-
1
-
-
84863310175
-
Cryptanalysis of an authenticated key agreement protocol for wireless mobile communications
-
He, D. (2012). Cryptanalysis of an authenticated key agreement protocol for wireless mobile communications. ETRI Journal, 34(3), 482–484.
-
(2012)
ETRI Journal
, vol.34
, Issue.3
, pp. 482-484
-
-
He, D.1
-
2
-
-
84859767453
-
An efficient remote user authentication and key exchange protocol for mobile client-server environment from pairings
-
He, D. (2012). An efficient remote user authentication and key exchange protocol for mobile client-server environment from pairings. Ad Hoc Networks, 10(6), 1009–1016.
-
(2012)
Ad Hoc Networks
, vol.10
, Issue.6
, pp. 1009-1016
-
-
He, D.1
-
3
-
-
80051571433
-
An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security
-
He, D., Chen, J., & Hu, J. (2012). An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security. Information Fusion, 13(3), 223–230.
-
(2012)
Information Fusion
, vol.13
, Issue.3
, pp. 223-230
-
-
He, D.1
Chen, J.2
Hu, J.3
-
4
-
-
84864058187
-
A more secure authentication scheme for telecare medicine information systems
-
He, D., Chen, J., & Zhang, R. (2012). A more secure authentication scheme for telecare medicine information systems. Journal of Medical Systems, 36(3), 1989–1995.
-
(2012)
Journal of Medical Systems
, vol.36
, Issue.3
, pp. 1989-1995
-
-
He, D.1
Chen, J.2
Zhang, R.3
-
5
-
-
84861369956
-
Further improvement of Juang et al. ’s password-authenticated key agreement scheme using smart cards
-
He, D., Chen, J., & Hu, J. (2011). Further improvement of Juang et al. ’s password-authenticated key agreement scheme using smart cards. Kuwait Journal of Science & Engineering, 38(2A), 55–68.
-
(2011)
Kuwait Journal of Science & Engineering
, vol.38
, Issue.2A
, pp. 55-68
-
-
He, D.1
Chen, J.2
Hu, J.3
-
6
-
-
84878978708
-
Improvement on a smart card based password authentication scheme
-
He, D., Chen, J., & Hu, J. (2012). Improvement on a smart card based password authentication scheme. Journal of Internet Technology, 13(3), 405–410.
-
(2012)
Journal of Internet Technology
, vol.13
, Issue.3
, pp. 405-410
-
-
He, D.1
Chen, J.2
Hu, J.3
-
7
-
-
84863985527
-
A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography. Security and Communication Networks
-
He, D., Chen, J., & Chen, Y. (2012). A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography. Security and Communication Networks. doi:10.1002/sec.506.
-
(2012)
doi:10.1002/sec.506
-
-
He, D.1
Chen, J.2
Chen, Y.3
-
8
-
-
84863989374
-
Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol
-
He, D., Chen, Y., & Chen, J. (2012). Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol. Nonlinear Dynamics, 69(3), 1149–1157.
-
(2012)
Nonlinear Dynamics
, vol.69
, Issue.3
, pp. 1149-1157
-
-
He, D.1
Chen, Y.2
Chen, J.3
-
9
-
-
49849096355
-
Efficient multi-server authentication scheme based on one-way hash function without verification table
-
Tsai, J. L. (2008). Efficient multi-server authentication scheme based on one-way hash function without verification table. Computers and Security, 27(3–4), 115–121.
-
(2008)
Computers and Security
, vol.27
, Issue.3-4
, pp. 115-121
-
-
Tsai, J.L.1
-
10
-
-
56449110391
-
A dynamic ID-based user authentication and key agreement scheme for multi-server environment using bilinear pairings
-
Geng, J., & Zhang, L. (2008). A dynamic ID-based user authentication and key agreement scheme for multi-server environment using bilinear pairings. In Proceedings of the power electronics and intelligent transportation system, pp. 33–37.
-
(2008)
In Proceedings of the power electronics and intelligent transportation system
, pp. 33-37
-
-
Geng, J.1
Zhang, L.2
-
11
-
-
54449094667
-
A secure dynamic ID based remote user authentication scheme for multi-server environment
-
Liao, Y. P., & Wang, S. S. (2009). A secure dynamic ID based remote user authentication scheme for multi-server environment. Computer Standards and Interfaces, 31(1), 24–29.
-
(2009)
Computer Standards and Interfaces
, vol.31
, Issue.1
, pp. 24-29
-
-
Liao, Y.P.1
Wang, S.S.2
-
12
-
-
68849128250
-
Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment
-
Hsiang, H. C., & Shih, W. K. (2009). Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment. Computer Standards and Interfaces, 31(6), 1118–1123.
-
(2009)
Computer Standards and Interfaces
, vol.31
, Issue.6
, pp. 1118-1123
-
-
Hsiang, H.C.1
Shih, W.K.2
-
13
-
-
79959970986
-
A secure dynamic ID based remote user authentication scheme for multi-server environment using smart cards
-
Lee, C.-C., Lin, T.-H., & Chang, R.-X. (2011). A secure dynamic ID based remote user authentication scheme for multi-server environment using smart cards. Expert Systems with Applications, 38, 13863–13870.
-
(2011)
Expert Systems with Applications
, vol.38
, pp. 13863-13870
-
-
Lee, C.-C.1
Lin, T.-H.2
Chang, R.-X.3
-
14
-
-
84859157438
-
Cryptanalysis of multiple-server password-authenticated key agreement scheme using smart cards
-
Lee, S. G. (2009). Cryptanalysis of multiple-server password-authenticated key agreement scheme using smart cards. Cryptology ePrint Archive 2009; Report 2009/490.
-
(2009)
Cryptology ePrint Archive 2009; Report
, vol.2009
, Issue.490
-
-
Lee, S.G.1
-
15
-
-
84859161961
-
Security weaknesses of two dynamic ID-based user authentication and key agreement schemes for multi-server environment
-
Chuang, Y. H., & Tseng, Y. M. (2009). Security weaknesses of two dynamic ID-based user authentication and key agreement schemes for multi-server environment. In Proceedings of the national computer symposium (NCS2009), vol. 5, pp. 250–257.
-
(2009)
In Proceedings of the national computer symposium (NCS2009)
, vol.5
, pp. 250-257
-
-
Chuang, Y.H.1
Tseng, Y.M.2
-
16
-
-
79251600218
-
A secure dynamic identity based authentication protocol for multi-server architecture
-
Sood, S. K., Sarje, A., & Singh, K. (2011). A secure dynamic identity based authentication protocol for multi-server architecture. Journal of Network and Computer Applications, 34, 609–618.
-
(2011)
Journal of Network and Computer Applications
, vol.34
, pp. 609-618
-
-
Sood, S.K.1
Sarje, A.2
Singh, K.3
-
17
-
-
84856217617
-
An efficient and secure dynamic identity based authentication protocol for multi-server architecture using smartcards
-
Li, X., Xiong, Y., Ma, J., & Wang, W. (2012). An efficient and secure dynamic identity based authentication protocol for multi-server architecture using smartcards. Journal of Network and Computer Applications, 35, 763–769.
-
(2012)
Journal of Network and Computer Applications
, vol.35
, pp. 763-769
-
-
Li, X.1
Xiong, Y.2
Ma, J.3
Wang, W.4
-
18
-
-
84920260421
-
(2012). Weaknesses of a dynamic identity based authentication protocol for multi-server architecture
-
Han, W. (2012). Weaknesses of a dynamic identity based authentication protocol for multi-server architecture. arXiv preprint archive 2012. http://arxiv.org/ftp/arxiv/papers/1201/1201.0883.pdf.
-
(2012)
arXiv preprint archive
-
-
Han, W.1
-
19
-
-
84878597719
-
A novel smart card and dynamic ID based remote user authentication scheme for multi-server environments
-
Li, X., Ma, J., Wang, W., Xiong, Y., & Zhang, J. (2013). A novel smart card and dynamic ID based remote user authentication scheme for multi-server environments. Mathematical and Computer Modelling, 58, 85–95.
-
(2013)
Mathematical and Computer Modelling
, vol.58
, pp. 85-95
-
-
Li, X.1
Ma, J.2
Wang, W.3
Xiong, Y.4
Zhang, J.5
-
20
-
-
84920251950
-
(2013). An efficient dynamic ID based remote user authentication scheme using self-certified public keys for multi-server environment
-
Zhaoa, D., Peng, H., Li, S., & Yang, Y. (2013). An efficient dynamic ID based remote user authentication scheme using self-certified public keys for multi-server environment. arXiv preprint archive 2013. http://arxiv.org/pdf/1305.6350.pdf.
-
(2013)
arXiv preprint archive
-
-
Zhaoa, D.1
Peng, H.2
Li, S.3
Yang, Y.4
-
21
-
-
84872324933
-
A smart card based efficient and secured multi-server authentication scheme
-
Wang, B., & Ma, M. (2013). A smart card based efficient and secured multi-server authentication scheme. Wireless Personal Communications, 68, 361–378.
-
(2013)
Wireless Personal Communications
, vol.68
, pp. 361-378
-
-
Wang, B.1
Ma, M.2
-
22
-
-
84876151110
-
Security flaws in a smart card based authentication scheme for multi-server environment
-
He, D., & Wu, S. (2013). Security flaws in a smart card based authentication scheme for multi-server environment. Wireless Personal Communications, 70, 323–329.
-
(2013)
Wireless Personal Communications
, vol.70
, pp. 323-329
-
-
He, D.1
Wu, S.2
-
23
-
-
84859161671
-
Towards generalized ID-based user authentication for mobile multi-server environment
-
Chuang, Y.-H., & Tseng, Y.-M. (2013). Towards generalized ID-based user authentication for mobile multi-server environment. Intrnational Journal of Communication Systems, 25, 447–406.
-
(2013)
Intrnational Journal of Communication Systems
, vol.25
, pp. 447-406
-
-
Chuang, Y.-H.1
Tseng, Y.-M.2
-
24
-
-
84906780088
-
-
An ID-based mutual authentication with key agreement protocol for multi-server environment on elliptic curve cryptosystem, Intrnational Journal of Communication Systems:
-
Han, W., & Zhu, Z. (2013). An ID-based mutual authentication with key agreement protocol for multi-server environment on elliptic curve cryptosystem. Intrnational Journal of Communication Systems. doi:10.1002/dac.2405.
-
(2013)
& Zhu, Z
-
-
Han, W.1
-
25
-
-
33747592366
-
Breaking a remote user authentication scheme for multi-server architecture
-
Cao, X., & Zhong, S. (2006). Breaking a remote user authentication scheme for multi-server architecture. IEEE Communications Letters, 10(8), 580–581.
-
(2006)
IEEE Communications Letters
, vol.10
, Issue.8
, pp. 580-581
-
-
Cao, X.1
Zhong, S.2
-
26
-
-
85020598353
-
Identity-based cryptosystems and signature schemes. In Proceedings of the advances in cryptology (CRYPTO’84), LNCS 196, Springer
-
Shamir, A. (1984). Identity-based cryptosystems and signature schemes. In Proceedings of the advances in cryptology (CRYPTO’84), LNCS 196, Springer, Berlin, pp. 47–53.
-
(1984)
Berlin
, pp. 47-53
-
-
Shamir, A.1
-
27
-
-
0037623983
-
Identity-based encryption from the Weil pairing
-
Boneh, D., & Franklin, M. (2003). Identity-based encryption from the Weil pairing. SIAM Journal on Computing, 32, 586–615.
-
(2003)
SIAM Journal on Computing
, vol.32
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
28
-
-
85117425347
-
-
Leakage-free ID-based signature, The Computer Journal:
-
Tseng, Y.-M., Tsai, T.-T., & Huang, S.-S. (2013). Leakage-free ID-based signature. The Computer Journal. doi:10.1093/comjnl/bxt116.
-
(2013)
& Huang, S.-S
-
-
Tseng, Y.-M.1
Tsai, T.-T.2
-
29
-
-
35048860626
-
Analysis of key exchange protocols and their use for building secure channels. In Proceedings of advances in cryptology (Eurocrypt’01)
-
Canetti, R., & Krawczyk, H. (2001). Analysis of key exchange protocols and their use for building secure channels. In Proceedings of advances in cryptology (Eurocrypt’01), LNCS, pp. 453–474.
-
(2001)
LNCS
, pp. 453-474
-
-
Canetti, R.1
Krawczyk, H.2
-
30
-
-
38149061118
-
On the indistinguishability-based security model of key agreement protocols-simple cases, Cryptology ePrint Archieve
-
Cheng, Z., Nistazakis, M., Comley, R., & Vasiu, L. (2005). On the indistinguishability-based security model of key agreement protocols-simple cases, Cryptology ePrint Archieve, Report 2005/129.
-
(2005)
Report
, vol.2005
, Issue.129
-
-
Cheng, Z.1
Nistazakis, M.2
Comley, R.3
Vasiu, L.4
-
31
-
-
49949116357
-
Certificateless authenticated two-party key agreement protocols. In Proceedings of the ASIAN’08
-
Mandt, T., & Tan, C. (2008). Certificateless authenticated two-party key agreement protocols. In Proceedings of the ASIAN’08, LNCS 4435, pp. 37–44.
-
(2008)
LNCS
, vol.4435
, pp. 37-44
-
-
Mandt, T.1
Tan, C.2
-
32
-
-
80051564952
-
CCIS 191, Springer
-
Islam, S. H., & Biswas, G. P. (2011). Comments on ID-based client authentication with key agreement protocol on ECC for mobile client-server environment. In Proceedings of the international conference on advanced in computing and communications (ACC 2011), CCIS 191, Springer, Berlin, pp. 628–635.
-
(2011)
Berlin
, pp. 628-635
-
-
-
33
-
-
80052774690
-
A more efficient and secure ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem
-
Islam, S. H., & Bisws, G. P. (2011). A more efficient and secure ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. Journal of Systems and Software, 84, 1892–1898.
-
(2011)
Journal of Systems and Software
, vol.84
, pp. 1892-1898
-
-
Islam, S.H.1
Bisws, G.P.2
-
34
-
-
38149012093
-
Stronger security of authenticated key exchange
-
LaMacchia, B., Lauter, K., & Mityagin, A. (2007). Stronger security of authenticated key exchange. In Proceeding of the ProvSec’07, pp. 1–16.
-
(2007)
In Proceeding of the ProvSec’07
, pp. 1-16
-
-
LaMacchia, B.1
Lauter, K.2
Mityagin, A.3
-
35
-
-
70350437139
-
Security in key agreement: Two-party certificateless schemes
-
University of Waterloo, Canada:
-
Swanson, C. M. (2008). Security in key agreement: Two-party certificateless schemes. Master’s thesis, University of Waterloo, Canada.
-
(2008)
Master’s thesis
-
-
Swanson, C.M.1
-
36
-
-
84892506781
-
Design of improved password authentication and update scheme based on elliptic curve cryptography
-
Islam, S. H., & Biswas, G. P. (2013). Design of improved password authentication and update scheme based on elliptic curve cryptography. Mathematical and Computer Modelling, 57, 2703–2717.
-
(2013)
Mathematical and Computer Modelling
, vol.57
, pp. 2703-2717
-
-
Islam, S.H.1
Biswas, G.P.2
-
37
-
-
84870878817
-
A pairing-free identity-based authenticated group key agreement protocol for imbalanced mobile networks
-
Islam, S. H., & Biswas, G. P. (2012). A pairing-free identity-based authenticated group key agreement protocol for imbalanced mobile networks. Annals of Telecommunications, 67(11–12), 547–558.
-
(2012)
Annals of Telecommunications
, vol.67
, Issue.11-12
, pp. 547-558
-
-
Islam, S.H.1
Biswas, G.P.2
-
38
-
-
78651562638
-
Cryptanalysis of identity-based authenticated key agreement protocols from parings
-
Hou, M., Xu, Q., Shanqing, G., & Jiang, H. (2010). Cryptanalysis of identity-based authenticated key agreement protocols from parings. Journal of Networks, 5(7), 826–855.
-
(2010)
Journal of Networks
, vol.5
, Issue.7
, pp. 826-855
-
-
Hou, M.1
Xu, Q.2
Shanqing, G.3
Jiang, H.4
-
40
-
-
84893698401
-
Robust smart card authentication scheme for multi-server architecture
-
Pippal, R. S., Jaidhar, C. D., & Tapaswi, S. (2013). Robust smart card authentication scheme for multi-server architecture. Wireless Personal Communications, 72, 729–745.
-
(2013)
Wireless Personal Communications
, vol.72
, pp. 729-745
-
-
Pippal, R.S.1
Jaidhar, C.D.2
Tapaswi, S.3
-
41
-
-
84880841622
-
A new password-based multi-server authentication scheme robust to password guessing attacks
-
Tsai, J.-L., Lo, N.-W., & Wu, T.-C. (2013). A new password-based multi-server authentication scheme robust to password guessing attacks. Wireless Personal Communications, 71, 1977–1988.
-
(2013)
Wireless Personal Communications
, vol.71
, pp. 1977-1988
-
-
Tsai, J.-L.1
Lo, N.-W.2
Wu, T.-C.3
-
44
-
-
0000901529
-
Security arguments for digital signatures and blind signatures
-
Pointcheval, D., & Stern, J. (2000). Security arguments for digital signatures and blind signatures. Journal of Cryptology, 13, 361–396.
-
(2000)
Journal of Cryptology
, vol.13
, pp. 361-396
-
-
Pointcheval, D.1
Stern, J.2
|