-
1
-
-
36349014859
-
A new method for using hash functions to solve remote user authentication
-
Tzung-Her Chen, Wei-Bin Lee. A new method for using hash functions to solve remote user authentication. Computers & Electrical Engineering, 2008, Vol. 34, No. 1, 53-62.
-
(2008)
Computers & Electrical Engineering
, vol.34
, Issue.1
, pp. 53-62
-
-
Chen, T.-H.1
Lee, W.-B.2
-
2
-
-
0036302680
-
An efficient and practical solution to remote authentication: Smart card
-
H. Y. Chien, J. K. Jan, Y. M. Tseng. An efficient and practical solution to remote authentication: smart card. Computers & Security, 2002, Vol. 21, No. 4, 372–375.
-
(2002)
Computers & Security
, vol.21
, Issue.4
, pp. 372-375
-
-
Chien, H.Y.1
Jan, J.K.2
Tseng, Y.M.3
-
3
-
-
0742268499
-
Security of Chien et al.’s remote user authentication scheme using smart cards
-
C. L. Hsu. Security of Chien et al.’s remote user authentication scheme using smart cards. Computer Standards & Interfaces, 2004, Vol. 26, No. 3, 167–169.
-
(2004)
Computer Standards & Interfaces
, vol.26
, Issue.3
, pp. 167-169
-
-
Hsu, C.L.1
-
4
-
-
79959762596
-
Secure smart card based password authentication scheme with user anonymity
-
C. T. Li. Secure smart card based password authentication scheme with user anonymity. Information Technology and Control, 2011, Vol. 40, No. 2, 157–162.
-
(2011)
Information Technology and Control
, vol.40
, Issue.2
, pp. 157-162
-
-
Li, C.T.1
-
5
-
-
77955312905
-
Advanced smart card based password authentication protocol
-
R. Song. Advanced smart card based password authentication protocol. Computer Standards & Interfaces, 2010, Vol. 32, No. (5–6), 321–325.
-
(2010)
Computer Standards & Interfaces
, vol.32
, Issue.56
, pp. 321-325
-
-
Song, R.1
-
6
-
-
78751645363
-
Robust authentication and key agreement scheme preserving the privacy of secret key
-
R. C. Wang, W. S. Juang, C. L. Lei. Robust authentication and key agreement scheme preserving the privacy of secret key. Computer Communications, 2011, Vol. 34, No. 3, 274–280.
-
(2011)
Computer Communications
, vol.34
, Issue.3
, pp. 274-280
-
-
Wang, R.C.1
Juang, W.S.2
Lei, C.L.3
-
7
-
-
84863369937
-
Cryptanalysis and improvements of an anonymous multi-receiver identity-based encryption scheme
-
H. Wang, Y. Zhang, H. Xiong, B. Qin. Cryptanalysis and improvements of an anonymous multi-receiver identity-based encryption scheme. IET Information Security, 2012, Vol. 6, No. 1, 20–27.
-
(2012)
IET Information Security
, vol.6
, Issue.1
, pp. 20-27
-
-
Wang, H.1
Zhang, Y.2
Xiong, H.3
Qin, B.4
-
8
-
-
0019634370
-
Password authentication with insecure communication
-
L. Lamport. Password authentication with insecure communication. Communications of ACM, 1981, Vol. 24, No. 11, 770-772.
-
(1981)
Communications of ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
9
-
-
84860799373
-
A robust and flexible biometrics remote user authentication scheme
-
Eun-Jun Yoon, Kee-Young Yoo. A robust and flexible biometrics remote user authentication scheme. International Journal of Innovative Computing Information and Control, 2012, Vol. 8, No. 5, 3173-3188.
-
(2012)
International Journal of Innovative Computing Information and Control
, vol.8
, Issue.5
, pp. 3173-3188
-
-
Yoon, E.-J.1
Yoo, K.-Y.2
-
10
-
-
84860996400
-
One-round identity-based key exchange with Perfect Forward Security
-
Min Xie, Libin Wang. One-round identity-based key exchange with Perfect Forward Security. Information Processing Letters, 2012, Vol. 112, No. 14-15, 587-591.
-
(2012)
Information Processing Letters
, vol.112
, Issue.14-15
, pp. 587-591
-
-
Xie, M.1
Wang, L.2
-
11
-
-
84859178298
-
A secure and efficiency ID-based authenticated key agreement scheme based on elliptic curve cryptosystem foe mobile devices
-
Eun-Jun Yoon, Sung-Bae Choi, Kee-Young Yoo. A secure and efficiency ID-based authenticated key agreement scheme based on elliptic curve cryptosystem foe mobile devices. International Journal of Innovative Computing Information and Control, 2012, Vol. 8, No. 4, 2637-2653.
-
(2012)
International Journal of Innovative Computing Information and Control
, vol.8
, Issue.4
, pp. 2637-2653
-
-
Yoon, E.-J.1
Choi, S.-B.2
Yoo, K.-Y.3
-
12
-
-
4043122631
-
A dynamic ID-based remote user authentication scheme
-
M. L. Das, A. Saxena, V. P. Gulati. A dynamic ID-based remote user authentication scheme. IEEE Transactions on Consumer Electronics, 2004, Vol. 50, No. 2, 629-631.
-
(2004)
IEEE Transactions on Consumer Electronics
, vol.50
, Issue.2
, pp. 629-631
-
-
Das, M.L.1
Saxena, A.2
Gulati, V.P.3
-
13
-
-
81855227196
-
Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards
-
A. K. Das. Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards. IET Information Security, 2011, Vol. 5, No. 3, 145–151.
-
(2011)
IET Information Security
, vol.5
, Issue.3
, pp. 145-151
-
-
Das, A.K.1
-
14
-
-
33646477537
-
An efficient and complete remote user authentication scheme using smart cards
-
Horng-Twu Liaw, Jiann-Fu Lin, Wei-Chen Wu. An efficient and complete remote user authentication scheme using smart cards. Mathematical and Computer Modelling, 2006, Vol. 44, No. 1-2, 223-228.
-
(2006)
Mathematical and Computer Modelling
, vol.44
, Issue.1-2
, pp. 223-228
-
-
Liaw, H.-T.1
Lin, J.-F.2
Wei-Chen, W.3
-
15
-
-
84892506781
-
Design of improved password authentication and update scheme based on elliptic curve cryptography
-
S. H. Islam, G. P. Biswas. Design of improved password authentication and update scheme based on elliptic curve cryptography. Mathematical and Computer Modelling, 2013, Vol. 57, No. 11-12, 2703-2717.
-
(2013)
Mathematical and Computer Modelling
, vol.57
, Issue.11-12
, pp. 2703-2717
-
-
Islam, S.H.1
Biswas, G.P.2
-
16
-
-
0037282439
-
A password authentication scheme with secure password updating
-
C. L. Lin, T. Hwang. A password authentication scheme with secure password updating. Computers & Security, 2003, Vol. 22, No. 1, 68-72.
-
(2003)
Computers & Security
, vol.22
, Issue.1
, pp. 68-72
-
-
Lin, C.L.1
Hwang, T.2
-
17
-
-
84877844458
-
A new password authentication and user anonymity scheme based on elliptic curve cryptography and smart card
-
Chun-Ta Li. A new password authentication and user anonymity scheme based on elliptic curve cryptography and smart card. IET Information Security, 2013, Vol. 7, No. 1, 3-10.
-
(2013)
IET Information Security
, vol.7
, Issue.1
, pp. 3-10
-
-
Li, C.-T.1
-
18
-
-
0025386404
-
A logic of authentication.
-
M. Burrows, M. Abadi, R. Needham. A logic of authentication. ACM Transactions on Computer Systems, 1990, Vol. 8, No. 1, 18-36.
-
(1990)
ACM Transactions on Computer Systems
, vol.8
, Issue.1
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
-
19
-
-
84868014129
-
A new dynamic identity-based authentication protocol for multi-server environment using elliptic curve cryptography
-
M. K. Khan, D. He. A new dynamic identity-based authentication protocol for multi-server environment using elliptic curve cryptography. Security and Communication Networks, 2012, Vol. 5, No. 11, 1260-1266.
-
(2012)
Security and Communication Networks
, vol.5
, Issue.11
, pp. 1260-1266
-
-
Khan, M.K.1
He, D.2
|