-
2
-
-
77958095782
-
A communication-efficient three-party password authenticated key exchange protocol
-
T. Y. Chang, M. S. Hwang, and W. P. Yang, "A communication-efficient three-party password authenticated key exchange protocol," Information Sciences, vol. 181, pp. 217-226, 2011.
-
(2011)
Information Sciences
, vol.181
, pp. 217-226
-
-
Chang, T.Y.1
Hwang, M.S.2
Yang, W.P.3
-
3
-
-
84872832940
-
Improvement of convertible authenticated encryption schemes and its multiple recipients version
-
T. Y. Chang, C. C. Yang and M. S. Hwang, "Improvement of convertible authenticated encryption schemes and its multiple recipients version", International Journal of Security and Its Applications, vol. 6, no. 4, pp. 151-162, 2012.
-
(2012)
International Journal of Security and Its Applications
, vol.6
, Issue.4
, pp. 151-162
-
-
Chang, T.Y.1
Yang, C.C.2
Hwang, M.S.3
-
4
-
-
18444399366
-
Simple authenticated key agreement and protected password change protocol
-
T. Y. Chang, W. P. Yang, M. S. Hwang, "Simple authenticated key agreement and protected password change protocol", Computers & Mathematics with Applications, vol. 49, pp. 703-714, 2005.
-
(2005)
Computers & Mathematics with Applications
, vol.49
, pp. 703-714
-
-
Chang, T.Y.1
Yang, W.P.2
Hwang, M.S.3
-
5
-
-
84888003168
-
Towards secure and efficient user authentication scheme using smart card for multi-server environments
-
T. Y. Chen, C. C. Lee, M. S. Hwang, J. K. Jan, "Towards secure and efficient user authentication scheme using smart card for multi-server environments," The Journal of Supercomputing, vol. 66, no. 2, pp. 1008-1032, 2013.
-
(2013)
The Journal of Supercomputing
, vol.66
, Issue.2
, pp. 1008-1032
-
-
Chen, T.Y.1
Lee, C.C.2
Hwang, M.S.3
Jan, J.K.4
-
6
-
-
84903886932
-
Cryptanalysis of Tan's improvement on a password authentication scheme for multi-server environments
-
T. H. Feng, C. H. Ling, and M. S. Hwang, "Cryptanalysis of Tan's improvement on a password authentication scheme for multi-server environments," International Journal of Network Security, vol. 16, no. 4, pp. 318-321, 2014.
-
(2014)
International Journal of Network Security
, vol.16
, Issue.4
, pp. 318-321
-
-
Feng, T.H.1
Ling, C.H.2
Hwang, M.S.3
-
7
-
-
80054052709
-
Weaknesses of a remote user password authentication scheme using smart card
-
D. He, J. Chen, and J. Hu, "Weaknesses of a remote user password authentication scheme using smart card," International Journal of Network Security, vol. 13, no. 1, pp. 58-60, 2011.
-
(2011)
International Journal of Network Security
, vol.13
, Issue.1
, pp. 58-60
-
-
He, D.1
Chen, J.2
Hu, J.3
-
8
-
-
59649086399
-
Weaknesses and improvements of the Yoon-Ryu-Yoo remote user authentication scheme using smart cards
-
H. C. Hsiang and W. K. Shih, "Weaknesses and improvements of the Yoon-Ryu-Yoo remote user authentication scheme using smart cards," Computer Communications, vol. 32, no. 4, pp. 649-652, 2009.
-
(2009)
Computer Communications
, vol.32
, Issue.4
, pp. 649-652
-
-
Hsiang, H.C.1
Shih, W.K.2
-
9
-
-
84865219379
-
Exploiting hash functions to intensify the remote user authentication scheme
-
W. B. Hsieh and J. S. Leu, "Exploiting hash functions to intensify the remote user authentication scheme," Computers & Security, vol. 31, no. 6, pp. 791-798, 2012.
-
(2012)
Computers & Security
, vol.31
, Issue.6
, pp. 791-798
-
-
Hsieh, W.B.1
Leu, J.S.2
-
10
-
-
84902661390
-
Security on improvement of modified authenticated key agreement protocol
-
M. S. Hwang, S. Y. Hsiao, W. P. Yang, "Security on improvement of modified authenticated key agreement protocol," Information - An International Interdisciplinary Journal, vol. 17, no. 4, pp.1173-1178, 2014.
-
(2014)
Information - An International Interdisciplinary Journal
, vol.17
, Issue.4
, pp. 1173-1178
-
-
Hwang, M.S.1
Hsiao, S.Y.2
Yang, W.P.3
-
11
-
-
0000362936
-
An improvement of SPLICE/AS in WIDE against guessing attack
-
M. S. Hwang, C. C. Lee, Y. L. Tang, "An improvement of SPLICE/AS in WIDE against guessing attack", International Journal of Informatica, vol. 12, no. 2, pp.297-302, 2001.
-
(2001)
International Journal of Informatica
, vol.12
, Issue.2
, pp. 297-302
-
-
Hwang, M.S.1
Lee, C.C.2
Tang, Y.L.3
-
12
-
-
71649104505
-
DoS-resistant ID-based password authentication scheme using smart cards
-
M. S. Hwang, S. K. Chong, T. Y. Chen, "DoS-resistant ID-based password authentication scheme using smart cards", Journal of Systems and Software, vol. 83, pp. 163-172, 2010.
-
(2010)
Journal of Systems and Software
, vol.83
, pp. 163-172
-
-
Hwang, M.S.1
Chong, S.K.2
Chen, T.Y.3
-
13
-
-
0031144513
-
Authenticated key-exchange in a mobile radio network
-
M. S. Hwang and C. H. Lee, "Authenticated key-exchange in a mobile radio network", European Transactions on Telecommunications, vo1. 8, no.3, pp.265-269, 1997.
-
(1997)
European Transactions on Telecommunications
, vol.8
, Issue.3
, pp. 265-269
-
-
Hwang, M.S.1
Lee, C.H.2
-
14
-
-
0037038584
-
Improved Yen-Joye's authenticated multiple-key agreement protocol
-
M. S. Hwang, C. W. Lin, C. C. Lee, "Improved Yen-Joye's authenticated multiple-key agreement protocol", IEE Electronics Letters, vol. 38, no. 23, pp. 1429-1431, 2002.
-
(2002)
IEE Electronics Letters
, vol.38
, Issue.23
, pp. 1429-1431
-
-
Hwang, M.S.1
Lin, C.W.2
Lee, C.C.3
-
15
-
-
84876023679
-
Two-party authenticated multiple-key agreement based on elliptic curve discrete logarithm problem
-
L. C. Huang, M. S. Hwang, "Two-party authenticated multiple-key agreement based on elliptic curve discrete logarithm problem", International Journal of Smart Home, vol. 7, no. 1, pp. 9-18, 2013.
-
(2013)
International Journal of Smart Home
, vol.7
, Issue.1
, pp. 9-18
-
-
Huang, L.C.1
Hwang, M.S.2
-
16
-
-
0019634370
-
Password authentication with insecure communication
-
L. Lamport, "Password authentication with insecure communication," Communications of the ACM, vol. 24, no. 11, pp. 770-772, 1981.
-
(1981)
Communications of the ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
17
-
-
78649433409
-
Improving two novel three-party encrypted key exchange protocols with perfect forward secrecy
-
C. C. Lee, R. X. Chang, and H. J. Ko, "Improving two novel three-party encrypted key exchange protocols with perfect forward secrecy," International Journal of Foundations of Computer Science, vol. 21, no. 6, pp. 979-991, 2010.
-
(2010)
International Journal of Foundations of Computer Science
, vol.21
, Issue.6
, pp. 979-991
-
-
Lee, C.C.1
Chang, R.X.2
Ko, H.J.3
-
18
-
-
84855269122
-
On security of a practical three-party key exchange protocol with round efficiency
-
C. C. Lee and Y. F. Chang, "On security of a practical three-party key exchange protocol with round efficiency," Information Technology and Control, vol. 37, no. 4, pp. 333-335, 2008.
-
(2008)
Information Technology and Control
, vol.37
, Issue.4
, pp. 333-335
-
-
Lee, C.C.1
Chang, Y.F.2
-
19
-
-
84870003598
-
A computation-efficient three-party encrypted key exchange protocol
-
C. C. Lee, S. D. Chen, and C. L. Chen, "A computation-efficient three-party encrypted key exchange protocol," Applied Mathematics & Information Sciences, vol. 6, no. 3 pp. 573-579, 2012.
-
(2012)
Applied Mathematics & Information Sciences
, vol.6
, Issue.3
, pp. 573-579
-
-
Lee, C.C.1
Chen, S.D.2
Chen, C.L.3
-
21
-
-
84879782333
-
A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps
-
C. C. Lee, C. T. Li, and C. W. Hsu, "A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps," Nonlinear Dynamics, vol. 73, no. 1, pp. 125-132, 2013.
-
(2013)
Nonlinear Dynamics
, vol.73
, Issue.1
, pp. 125-132
-
-
Lee, C.C.1
Li, C.T.2
Hsu, C.W.3
-
22
-
-
84875095444
-
Guessing attacks on strong-password authentication protocol
-
C. C. Lee, C. H. Liu, and M. S. Hwang, "Guessing attacks on strong-password authentication protocol", International Journal of Network Security, vol. 15, no. 1, pp. 64-67, 2013.
-
(2013)
International Journal of Network Security
, vol.15
, Issue.1
, pp. 64-67
-
-
Lee, C.C.1
Liu, C.H.2
Hwang, M.S.3
-
23
-
-
67649791953
-
Communication-efficient three-party protocols for authentication and key agreement
-
T. F. Lee, J. L. Liu, M. J. Sung, S. B. Yang, and C. M. Chen, "Communication-efficient three-party protocols for authentication and key agreement," Computers & Mathematics with Applications, vol. 58, no. 4, pp. 641-648, 2009.
-
(2009)
Computers & Mathematics with Applications
, vol.58
, Issue.4
, pp. 641-648
-
-
Lee, T.F.1
Liu, J.L.2
Sung, M.J.3
Yang, S.B.4
Chen, C.M.5
-
24
-
-
8344221264
-
Enhanced three-party encrypted key exchange without server public keys
-
T. F. Lee, T. Hwang, and C. L. Lin, "Enhanced three-party encrypted key exchange without server public keys," Computers & Security, vol. 23, no. 7, pp. 571-577, 2004.
-
(2004)
Computers & Security
, vol.23
, Issue.7
, pp. 571-577
-
-
Lee, T.F.1
Hwang, T.2
Lin, C.L.3
-
25
-
-
70349792182
-
An efficient biometrics-based remote user authentication scheme using smart cards
-
C. T. Li and M. S. Hwang, "An efficient biometrics-based remote user authentication scheme using smart cards", Journal of Network and Computer Applications, vol. 33, no. 1, pp. 1-5, 2010.
-
(2010)
Journal of Network and Computer Applications
, vol.33
, Issue.1
, pp. 1-5
-
-
Li, C.T.1
Hwang, M.S.2
-
26
-
-
46749099079
-
A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular Ad Hoc networks
-
C. T. Li, M. S. Hwang, Y. P. Chu, "A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular Ad Hoc networks", Computer Communications, vol. 31, no. 12, pp. 2803-2814, 2008.
-
(2008)
Computer Communications
, vol.31
, Issue.12
, pp. 2803-2814
-
-
Li, C.T.1
Hwang, M.S.2
Chu, Y.P.3
-
27
-
-
49549085074
-
Improving the security of a secure anonymous routing protocol with authenticated key exchange for Ad Hoc networks
-
C. T. Li, M. S. Hwang, Y. P. Chu, "Improving the security of a secure anonymous routing protocol with authenticated key exchange for Ad Hoc networks", International Journal of Computer Systems Science and Engineering, vol. 23, no. 3, pp. 227-234, 2008.
-
(2008)
International Journal of Computer Systems Science and Engineering
, vol.23
, Issue.3
, pp. 227-234
-
-
Li, C.T.1
Hwang, M.S.2
Chu, Y.P.3
-
28
-
-
33748126252
-
A password authentication scheme over insecure networks
-
I-En Liao, C. C. Lee, M. S. Hwang, "A password authentication scheme over insecure networks", Journal of Computer and System Sciences, vol. 72, no. 4, pp. 727-740, 2006.
-
(2006)
Journal of Computer and System Sciences
, vol.72
, Issue.4
, pp. 727-740
-
-
I-En Liao, C.1
Lee, C.2
Hwang, M.S.3
-
29
-
-
33748942118
-
A new strong-password authentication scheme using one-way hash functions
-
C. W. Lin, C. S. Tsai, M. S. Hwang, "A new strong-password authentication scheme using one-way hash functions", International Journal of Computer and Systems Sciences, vol. 45, no. 4, pp. 623-626, 2006.
-
(2006)
International Journal of Computer and Systems Sciences
, vol.45
, Issue.4
, pp. 623-626
-
-
Lin, C.W.1
Tsai, C.S.2
Hwang, M.S.3
-
30
-
-
28844488495
-
A user authentication system using back-propagation network
-
I. C. Lin, H. H. Ou, M. S. Hwang, "A user authentication system using back-propagation network", Neural Computing & Applications, vol. 14, no. 3, pp. 243-249, 2005.
-
(2005)
Neural Computing & Applications
, vol.14
, Issue.3
, pp. 243-249
-
-
Lin, I.C.1
Ou, H.H.2
Hwang, M.S.3
-
31
-
-
80052492581
-
An advanced password authenticated key exchange protocol for imbalanced wireless networks
-
J. W. Lo, J. Z. Lee, M, S. Hwang, Y. P. Chu, "An advanced password authenticated key exchange protocol for imbalanced wireless networks", Journal of Internet Technology, vol. 11, no. 7, pp. 997-1004, 2010.
-
(2010)
Journal of Internet Technology
, vol.11
, Issue.7
, pp. 997-1004
-
-
Lo, J.W.1
Lee, J.Z.2
Hwang, M.S.3
Chu, Y.P.4
-
32
-
-
77953352946
-
A parallel password-authenticated key exchange protocol for wireless environments
-
J. W. Lo, S. C. Lin, M. S. Hwang, "A parallel password-authenticated key exchange protocol for wireless environments", Information Technology and Control, vol. 39, no. 2, pp. 146-151, 2010.
-
(2010)
Information Technology and Control
, vol.39
, Issue.2
, pp. 146-151
-
-
Lo, J.W.1
Lin, S.C.2
Hwang, M.S.3
-
33
-
-
0242552286
-
Security enhancement for the timestamp-based password authentication scheme using smart cards
-
J. J. Shen, C. W. Lin, M. S. Hwang, "Security enhancement for the timestamp-based password authentication scheme using smart cards", Computers & Security, vol. 22, no. 7, pp. 591-595, 2003.
-
(2003)
Computers & Security
, vol.22
, Issue.7
, pp. 591-595
-
-
Shen, J.J.1
Lin, C.W.2
Hwang, M.S.3
-
34
-
-
77958098545
-
Pass-go: aproposal to improve the usability of graphical passwords
-
H. Tao and C. Adams, "Pass-go: aproposal to improve the usability of graphical passwords,"International Journal of Network Security, vol. 7, no. 2, pp. 273-292, 2008.
-
(2008)
International Journal of Network Security
, vol.7
, Issue.2
, pp. 273-292
-
-
Tao, H.1
Adams, C.2
-
35
-
-
40949152760
-
Password authentication schemes: current status and key issues
-
C. S. Tsai, C. C. Lee, and M. S. Hwang, "Password authentication schemes: current status and key issues,"International Journal of Network Security, vol. 3, no. 2, pp. 101-115, 2006.
-
(2006)
International Journal of Network Security
, vol.3
, Issue.2
, pp. 101-115
-
-
Tsai, C.S.1
Lee, C.C.2
Hwang, M.S.3
-
36
-
-
70349819161
-
Cryptanalysis of two improved password authentication schemes using smart cards
-
R. C. Wang and C. C. Yang, "Cryptanalysis of two improved password authentication schemes using smart cards," International Journal of Network Security, vol. 3, no. 3, pp. 283-285, 2006.
-
(2006)
International Journal of Network Security
, vol.3
, Issue.3
, pp. 283-285
-
-
Wang, R.C.1
Yang, C.C.2
-
37
-
-
33645274667
-
A secure strong-password authentication protocol
-
H. C. Wu, M. S. Hwang, C. H. Liu, "A secure strong-password authentication protocol", Fundamenta Informaticae, vol. 68, pp. 399-406, 2005.
-
(2005)
Fundamenta Informaticae
, vol.68
, pp. 399-406
-
-
Wu, H.C.1
Hwang, M.S.2
Liu, C.H.3
-
38
-
-
84864760957
-
Cryptanalysis of a communication-efficient three-party password authenticated key exchange protocol
-
S. Wu, Q. Pu, S. Wang, and D. He, "Cryptanalysis of a communication-efficient three-party password authenticated key exchange protocol," Information Sciences, vol. 215, pp. 83-96, 2012.
-
(2012)
Information Sciences
, vol.215
, pp. 83-96
-
-
Wu, S.1
Pu, Q.2
Wang, S.3
He, D.4
-
39
-
-
4243165683
-
Cryptanalysis of simple authenticated key agreement protocols
-
C. C. Yang, T. Y. Chang, M. S. Hwang, "Cryptanalysis of simple authenticated key agreement protocols", IEICE Transactions on Foundations, vol. E87-A, no. 8, pp. 2174-2176, 2004.
-
(2004)
IEICE Transactions on Foundations
, vol.E87-A
, Issue.8
, pp. 2174-2176
-
-
Yang, C.C.1
Chang, T.Y.2
Hwang, M.S.3
-
40
-
-
84875321481
-
An improvement on a three-party password-based key exchange protocol using weil pairing
-
Y. Zeng, J. Ma, and M. Sangjae, "An improvement on a three-party password-based key exchange protocol using weil pairing," International Journal of Network Security, vol. 11, no. 1, pp. 17-22, 2010.
-
(2010)
International Journal of Network Security
, vol.11
, Issue.1
, pp. 17-22
-
-
Zeng, Y.1
Ma, J.2
Sangjae, M.3
-
41
-
-
80055041764
-
Provably secure three-party password-based authenticated key exchange protocol
-
J. Zhao and D. Gu, "Provably secure three-party password-based authenticated key exchange protocol," Information Sciences, vol. 184, no. 1, pp. 310-323, 2012.
-
(2012)
Information Sciences
, vol.184
, Issue.1
, pp. 310-323
-
-
Zhao, J.1
Gu, D.2
-
42
-
-
34250204664
-
Security management in the next generation wireless networks
-
Y. Zhang and M. Fujise, "Security management in the next generation wireless networks," International Journal of Network Security, vol. 3, no. 1, pp. 1-7, 2006.
-
(2006)
International Journal of Network Security
, vol.3
, Issue.1
, pp. 1-7
-
-
Zhang, Y.1
Fujise, M.2
-
43
-
-
84903894042
-
A simple password authentication scheme based on geometric hashing function
-
X. Zhuang, C. C. Chang, Z. H. Wang, Y. Zhu, "A simple password authentication scheme based on geometric hashing function," International Journal of Network Security, vol. 16, no. 4, pp. 237-243, 2014.
-
(2014)
International Journal of Network Security
, vol.16
, Issue.4
, pp. 237-243
-
-
Zhuang, X.1
Chang, C.C.2
Wang, Z.H.3
Zhu, Y.4
|