-
1
-
-
84918775856
-
Online authentication and key establishment scheme for heterogeneous sensor networks
-
Article ID
-
S. U. Khan, L. Lavagno, C. Pastrone, and M. A. Spirito, "Online authentication and key establishment scheme for heterogeneous sensor networks," International Journal of Distributed Sensor Networks, vol. 2014, Article ID 718286, 11 pages, 2014.
-
(2014)
International Journal of Distributed Sensor Networks
, vol.2014
-
-
Khan, S.U.1
Lavagno, L.2
Pastrone, C.3
Spirito, M.A.4
-
2
-
-
0019634370
-
Password authentication with insecure communication
-
L. Lamport, "Password authentication with insecure communication," Communications of the ACM, vol. 24, no. 11, pp. 770-772, 1981.
-
(1981)
Communications of the ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
3
-
-
4043089982
-
An enhanced remote user authentication scheme using smart cards
-
A. K. Awasthi and S. Lal, "An enhanced remote user authentication scheme using smart cards," IEEE Transactions on Consumer Electronics, vol. 50, no. 2, pp. 583-586, 2004.
-
(2004)
IEEE Transactions on Consumer Electronics
, vol.50
, Issue.2
, pp. 583-586
-
-
Awasthi, A.K.1
Lal, S.2
-
4
-
-
64249125305
-
An improved smart card based password authentication scheme with provable security
-
J. Xu, W.-T. Zhu, and D.-G. Feng, "An improved smart card based password authentication scheme with provable security," Computer Standards and Interfaces, vol. 31, no. 4, pp. 723-728, 2009.
-
(2009)
Computer Standards and Interfaces
, vol.31
, Issue.4
, pp. 723-728
-
-
Xu, J.1
Zhu, W.-T.2
Feng, D.-G.3
-
5
-
-
75449106985
-
Anonymity enhancement on robust and efficient password-authenticated key agreement using smart cards
-
X. Li, W. Qiu, D. Zheng, K. Chen, and J. Li, "Anonymity enhancement on robust and efficient password-authenticated key agreement using smart cards," IEEE Transactions on Industrial Electronics, vol. 57, no. 2, pp. 793-800, 2010.
-
(2010)
IEEE Transactions on Industrial Electronics
, vol.57
, Issue.2
, pp. 793-800
-
-
Li, X.1
Qiu, W.2
Zheng, D.3
Chen, K.4
Li, J.5
-
6
-
-
84906345040
-
A secure and effective anonymous authentication scheme for roaming service in global mobility networks
-
D.-W. Zhao, H.-P. Peng, L.-X. Li, and Y.-Y. Yang, "A secure and effective anonymous authentication scheme for roaming service in global mobility networks," Wireless Personal Communications, vol. 78, no. 1, pp. 247-269, 2014.
-
(2014)
Wireless Personal Communications
, vol.78
, Issue.1
, pp. 247-269
-
-
Zhao, D.-W.1
Peng, H.-P.2
Li, L.-X.3
Yang, Y.-Y.4
-
7
-
-
84901008838
-
An improved user authentication protocol for healthcare services via wireless medical sensor networks
-
Article ID
-
M. K. Khan and S. Kumari, "An improved user authentication protocol for healthcare services via wireless medical sensor networks," International Journal of Distributed Sensor Networks, vol. 2014, Article ID347169, 10 pages, 2014.
-
(2014)
International Journal of Distributed Sensor Networks
, vol.2014
-
-
Khan, M.K.1
Kumari, S.2
-
8
-
-
0034140374
-
A new remote user authentication scheme using smart cards
-
M.-S. Hwang and L.-H. Li, "A new remote user authentication scheme using smart cards," IEEE Transactions on Consumer Electronics, vol. 46, no. 1, pp. 28-30, 2000.
-
(2000)
IEEE Transactions on Consumer Electronics
, vol.46
, Issue.1
, pp. 28-30
-
-
Hwang, M.-S.1
Li, L.-H.2
-
9
-
-
28044451335
-
Robust remote authentication scheme with smart cards
-
C.-I. Fan, Y.-C. Chan, and Z.-K. Zhang, "Robust remote authentication scheme with smart cards," Computers & Security, vol. 24, no. 8, pp. 619-628, 2005.
-
(2005)
Computers & Security
, vol.24
, Issue.8
, pp. 619-628
-
-
Fan, C.-I.1
Chan, Y.-C.2
Zhang, Z.-K.3
-
10
-
-
71649104505
-
DoS-resistant ID-based password authentication scheme using smart cards
-
M.-S. Hwang, S.-K. Chong, and T.-Y. Chen, "DoS-resistant ID-based password authentication scheme using smart cards," Journal of Systems and Software, vol. 83, no. 1, pp. 163-172, 2010.
-
(2010)
Journal of Systems and Software
, vol.83
, Issue.1
, pp. 163-172
-
-
Hwang, M.-S.1
Chong, S.-K.2
Chen, T.-Y.3
-
11
-
-
24944502757
-
Efficient nonce-based remote user authentication scheme using smart cards
-
S.-W. Lee, H.-S. Kim, and K.-Y. Yoo, "Efficient nonce-based remote user authentication scheme using smart cards," Applied Mathematics and Computation, vol. 167, no. 1, pp. 355-361, 2005.
-
(2005)
Applied Mathematics and Computation
, vol.167
, Issue.1
, pp. 355-361
-
-
Lee, S.-W.1
Kim, H.-S.2
Yoo, K.-Y.3
-
12
-
-
44549086640
-
A new mutual authentication scheme based on nonce and smart cards
-
J.-Y. Liu, A.-M. Zhou, and M.-X. Gao, "A new mutual authentication scheme based on nonce and smart cards," Computer Communications, vol. 31, no. 10, pp. 2205-2209, 2008.
-
(2008)
Computer Communications
, vol.31
, Issue.10
, pp. 2205-2209
-
-
Liu, J.-Y.1
Zhou, A.-M.2
Gao, M.-X.3
-
13
-
-
70349792182
-
An efficient biometrics-based remote user authentication scheme using smart cards
-
C.-T. Li and M.-S. Hwang, "An efficient biometrics-based remote user authentication scheme using smart cards," Journal of Network and Computer Applications, vol. 33, no. 1, pp. 1-5, 2010.
-
(2010)
Journal of Network and Computer Applications
, vol.33
, Issue.1
, pp. 1-5
-
-
Li, C.-T.1
Hwang, M.-S.2
-
14
-
-
77955312905
-
Advanced smart card based password authentication protocol
-
R. Song, "Advanced smart card based password authentication protocol," Computer Standards and Interfaces, vol. 32, no. 5-6, pp. 321-325, 2010.
-
(2010)
Computer Standards and Interfaces
, vol.32
, Issue.5-6
, pp. 321-325
-
-
Song, R.1
-
15
-
-
68849128250
-
Improvement of the secure dynamic ID based remote user authentication scheme formultiserver environment
-
H.-C. Hsiang and W.-K. Shih, "Improvement of the secure dynamic ID based remote user authentication scheme formultiserver environment," Computer Standards and Interfaces, vol. 31, no. 6, pp. 1118-1123, 2009.
-
(2009)
Computer Standards and Interfaces
, vol.31
, Issue.6
, pp. 1118-1123
-
-
Hsiang, H.-C.1
Shih, W.-K.2
-
16
-
-
79251600218
-
A secure dynamic identity based authentication protocol for multi-server architecture
-
S. K. Sood, A. K. Sarje, and K. Singh, "A secure dynamic identity based authentication protocol for multi-server architecture," Journal of Network and Computer Applications, vol. 34, no. 2, pp. 609-618, 2011.
-
(2011)
Journal of Network and Computer Applications
, vol.34
, Issue.2
, pp. 609-618
-
-
Sood, S.K.1
Sarje, A.K.2
Singh, K.3
-
17
-
-
84856217617
-
An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards
-
X. Li, Y.-P. Xiong, J. Ma, and W.-D. Wang, "An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards," Journal of Network and Computer Applications, vol. 35, no. 2, pp. 763-769, 2012.
-
(2012)
Journal of Network and Computer Applications
, vol.35
, Issue.2
, pp. 763-769
-
-
Li, X.1
Xiong, Y.-P.2
Ma, J.3
Wang, W.-D.4
-
18
-
-
84884990326
-
A lightweight dynamic pseudonym identity based authentication and key agreement protocol without verification tables for multi-server architecture
-
K.-P. Xue, P.-L. Hong, and C.-S. Ma, "A lightweight dynamic pseudonym identity based authentication and key agreement protocol without verification tables for multi-server architecture," Journal of Computer and System Sciences, vol. 80, no. 1, pp. 195-206, 2014.
-
(2014)
Journal of Computer and System Sciences
, vol.80
, Issue.1
, pp. 195-206
-
-
Xue, K.-P.1
Hong, P.-L.2
Ma, C.-S.3
-
19
-
-
84939573910
-
Differential power analysis
-
Springer, Berlin, Germany
-
P. Kocher, J. Jaffe, and B. Jun, "Differential power analysis," in Advances in Cryptology-CRYPTO' 99: 19th Annual International Cryptology Conference Santa Barbara, California, USA, August 15-19, 1999 Proceedings, vol. 1666 of Lecture Notes in Computer Science, pp. 388-397, Springer, Berlin, Germany, 1999.
-
(1999)
Advances in Cryptology-CRYPTO' 99: 19th Annual International Cryptology Conference Santa Barbara, California, USA, August 15-19, 1999 Proceedings, Vol. 1666 of Lecture Notes in Computer Science
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
20
-
-
78751648745
-
A strong user authentication scheme with smart cards for wireless communications
-
D.-J. He, M.-D. Ma, Y. Zhang, C. Chen, and J.-J. Bu, "A strong user authentication scheme with smart cards for wireless communications," Computer Communications, vol. 34, no. 3, pp. 367-374, 2011.
-
(2011)
Computer Communications
, vol.34
, Issue.3
, pp. 367-374
-
-
He, D.-J.1
Ma, M.-D.2
Zhang, Y.3
Chen, C.4
Bu, J.-J.5
-
21
-
-
0036566408
-
Examining smart-card security under the threat of power analysis attacks
-
T. S. Messerges, E. A. Dabbish, and R. H. Sloan, "Examining smart-card security under the threat of power analysis attacks," IEEE Transactions on Computers, vol. 51, no. 5, pp. 541-552, 2002.
-
(2002)
IEEE Transactions on Computers
, vol.51
, Issue.5
, pp. 541-552
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
-
22
-
-
0025386404
-
A logic of authentication
-
M. Burrows, M. Abadi, and R. Needham, "A logic of authentication," ACMTransactions on Computer Systems, vol. 8, no. 1, pp. 18-36, 1990.
-
(1990)
ACMTransactions on Computer Systems
, vol.8
, Issue.1
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
23
-
-
84886653936
-
Novel anonymous authentication scheme using smart cards
-
J.-L. Tsai, N.-W. Lo, and T.-C. Wu, "Novel anonymous authentication scheme using smart cards," IEEE Transactions on Industrial Informatics, vol. 9, no. 4, pp. 2004-2013, 2013.
-
(2013)
IEEE Transactions on Industrial Informatics
, vol.9
, Issue.4
, pp. 2004-2013
-
-
Tsai, J.-L.1
Lo, N.-W.2
Wu, T.-C.3
-
24
-
-
84890560968
-
A secure and effictive user authentication and privacy preserving protocol with smart cards for wireless communications
-
A.-K. Das, "A secure and effictive user authentication and privacy preserving protocol with smart cards for wireless communications," Networking Science, vol. 2, no. 1-2, pp. 12-27, 2013.
-
(2013)
Networking Science
, vol.2
, Issue.1-2
, pp. 12-27
-
-
Das, A.-K.1
-
25
-
-
10644225185
-
Newefficient user identification and key distribution scheme providing enhanced security
-
Y. Yang, S. Wang, F. Bao, J. Wang, and R.H. Deng, "Newefficient user identification and key distribution scheme providing enhanced security," Computers and Security, vol. 23, no. 8, pp. 697-704, 2004.
-
(2004)
Computers and Security
, vol.23
, Issue.8
, pp. 697-704
-
-
Yang, Y.1
Wang, S.2
Bao, F.3
Wang, J.4
Deng, R.H.5
-
26
-
-
1942455353
-
Efficientmulti-server password authenticated key agreement using smart cards
-
W.-S. Juang, "Efficientmulti-server password authenticated key agreement using smart cards," IEEE Transactions on Consumer Electronics, vol. 50, no. 1, pp. 251-255, 2004.
-
(2004)
IEEE Transactions on Consumer Electronics
, vol.50
, Issue.1
, pp. 251-255
-
-
Juang, W.-S.1
-
27
-
-
84894565582
-
Efficient authentication for mobile and pervasive computing
-
B. Alomair and R. Poovendran, "Efficient authentication for mobile and pervasive computing," IEEE Transactions on Mobile Computing, vol. 13, no. 3, pp. 469-481, 2014.
-
(2014)
IEEE Transactions on Mobile Computing
, vol.13
, Issue.3
, pp. 469-481
-
-
Alomair, B.1
Poovendran, R.2
-
28
-
-
84901049661
-
An improved biometric-based user authentication scheme for C/S system
-
Article ID
-
J.-P. Li, Y.-M. Ding, Z.-G. Xiong, and S.-Y. Liu, "An improved biometric-based user authentication scheme for C/S system," International Journal of Distributed Sensor Networks, vol. 2014, Article ID 275341, 9 pages, 2014.
-
(2014)
International Journal of Distributed Sensor Networks
, vol.2014
-
-
Li, J.-P.1
Ding, Y.-M.2
Xiong, Z.-G.3
Liu, S.-Y.4
|