-
1
-
-
0034809453
-
Enhancing security and privacy in biometrics-based authentication systems
-
Ratha NK, Connell JH, Bolle RM. Enhancing security and privacy in biometrics-based authentication systems. IBM Systems Journal 2001; 40(3):614-634.
-
(2001)
IBM Systems Journal
, vol.40
, Issue.3
, pp. 614-634
-
-
Ratha, N.K.1
Connell, J.H.2
Bolle, R.M.3
-
2
-
-
74049154670
-
Your botnet is my botnet: Analysis of a botnet takeover
-
Chicago, IL, USA
-
Stone-Gross B, Cova M, Cavallaro L. Your botnet is my botnet: Analysis of a botnet takeover, Proceedings of the 16th ACM Conference on Computer and Communications Security, Chicago, IL, USA, 2009; 635-647.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security
, pp. 635-647
-
-
Stone-Gross, B.1
Cova, M.2
Cavallaro, L.3
-
3
-
-
84890034015
-
Security at risk as one third of surfers admit they use the same password for all websites
-
Accessed on January 2014
-
Security at risk as one third of surfers admit they use the same password for all websites, March 2009. Available at http://www.sophos.com/pressoffice/news/articles/2009/03/password-security.html. Accessed on January 2014.
-
(2009)
-
-
-
4
-
-
84928811214
-
-
Cryptanalysis of some user identification schemes for distributed computer networks
-
Chen YC, Liu CL, Horng G. Cryptanalysis of some user identification schemes for distributed computer networks. 2013).
-
(2013)
-
-
Chen, Y.C.1
Liu, C.L.2
Horng, G.3
-
5
-
-
84928817234
-
Security forum on single sign-on, TheOpenGroup
-
Online available at. Accessed on January 2014.
-
Security forum on single sign-on, TheOpenGroup. Online available at http://www.opengroup.org/security/l2-sso.htm. Accessed on January 2014.
-
-
-
-
6
-
-
84871821096
-
Security analysis of a single sign-on mechanism for distributed computer networks
-
Wang G, Yu J, Xie Q. Security analysis of a single sign-on mechanism for distributed computer networks. IEEE Transactions on Industrial Electronics 2013; 1:9.
-
(2013)
IEEE Transactions on Industrial Electronics
, vol.1
, pp. 9
-
-
Wang, G.1
Yu, J.2
Xie, Q.3
-
7
-
-
80053654561
-
A secure single sign-on mechanism for distributed computer networks
-
Chang C-C, Lee C-Y. A secure single sign-on mechanism for distributed computer networks. IEEE Transactions on Industrial Electronics 2012; 59(1):629-637.
-
(2012)
IEEE Transactions on Industrial Electronics
, vol.59
, Issue.1
, pp. 629-637
-
-
Chang, C.-C.1
Lee, C.-Y.2
-
8
-
-
84873031582
-
An efficient key-management scheme for hierarchical access control in E-medicine system
-
Wu S, Chen K. An efficient key-management scheme for hierarchical access control in E-medicine system. Journal of Medical Systems 2012; 36(4):2325-2337.
-
(2012)
Journal of Medical Systems
, vol.36
, Issue.4
, pp. 2325-2337
-
-
Wu, S.1
Chen, K.2
-
9
-
-
84897055589
-
A secure effective key management scheme for dynamic access control in a large leaf class hierarchy
-
Odelu V, Das AK, Goswami A. A secure effective key management scheme for dynamic access control in a large leaf class hierarchy. Information Sciences 2014; 269(C):270-285.
-
(2014)
Information Sciences
, vol.269
, pp. 270-285
-
-
Odelu, V.1
Das, A.K.2
Goswami, A.3
-
10
-
-
67649386419
-
Improvements of Juang's password-authenticated key agreement scheme using smart cards
-
Sun DZ, Huai JP, Sun JZ, Li JX, Zhang JW, Feng ZY. Improvements of Juang's password-authenticated key agreement scheme using smart cards. IEEE Transactions on Industrial Electronics 2009; 56(6):2284-2291.
-
(2009)
IEEE Transactions on Industrial Electronics
, vol.56
, Issue.6
, pp. 2284-2291
-
-
Sun, D.Z.1
Huai, J.P.2
Sun, J.Z.3
Li, J.X.4
Zhang, J.W.5
Feng, Z.Y.6
-
11
-
-
75449106985
-
Anonymity enhancement on robust and efficient password-authenticated key agreement using smart cards
-
Li X, Qiu W, Zheng D, Chen K, Li J. Anonymity enhancement on robust and efficient password-authenticated key agreement using smart cards. IEEE Transactions on Industrial Electronics 2010; 57(2):793-800.
-
(2010)
IEEE Transactions on Industrial Electronics
, vol.57
, Issue.2
, pp. 793-800
-
-
Li, X.1
Qiu, W.2
Zheng, D.3
Chen, K.4
Li, J.5
-
12
-
-
77951156895
-
Hardware implementation of RFID mutual authentication protocol
-
Huang YJ, Yuan CC, Chen MK, Lin WC, Teng HC. Hardware implementation of RFID mutual authentication protocol. IEEE Transactions on Industrial Electronics 2010; 57(5):1573-1582.
-
(2010)
IEEE Transactions on Industrial Electronics
, vol.57
, Issue.5
, pp. 1573-1582
-
-
Huang, Y.J.1
Yuan, C.C.2
Chen, M.K.3
Lin, W.C.4
Teng, H.C.5
-
13
-
-
84887815438
-
Cryptanalysis of a remote user authentication scheme for mobile clientserver environment based on ECC
-
Wang D, Ma CG. Cryptanalysis of a remote user authentication scheme for mobile clientserver environment based on ECC. Information Fusion 2013; 14(4):498-503.
-
(2013)
Information Fusion
, vol.14
, Issue.4
, pp. 498-503
-
-
Wang, D.1
Ma, C.G.2
-
14
-
-
0034225062
-
User identification and key distribution maintaining anonymity for distributed computer networks
-
Lee WB, Chang CC. User identification and key distribution maintaining anonymity for distributed computer networks. Computer Systems Science and Engineering 2000; 15(4):113-116.
-
(2000)
Computer Systems Science and Engineering
, vol.15
, Issue.4
, pp. 113-116
-
-
Lee, W.B.1
Chang, C.C.2
-
15
-
-
1542335490
-
Efficient user identification scheme with key distribution preserving anonymity for distributed computer networks
-
Wu TS, Hsu CL. Efficient user identification scheme with key distribution preserving anonymity for distributed computer networks. Computer Security 2004; 23(2):120-125.
-
(2004)
Computer Security
, vol.23
, Issue.2
, pp. 120-125
-
-
Wu, T.S.1
Hsu, C.L.2
-
16
-
-
10644225185
-
New efficient user identification and key distribution scheme providing enhanced security
-
Yang Y, Wang S, Bao F, Wang J, Deng RH. New efficient user identification and key distribution scheme providing enhanced security. Computer Security 2004; 23(8):697-704.
-
(2004)
Computer Security
, vol.23
, Issue.8
, pp. 697-704
-
-
Yang, Y.1
Wang, S.2
Bao, F.3
Wang, J.4
Deng, R.H.5
-
17
-
-
33645287503
-
Two attacks on the Wu-Hsu user identification scheme
-
Lee CC. Two attacks on the Wu-Hsu user identification scheme. International Journal of Network Security 2005; 1(3):147-148.
-
(2005)
International Journal of Network Security
, vol.1
, Issue.3
, pp. 147-148
-
-
Lee, C.C.1
-
18
-
-
33748125161
-
A secure identification and key agreement protocol with user anonymity (SIKA)
-
Mangipudi KV, Katti RS. A secure identification and key agreement protocol with user anonymity (SIKA). Computer Security 2006; 25(6):420-425.
-
(2006)
Computer Security
, vol.25
, Issue.6
, pp. 420-425
-
-
Mangipudi, K.V.1
Katti, R.S.2
-
19
-
-
56949092341
-
A novel user identification scheme with key distribution preserving user anonymity for distributed computer networks
-
Hsu C-L, Chuang Y-H. A novel user identification scheme with key distribution preserving user anonymity for distributed computer networks. Information Science 2009; 179(4):422-429.
-
(2009)
Information Science
, vol.179
, Issue.4
, pp. 422-429
-
-
Hsu, C.-L.1
Chuang, Y.-H.2
-
20
-
-
77952677593
-
Weaknesses and improvement of HsuChuang's user identification scheme
-
Tsai JL. Weaknesses and improvement of HsuChuang's user identification scheme. Information Technology and Control 2010; 39(1):48-50.
-
(2010)
Information Technology and Control
, vol.39
, Issue.1
, pp. 48-50
-
-
Tsai, J.L.1
-
21
-
-
84868090556
-
Provably secure single sign-on scheme in distributed systems and networks, Proceedings of the 2012 IEEE 11th International Conference on Trust
-
Liverpool, UK
-
Yu J, Wang G, Mu Y. Provably secure single sign-on scheme in distributed systems and networks, Proceedings of the 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TRUSTCOM 2012), Liverpool, UK, 2012; 271-278.
-
(2012)
Security and Privacy in Computing and Communications (TRUSTCOM 2012)
, pp. 271-278
-
-
Yu, J.1
Wang, G.2
Mu, Y.3
-
22
-
-
79960556311
-
Generalized digital certificate for user authentication and key establishment for secure communications
-
Harn L, Ren J. Generalized digital certificate for user authentication and key establishment for secure communications. IEEE Transactions on Wireless Communications 2011; 10(7):2372-2379.
-
(2011)
IEEE Transactions on Wireless Communications
, vol.10
, Issue.7
, pp. 2372-2379
-
-
Harn, L.1
Ren, J.2
-
23
-
-
1842715081
-
The advantages of elliptic curve cryptography for wireless security
-
Lauter K. The advantages of elliptic curve cryptography for wireless security. IEEE Wireless Communications 2004; 11(1):62-67.
-
(2004)
IEEE Wireless Communications
, vol.11
, Issue.1
, pp. 62-67
-
-
Lauter, K.1
-
25
-
-
0004533420
-
A new approach to solving the cubic: Cardan's solution revealed
-
Nickalls RWD. A new approach to solving the cubic: Cardan's solution revealed. The Mathematical Gazette 1993; 77(480):354-359.
-
(1993)
The Mathematical Gazette
, vol.77
, Issue.480
, pp. 354-359
-
-
Nickalls, R.W.D.1
-
27
-
-
84862699099
-
Cryptanalysis and improvement of an access control in user hierarchy based on elliptic curve cryptosystem
-
Das AK, Paul NR, Tripathy L. Cryptanalysis and improvement of an access control in user hierarchy based on elliptic curve cryptosystem. Information Sciences 2012; 209(C):80-92.
-
(2012)
Information Sciences
, vol.209
, pp. 80-92
-
-
Das, A.K.1
Paul, N.R.2
Tripathy, L.3
-
28
-
-
43749092801
-
Provably secure constant round contributory group key agreement
-
Dutta R, Barua R. Provably secure constant round contributory group key agreement. IEEE Transactions on Information Theory 2008; 54(5):2007-2025.
-
(2008)
IEEE Transactions on Information Theory
, vol.54
, Issue.5
, pp. 2007-2025
-
-
Dutta, R.1
Barua, R.2
-
29
-
-
12344259813
-
BioHashing: two factor authentication featuring fingerprint data and tokenized random number
-
Jina ATB, Linga DNC, Goh A. BioHashing: two factor authentication featuring fingerprint data and tokenized random number. Pattern Recognition 2004; 37(11):2245-2255.
-
(2004)
Pattern Recognition
, vol.37
, Issue.11
, pp. 2245-2255
-
-
Jina, A.T.B.1
Linga, D.N.C.2
Goh, A.3
-
30
-
-
33750533142
-
An improved BioHashing for human authentication
-
Lumini A, Nanni L. An improved BioHashing for human authentication. Pattern Recognition 2007; 40(3):1057-1065.
-
(2007)
Pattern Recognition
, vol.40
, Issue.3
, pp. 1057-1065
-
-
Lumini, A.1
Nanni, L.2
-
31
-
-
78651389846
-
A simple and generic construction of authenticated encryption with associated data
-
Sarkar P. A simple and generic construction of authenticated encryption with associated data. ACM Transactions on Information and System Security 2010; 4:1-16.
-
(2010)
ACM Transactions on Information and System Security
, vol.4
, pp. 1-16
-
-
Sarkar, P.1
-
32
-
-
30744432873
-
Some observations on the theory of cryptographic hash functions
-
Stinson DR. Some observations on the theory of cryptographic hash functions. Designed Codes Cryptography 2006; 38(2):259-277.
-
(2006)
Designed Codes Cryptography
, vol.38
, Issue.2
, pp. 259-277
-
-
Stinson, D.R.1
-
34
-
-
0036566408
-
Examining smart-card security under the threat of power analysis attacks
-
Messerges TS, Dabbish EA, Sloan RH. Examining smart-card security under the threat of power analysis attacks. IEEE Transactions on Computers 2002; 51(5):541-552.
-
(2002)
IEEE Transactions on Computers
, vol.51
, Issue.5
, pp. 541-552
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
-
36
-
-
84874800178
-
A public-key cryptosystem and a signature scheme based on discrete logarithms
-
ElGamal TA. A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory 1985; 31(4):469-472.
-
(1985)
IEEE Transactions on Information Theory
, vol.31
, Issue.4
, pp. 469-472
-
-
ElGamal, T.A.1
-
37
-
-
0028547435
-
Design of generalized ElGamal type digital signature schemes based on discret logarithm
-
Harn L, Xu Y. Design of generalized ElGamal type digital signature schemes based on discret logarithm. Electronics Letters 1994; 30(24):2025-2026.
-
(1994)
Electronics Letters
, vol.30
, Issue.24
, pp. 2025-2026
-
-
Harn, L.1
Xu, Y.2
-
38
-
-
84928813166
-
-
Perceptual hashing. Available at. Accessed on November
-
Perceptual hashing. Available at http://www.amsqr.com/2013/01/perceptual-hashing.html. Accessed on November 2013.
-
(2013)
-
-
-
39
-
-
38149029815
-
A biometric identity based signature scheme
-
Burnett A, Byrne F, Dowling T, Duffy A. A biometric identity based signature scheme. International Journal of Network Security 2007; 5(3):317-326.
-
(2007)
International Journal of Network Security
, vol.5
, Issue.3
, pp. 317-326
-
-
Burnett, A.1
Byrne, F.2
Dowling, T.3
Duffy, A.4
-
40
-
-
35048865463
-
Fuzzy extractors: how to generate strong keys from biometrics and other noisy data
-
LNCS 3027, Interlaken, Switzerland
-
Dodis Y, Reyzin L, Smith A. Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. Proceedings of the Advances in Cryptology (Eurocrypt'04), LNCS 3027, Interlaken, Switzerland, 2004; 523-540.
-
(2004)
Proceedings of the Advances in Cryptology (Eurocrypt'04)
, pp. 523-540
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
41
-
-
0003508558
-
Advanced Encryption Standard. FIPS PUB 197
-
National Institute of Standards and Technology (NIST), U.S. Department of Commerce, November. Accessed on November 2010.
-
Advanced Encryption Standard. FIPS PUB 197. National Institute of Standards and Technology (NIST), U.S. Department of Commerce, November 2001. http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf. Accessed on November 2010.
-
(2001)
-
-
-
42
-
-
78649335192
-
Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards
-
Li X, Niu J-W, Ma J, Wang W-D, Liu C-L. Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards. Journal of Network and Computer Applications 2011; 34(1):73-79.
-
(2011)
Journal of Network and Computer Applications
, vol.34
, Issue.1
, pp. 73-79
-
-
Li, X.1
Niu, J.-W.2
Ma, J.3
Wang, W.-D.4
Liu, C.-L.5
-
43
-
-
84883262804
-
An improved and effective secure password-based authentication and key agreement scheme using smart cards for the telecare medicine information system
-
Das AK, Bruhadeshwar B. An improved and effective secure password-based authentication and key agreement scheme using smart cards for the telecare medicine information system. Journal of Medical Systems 2013; 37(5):1-17.
-
(2013)
Journal of Medical Systems
, vol.37
, Issue.5
, pp. 1-17
-
-
Das, A.K.1
Bruhadeshwar, B.2
-
44
-
-
45849132580
-
Automated validation of Internet security protocols and applications
-
Available at. Accessed on January 2014.
-
Automated validation of Internet security protocols and applications. Available at http://www.avispa-project.org/. Accessed on January 2014.
-
-
-
-
46
-
-
84891619186
-
Formal security verification of a dynamic password-based user authentication scheme for hierarchical wireless sensor networks
-
Communications in Computer and Information Science Series (CCIS), Springer-Verlag, Berlin-Heidelberg
-
Das AK, Chatterjee S, Formal security verification of a dynamic password-based user authentication scheme for hierarchical wireless sensor networks, Proceedings of International Symposium on Security in Computing and Communications (SSCC 2013), Communications in Computer and Information Science Series (CCIS), Springer-Verlag, Berlin-Heidelberg; 243-254.
-
Proceedings of International Symposium on Security in Computing and Communications (SSCC 2013)
, pp. 243-254
-
-
Das, A.K.1
Chatterjee, S.2
-
48
-
-
26444497860
-
The AVISPA tool for the automated validation of internet security protocols and applications
-
LNCS, Springer-Verlag, Berlin-Heidelberg
-
Armando A et al. The AVISPA tool for the automated validation of internet security protocols and applications, Proceedings of 17th International Conference on Computer Aided Verification (CAV'05), LNCS, Springer-Verlag, Berlin-Heidelberg, 2005; 281-285.
-
(2005)
Proceedings of 17th International Conference on Computer Aided Verification (CAV'05)
, pp. 281-285
-
-
Armando, A.1
-
49
-
-
70349371604
-
The high-level protocol specification language HLPSL developed in the EU project AVISPA
-
von Oheimb D. The high-level protocol specification language HLPSL developed in the EU project AVISPA, Proceedings of APPSEM Workshop, Tallinn, 2005.
-
(2005)
Proceedings of APPSEM Workshop, Tallinn
-
-
von Oheimb, D.1
-
51
-
-
84928787764
-
-
AVISPA Web tool. Available at. Accessed on January 2014
-
AVISPA Web tool. Available at http://www.avispa-project.org/web-interface/expert.php/. Accessed on January 2014.
-
-
-
-
52
-
-
84928800367
-
-
Secure hash standard, NIST Standard FIPS PUB 180-3
-
Secure hash standard, NIST Standard FIPS PUB 180-3, 2008.
-
(2008)
-
-
-
53
-
-
53049100441
-
Practical anonymous user authentication scheme with security proof
-
Chien HY. Practical anonymous user authentication scheme with security proof. Computer Security 2008; 27(5-6):216-223.
-
(2008)
Computer Security
, vol.27
, Issue.5-6
, pp. 216-223
-
-
Chien, H.Y.1
|