-
1
-
-
78049351742
-
Quark: A lightweight hash
-
Aumasson, J.P., Henzen, L., Meier, W., Plasencia, M.N., Quark: A lightweight hash. In: Workshop on Cryptographic Hardware and Embedded Systems (CHES 2010), LNCS, vol. 6225, pp. 1–15, 2010.
-
(2010)
Workshop on Cryptographic Hardware and Embedded Systems (CHES 2010), LNCS, vol. 6225
, pp. 1-15
-
-
Aumasson, J.P.1
Henzen, L.2
Meier, W.3
Plasencia, M.N.4
-
2
-
-
84922453695
-
Automated Validation of Internet Security Protocols and Applications, 2013
-
AVISPA, Automated Validation of Internet Security Protocols and Applications, 2013. Accessed on January 2013. http://www.avispa-project.org/.
-
(2013)
Accessed on
-
-
-
3
-
-
84922425128
-
AVISPA Web Tool, 2014
-
AVISPA, AVISPA Web Tool, 2014. Accessed on April 2014. http://www.avispa-project.org/web-interface/expert.php/.
-
(2014)
Accessed on
-
-
-
4
-
-
19744367735
-
A symbolic model checker for security protocols
-
Basin, D., Modersheim, S., OFMC, L. Vigano., A symbolic model checker for security protocols. Int. J. Inf. Secur. 4(3):181–208, 2005.
-
(2005)
Int. J. Inf. Secur.
, vol.4
, Issue.3
, pp. 181-208
-
-
Basin, D.1
Modersheim, S.2
OFMC, L.V.3
-
5
-
-
84872112386
-
An uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care
-
Chang, Y.-F., Yu, S.-H., Shiao, D.-R., An uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. J. Med. Syst. 37(2):1–9, 2013.
-
(2013)
J. Med. Syst.
, vol.37
, Issue.2
, pp. 1-9
-
-
Chang, Y.-F.1
Yu, S.-H.2
Shiao, D.-R.3
-
6
-
-
84928813527
-
An effective ECC-based user access control scheme with attribute-based encryption for wireless sensor networks. Secur. Commun
-
Chatterjee, S., and Das, A.K., An effective ECC-based user access control scheme with attribute-based encryption for wireless sensor networks. Secur. Commun. Netw., 2014. doi:10.1002/sec.1140.
-
(2014)
Netw.
-
-
Chatterjee, S.1
Das, A.K.2
-
7
-
-
81855227196
-
Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards
-
Das, A.K, Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards. IET Inf. Secur. 5(3):145–151, 2011.
-
(2011)
IET Inf. Secur.
, vol.5
, Issue.3
, pp. 145-151
-
-
Das, A.K.1
-
8
-
-
84860729708
-
A random key establishment scheme for multi-phase deployment in large-scale distributed sensor networks
-
Das, A.K., A random key establishment scheme for multi-phase deployment in large-scale distributed sensor networks. Int. J. Inf. Secury. 11(3):189–211, 2012.
-
(2012)
Int. J. Inf. Secury.
, vol.11
, Issue.3
, pp. 189-211
-
-
Das, A.K.1
-
9
-
-
84890560968
-
A secure and effective user authentication and privacy preserving protocol with smart cards for wireless communications
-
Das, A.K., A secure and effective user authentication and privacy preserving protocol with smart cards for wireless communications. Netw. Sci. 2(1-2):12–27, 2013.
-
(2013)
Netw. Sci.
, vol.2
, Issue.1-2
, pp. 12-27
-
-
Das, A.K.1
-
11
-
-
84887008637
-
A novel efficient access control scheme for large-scale distributed wireless sensor networks
-
Das, A.K., Chatterjee, S., Sing, J.K., A novel efficient access control scheme for large-scale distributed wireless sensor networks. Int. J. Found. Comput. Sci. 24(5):625–653, 2013.
-
(2013)
Int. J. Found. Comput. Sci.
, vol.24
, Issue.5
, pp. 625-653
-
-
Das, A.K.1
Chatterjee, S.2
Sing, J.K.3
-
12
-
-
84877090869
-
A secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care
-
Das, A.K., and Goswami, A., A secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. J. Med. Syst. 37(3):1–16, 2013.
-
(2013)
J. Med. Syst.
, vol.37
, Issue.3
, pp. 1-16
-
-
Das, A.K.1
Goswami, A.2
-
13
-
-
84878621601
-
A novel proxy signature scheme based on user hierarchical access control policy
-
Das, A.K., Massand, A., Patil, S., A novel proxy signature scheme based on user hierarchical access control policy. J. King Saud University - Comput. Inform. Sci. 25(2):219–228, 2013.
-
(2013)
J. King Saud University - Comput. Inform. Sci.
, vol.25
, Issue.2
, pp. 219-228
-
-
Das, A.K.1
Massand, A.2
Patil, S.3
-
14
-
-
62949130774
-
Two-factor user authentication in wireless sensor networks
-
Das, M.L., Two-factor user authentication in wireless sensor networks. IEEE Trans. Wirel. Commun. 8(3):1086–1090, 2009.
-
(2009)
IEEE Trans. Wirel. Commun.
, vol.8
, Issue.3
, pp. 1086-1090
-
-
Das, M.L.1
-
15
-
-
0020720357
-
On the security of public key protocols
-
Dolev, D., and Yao, A., On the security of public key protocols. IEEE Trans. Inf. Theory 29(2):198–208, 1983.
-
(1983)
IEEE Trans. Inf. Theory
, vol.29
, Issue.2
, pp. 198-208
-
-
Dolev, D.1
Yao, A.2
-
16
-
-
84939573910
-
Differential power analysis
-
Kocher, P., Jaffe, J., Jun, B., Differential power analysis. In: Proceedings of Advances in Cryptology - CRYPTO’99, LNCS, vol. 1666, pp. 388–397, 1999.
-
(1999)
Proceedings of Advances in Cryptology - CRYPTO’99, LNCS, vol. 1666
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
17
-
-
84875510914
-
-
Lee, T.-F., Chang, I.-P., Lin, T.-H., Wang, C.-C., A secure and efficient password-based user authentication scheme using smart cards for the integrated EPR information system. J. Med. Syst. 37(3), 2013
-
Lee, T.-F., Chang, I.-P., Lin, T.-H., Wang, C.-C., A secure and efficient password-based user authentication scheme using smart cards for the integrated EPR information system. J. Med. Syst. 37(3), 2013.
-
-
-
-
18
-
-
79953289463
-
Classification and generation of disturbance vectors for collision attacks against SHA-1
-
Manuel, S., Classification and generation of disturbance vectors for collision attacks against SHA-1. Des. Codes Crypt. 59(1-3):247–263, 2011.
-
(2011)
Des. Codes Crypt.
, vol.59
, Issue.1-3
, pp. 247-263
-
-
Manuel, S.1
-
19
-
-
0036566408
-
Examining smart-card security under the threat of power analysis attacks
-
Messerges, T.S., Dabbish, E.A., Sloan, R.H., Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Comput. 51(5):541–552, 2002.
-
(2002)
IEEE Trans. Comput.
, vol.51
, Issue.5
, pp. 541-552
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
-
20
-
-
84919913317
-
-
Mishra, D., On the security flaws in id-based password authentication schemes for telecare medical information systems. J. Med. Syst. 39(1), 2014
-
Mishra, D., On the security flaws in id-based password authentication schemes for telecare medical information systems. J. Med. Syst. 39(1), 2014.
-
-
-
-
21
-
-
84922425124
-
Mukhopadhyay, S
-
Mishra, D., Das, A.K., Mukhopadhyay, S., A secure and efficient ECC-based user anonymity-preserving session initiation authentication protocol using smart card, 2014. doi:10.1007/s12083-014-0321-z.
-
(2014)
A secure and efficient ECC-based user anonymity-preserving session initiation authentication protocol using smart card
-
-
Mishra, D.1
Das, A.K.2
-
22
-
-
84901726882
-
Security enhancement of a biometric based authentication scheme for telecare medicine information systems with nonce
-
Mishra, D., Mukhopadhyay, S., Kumari, S., Khan, M.K., Security enhancement of a biometric based authentication scheme for telecare medicine information systems with nonce. J. Med. Sys 38(5), 2014.
-
(2014)
J. Med. Sys
, vol.38
, Issue.5
-
-
Mishra, D.1
Mukhopadhyay, S.2
Kumari, S.3
Khan, M.K.4
-
23
-
-
84935925341
-
-
Mishra, D., Srinivas, J., Mukhopadhyay, S., A secure and efficient chaotic map-based authenticated key agreement scheme for telecare medicine information systems. J. Med. Sys 38(10), 2014
-
Mishra, D., Srinivas, J., Mukhopadhyay, S., A secure and efficient chaotic map-based authenticated key agreement scheme for telecare medicine information systems. J. Med. Sys 38(10), 2014.
-
-
-
-
24
-
-
78651389846
-
A simple and generic construction of authenticated encryption with associated data
-
Sarkar, P., A simple and generic construction of authenticated encryption with associated data. ACM Trans Inf. Syst. Secur. 13(4):33, 2010.
-
(2010)
ACM Trans Inf. Syst. Secur.
, vol.13
, Issue.4
, pp. 33
-
-
Sarkar, P.1
-
26
-
-
84922440496
-
Secure hash standard, FIPS PUB 180-1, National Institute of Standards and Technology (NIST), U.S. Department of Commerce
-
Secure Hash Standard: Secure hash standard, FIPS PUB 180-1, National Institute of Standards and Technology (NIST), U.S. Department of Commerce, April 1995 (1995)
-
(1995)
April
, pp. 1995
-
-
-
27
-
-
30744432873
-
Some observations on the theory of cryptographic hash functions
-
Stinson, D.R., Some observations on the theory of cryptographic hash functions. Des. Codes Crypt. 38(2):259–277, 2006.
-
(2006)
Des. Codes Crypt.
, vol.38
, Issue.2
, pp. 259-277
-
-
Stinson, D.R.1
-
28
-
-
84901732410
-
A more secure anonymous user authentication scheme for the integrated EPR information system
-
Wen, F., A more secure anonymous user authentication scheme for the integrated EPR information system. J. Med. Syst. 38(5):42, 2014.
-
(2014)
J. Med. Syst.
, vol.38
, Issue.5
, pp. 42
-
-
Wen, F.1
-
29
-
-
84863200393
-
A password-based user authentication scheme for the integrated EPR information system
-
Wu, Z.Y., Chung, Y.-F., Lai, F., Chen, T.-S., A password-based user authentication scheme for the integrated EPR information system. J. Med. Syst. 36(2):631–638, 2012.
-
(2012)
J. Med. Syst.
, vol.36
, Issue.2
, pp. 631-638
-
-
Wu, Z.Y.1
Chung, Y.-F.2
Lai, F.3
Chen, T.-S.4
|