor Wireless Networks 2010; 10(4): 361-371.
-
(2010)
Ad Hoc & Sensor Wireless Networks
, vol.10
, Issue.4
, pp. 361-371
-
-
He, D.1
Gao, Y.2
Chan, S.3
Chen, C.4
Bu, J.5
-
12
-
-
84866619118
-
An improved efficient remote password authentication scheme with smart card over insecure networks
-
Kumar M, Gupta MK, Kumari S. An improved efficient remote password authentication scheme with smart card over insecure networks. International Journal of Network Security 2011; 13(3): 167-177.
-
(2011)
International Journal of Network Security
, vol.13
, Issue.3
, pp. 167-177
-
-
Kumar, M.1
Gupta, M.K.2
Kumari, S.3
-
13
-
-
84865010577
-
A strong password-based remote mutual authentication with key agreement scheme on elliptic curve cryptosystem for portable devices
-
Li X, Wen F, Cui S. A strong password-based remote mutual authentication with key agreement scheme on elliptic curve cryptosystem for portable devices. Applied Mathematics 2012; 6(2): 217-222.
-
(2012)
Applied Mathematics
, vol.6
, Issue.2
, pp. 217-222
-
-
Li, X.1
Wen, F.2
Cui, S.3
-
14
-
-
84877844458
-
A new password authentication and user anonymity scheme based on elliptic curve cryptography and smart card
-
Li CT. A new password authentication and user anonymity scheme based on elliptic curve cryptography and smart card. IET Information Security 2013; 7(1): 3-10.
-
(2013)
IET Information Security
, vol.7
, Issue.1
, pp. 3-10
-
-
Li, C.T.1
-
15
-
-
84911957404
-
Efficient and flexible password authenticated key agreement for voice over internet protocol session initiation protocol using smart card
-
Zhang L, Tang S, Cai Z. Efficient and flexible password authenticated key agreement for voice over internet protocol session initiation protocol using smart card. International Journal of Communication Systems 2013; doi:10.1002/dac.2499.
-
(2013)
International Journal of Communication Systems
-
-
Zhang, L.1
Tang, S.2
Cai, Z.3
-
16
-
-
84860614830
-
A new dynamic ID-based remote user authentication scheme with forward secrecy
-
Web Technologies and Applications, Springer, Kunming, China
-
Ma C, Wang D, Zhao P, Wang Y. A new dynamic ID-based remote user authentication scheme with forward secrecy, The 2nd International Workshop on Mobile Business Collaboration. Web Technologies and Applications, Springer, Kunming, China, 2012; 99-211.
-
(2012)
The 2nd International Workshop on Mobile Business Collaboration
, pp. 99-211
-
-
Ma, C.1
Wang, D.2
Zhao, P.3
Wang, Y.4
-
17
-
-
84863056589
-
Robust smart-cards-based user authentication scheme with user anonymity
-
Wu S, Zhu Y, Pu Q. Robust smart-cards-based user authentication scheme with user anonymity. Security and Communication Networks 2012; 5(2): 236-248.
-
(2012)
Security and Communication Networks
, vol.5
, Issue.2
, pp. 236-248
-
-
Wu, S.1
Zhu, Y.2
Pu, Q.3
-
18
-
-
77955312905
-
Advanced smart card based password authentication protocol
-
Song R. Advanced smart card based password authentication protocol. Computer Standards & Interfaces 2010; 32(5): 321-325.
-
(2010)
Computer Standards & Interfaces
, vol.32
, Issue.5
, pp. 321-325
-
-
Song, R.1
-
19
-
-
84860752648
-
A reliable dynamic user-remote password authentication scheme over insecure network, 2012
-
Fukuoka, Japan
-
Wu ZY, Chiang DL, Lin TC, Chung YF, Chen TS. A reliable dynamic user-remote password authentication scheme over insecure network, 2012 26th International Conference on IEEE Advanced Information Networking and Applications Workshops (WAINA), Fukuoka, Japan, 2012; 25-28.
-
(2012)
26th International Conference on IEEE Advanced Information Networking and Applications Workshops (WAINA)
, pp. 25-28
-
-
Wu, Z.Y.1
Chiang, D.L.2
Lin, T.C.3
Chung, Y.F.4
Chen, T.S.5
-
20
-
-
84875308433
-
A robust and efficient timestamp-based remote user authentication scheme with smart card lost attack resistance
-
Tang H, Liu X, Jiang L. A robust and efficient timestamp-based remote user authentication scheme with smart card lost attack resistance. International Journal of Network Security 2013; 15(6): 360-368.
-
(2013)
International Journal of Network Security
, vol.15
, Issue.6
, pp. 360-368
-
-
Tang, H.1
Liu, X.2
Jiang, L.3
-
22
-
-
84876784827
-
A simple and robust anonymous two-factor authenticated key exchange protocol
-
Li X, Zhang Y. A simple and robust anonymous two-factor authenticated key exchange protocol. Security and Communication Networks 2013; 6(6): 711-722.
-
(2013)
Security and Communication Networks
, vol.6
, Issue.6
, pp. 711-722
-
-
Li, X.1
Zhang, Y.2
-
23
-
-
84874023543
-
Secure password-based remote user authentication scheme against smart card security breach
-
Wang D, Ma C, Zhang Q, Zhao S. Secure password-based remote user authentication scheme against smart card security breach. Journal of Networks 2013; 8(1): 148-155.
-
(2013)
Journal of Networks
, vol.8
, Issue.1
, pp. 148-155
-
-
Wang, D.1
Ma, C.2
Zhang, Q.3
Zhao, S.4
-
24
-
-
84872108080
-
A privacy enhanced authentication scheme for telecare medical information systems
-
Jiang Q, Ma J, Ma Z, Li G. A privacy enhanced authentication scheme for telecare medical information systems. Journal of Medical Systems 2013; 37(1): 9897. DOI: 10.1007/s10916-012-9897-0.
-
(2013)
Journal of Medical Systems
, vol.37
, Issue.1
, pp. 9897
-
-
Jiang, Q.1
Ma, J.2
Ma, Z.3
Li, G.4
-
25
-
-
84879448131
-
Security analysis and improvement of a privacy authentication scheme for telecare medical information systems
-
Wu F, Xu L. Security analysis and improvement of a privacy authentication scheme for telecare medical information systems. Journal of medical systems 2013; 37(4): 9958. DOI: 10.1007/s10916-013-9958-z.
-
(2013)
Journal of medical systems
, vol.37
, Issue.4
, pp. 9958
-
-
Wu, F.1
Xu, L.2
-
26
-
-
84861748201
-
An extended chaotic maps-based key agreement protocol with user anonymity
-
Lee CC, Chen CL, Wu CY, Huang SY. An extended chaotic maps-based key agreement protocol with user anonymity. Nonlinear Dynamics 2012; 69(1-2): 79-87.
-
(2012)
Nonlinear Dynamics
, vol.69
, Issue.1-2
, pp. 79-87
-
-
Lee, C.C.1
Chen, C.L.2
Wu, C.Y.3
Huang, S.Y.4
-
27
-
-
84888642495
-
An extended chaotic maps based user authentication and privacy preserving scheme against dos attacks in pervasive and ubiquitous computing environments
-
Li CT, Lee CC, Weng CY. An extended chaotic maps based user authentication and privacy preserving scheme against dos attacks in pervasive and ubiquitous computing environments. Nonlinear Dynamics 2013; 74(4): 1133-1143.
-
(2013)
Nonlinear Dynamics
, vol.74
, Issue.4
, pp. 1133-1143
-
-
Li, C.T.1
Lee, C.C.2
Weng, C.Y.3
-
29
-
-
84860376061
-
Dynamic ID-based remote user password authentication schemes using smart cards: a review
-
Madhusudhan R, Mittal R. Dynamic ID-based remote user password authentication schemes using smart cards: a review. Journal of Network and Computer Applications 2012; 35(4): 1235-1248.
-
(2012)
Journal of Network and Computer Applications
, vol.35
, Issue.4
, pp. 1235-1248
-
-
Madhusudhan, R.1
Mittal, R.2
-
30
-
-
84867658174
-
On the security of an improved password authentication scheme based on ECC, 3rd International Conference on Information Computing and Applications, 2012
-
Springer, Chengde, China
-
Wang D, Ma C, Shi L, Wang Y. On the security of an improved password authentication scheme based on ECC, 3rd International Conference on Information Computing and Applications, 2012. Information Computing and Applications, Springer, Chengde, China, 2012; 181-188.
-
(2012)
Information Computing and Applications
, pp. 181-188
-
-
Wang, D.1
Ma, C.2
Shi, L.3
Wang, Y.4
-
31
-
-
79951505114
-
Security weaknesses of Song's advanced smart card based password authentication protocol, 2010
-
Shanghai, China
-
Horng WB, Lee CP, Peng JW. Security weaknesses of Song's advanced smart card based password authentication protocol, 2010 IEEE International Conference on Progress in Informatics and Computing (PIC), vol.1, Shanghai, China, 2010; 477-480.
-
(2010)
IEEE International Conference on Progress in Informatics and Computing (PIC)
, vol.1
, pp. 477-480
-
-
Horng, W.B.1
Lee, C.P.2
Peng, J.W.3
-
32
-
-
84919402473
-
Three attacks on Jia 's remote user authentication scheme using bilinear pairings and ECC
-
Yoon EJ, Yoo KY. Three attacks on Jia et al.'s remote user authentication scheme using bilinear pairings and ECC. World Academy of Science, Engineering and Technology 2011; 60: 447-451.
-
(2011)
World Academy of Science, Engineering and Technology
, vol.60
, pp. 447-451
-
-
Yoon, E.J.1
Yoo, K.Y.2
-
33
-
-
84911988880
-
Security flaws in two improved remote user authentication schemes using smart cards
-
Ma C, Wang D, Zhao S. Security flaws in two improved remote user authentication schemes using smart cards. International Journal of Communication Systems 2012; doi:10.1002/dac.2468.
-
(2012)
International Journal of Communication Systems
-
-
Ma, C.1
Wang, D.2
Zhao, S.3
-
34
-
-
84870350603
-
Cryptanalysis of a dynamic ID-based remote user authentication with key agreement scheme
-
Tang H, Liu X. Cryptanalysis of a dynamic ID-based remote user authentication with key agreement scheme. International Journal of Communication Systems 2012; 25(12): 1639-1644.
-
(2012)
International Journal of Communication Systems
, vol.25
, Issue.12
, pp. 1639-1644
-
-
Tang, H.1
Liu, X.2
-
35
-
-
84863497002
-
Cryptanalysis of Song's advanced smart card based password authentication protocol
-
arXiv preprint arXiv:1111.2744.
-
Tapiador JE, Hernandez-Castro JC, Peris-Lopez P, Clark JA. Cryptanalysis of Song's advanced smart card based password authentication protocol, 2011. arXiv preprint arXiv:1111.2744.
-
(2011)
-
-
Tapiador, J.E.1
Hernandez-Castro, J.C.2
Peris-Lopez, P.3
Clark, J.A.4
-
37
-
-
84939573910
-
Differential Power Analysis. Advances in CryptologyłCRYPTO99
-
Springer, Santa Barbara, California, USA
-
Kocher P, Jaffe J, Jun B. Differential Power Analysis. Advances in CryptologyłCRYPTO99, 19th Annual International Cryptology Conference, Springer, Santa Barbara, California, USA, 1999; 388-397.
-
(1999)
19th Annual International Cryptology Conference
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
38
-
-
0036566408
-
Examining smart-card security under the threat of power analysis attacks
-
Messerges TS, Dabbish EA, Sloan RH. Examining smart-card security under the threat of power analysis attacks. IEEE Transactions on Computers 2002; 51(5): 541-552.
-
(2002)
IEEE Transactions on Computers
, vol.51
, Issue.5
, pp. 541-552
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
-
39
-
-
79959430513
-
One for all-all for one: unifying standard differential power analysis attacks
-
Mangard S, Oswald E, Standaert FX. One for all-all for one: unifying standard differential power analysis attacks. IET Information Security 2011; 5(2): 100-110.
-
(2011)
IET Information Security
, vol.5
, Issue.2
, pp. 100-110
-
-
Mangard, S.1
Oswald, E.2
Standaert, F.X.3
-
40
-
-
84957794888
-
Forward secrecy and its application to future mobile communications security
-
Third International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2000
-
Park D, Boyd C, Moon SJ. Forward secrecy and its application to future mobile communications security, Third International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2000, 2000; 433-445.
-
(2000)
, pp. 433-445
-
-
Park, D.1
Boyd, C.2
Moon, S.J.3
-
41
-
-
0027726717
-
Random oracles are practical: a paradigm for designing efficient protocols
-
Fairfax, VA, USA
-
Bellare M, Rogaway P. Random oracles are practical: a paradigm for designing efficient protocols, Proceedings of the 1st ACM Conference on Computer and Communications Security, Fairfax, VA, USA, 1993; 62-73.
-
(1993)
Proceedings of the 1st ACM Conference on Computer and Communications Security
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
-
42
-
-
84873466407
-
Authenticated Key Exchange Secure Against Dictionary Attacks. Advances in Cryptology-Eurocrypt 2000
-
Springer, Bruges, Belgium
-
Bellare M, Pointcheval D, Rogaway P. Authenticated Key Exchange Secure Against Dictionary Attacks. Advances in Cryptology-Eurocrypt 2000, International Conference on the Theory and Application of Cryptographic Techniques, Springer, Bruges, Belgium, 2000; 139-155.
-
(2000)
International Conference on the Theory and Application of Cryptographic Techniques
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
43
-
-
33645601444
-
Authentication and key agreement via memorable password, ISOC Network and Distributed System Security Symposium
-
Citeseer
-
Kwon T. Authentication and key agreement via memorable password, ISOC Network and Distributed System Security Symposium, vol. 20, Citeseer, 2001; 31-33.
-
(2001)
, vol.20
, pp. 31-33
-
-
Kwon, T.1
-
44
-
-
33750072402
-
Practical Authenticated Key Agreement Using Passwords. Information Security
-
ISC 2004, Springer, Palo Alto, CA, USA
-
Kwon T. Practical Authenticated Key Agreement Using Passwords. Information Security, 7th International Conference, ISC 2004, Springer, Palo Alto, CA, USA, 2004; 1-12.
-
(2004)
7th International Conference
, pp. 1-12
-
-
Kwon, T.1
-
46
-
-
84906780088
-
An ID-based mutual authentication with key agreement protocol for multiserver environment on elliptic curve cryptosystem
-
Han W, Zhu Z. An ID-based mutual authentication with key agreement protocol for multiserver environment on elliptic curve cryptosystem. International Journal of Communication Systems 2012. DOI: 10.1002/dac.2405.
-
(2012)
International Journal of Communication Systems
-
-
Han, W.1
Zhu, Z.2
-
47
-
-
84859767453
-
An efficient remote user authentication and key agreement protocol for mobile client-server environment from pairings
-
He D. An efficient remote user authentication and key agreement protocol for mobile client-server environment from pairings. Ad Hoc Networks 2012; 10(6): 1009-1016.
-
(2012)
Ad Hoc Networks
, vol.10
, Issue.6
, pp. 1009-1016
-
-
He, D.1
-
48
-
-
33750710411
-
-
Implementing Cryptographic Pairings on Smartcards, Cryptographic Hardware and Embedded Systems-CHES 2006, Springer, Yokohama, Japan
-
Scott M, Costigan N, Abdulwahab W. Implementing Cryptographic Pairings on Smartcards, Cryptographic Hardware and Embedded Systems-CHES 2006, Springer, Yokohama, Japan, 2006; 134-147.
-
(2006)
, pp. 134-147
-
-
Scott, M.1
Costigan, N.2
Abdulwahab, W.3
|