-
1
-
-
77950583205
-
Security analysis of NSSK protocol and its improvement
-
J Liao, B Zhu, Y He, Security analysis of NSSK protocol and its improvement. IEEE Int. Conf, 115–118 (2009). doi:10.1109/DASC.2009.44.
-
(2009)
IEEE Int. Conf
, pp. 115-118
-
-
Liao, J.1
Zhu, B.2
He, Y.3
-
3
-
-
70449458980
-
Based on BAN logic analysis Otway-Rees protocol[J]
-
YJ Deng, Based on BAN logic analysis Otway-Rees protocol[J]. Chaohu Coll. J. 78(3), 36–37 (2006).
-
(2006)
Chaohu Coll. J
, vol.78
, Issue.3
, pp. 36-37
-
-
Deng, Y.J.1
-
4
-
-
0345098454
-
Efficient three-party authentication and key agreement protocols resistant to password guessing attacks
-
HT Yeh, HM Sun, T Hwang, Efficient three-party authentication and key agreement protocols resistant to password guessing attacks. J. Inform. Sci. Eng. 19(6), 1059–1070 (2003).
-
(2003)
J. Inform. Sci. Eng
, vol.19
, Issue.6
, pp. 1059-1070
-
-
Yeh, H.T.1
Sun, H.M.2
Hwang, T.3
-
5
-
-
33846817471
-
Simple three-party key exchange protocol
-
R Lu, Z Cao, Simple three-party key exchange protocol. Comput. Secur. 26(1), 94–97 (2007).
-
(2007)
Comput. Secur
, vol.26
, Issue.1
, pp. 94-97
-
-
Lu, R.1
Cao, Z.2
-
6
-
-
47549109760
-
A round and computation-efficient three-party authenticated key exchange protocol
-
T Chen, WB Lee, HB Chen, A round and computation-efficient three-party authenticated key exchange protocol. J. Syst. Softw. 81(9), 1581–1590 (2008).
-
(2008)
J. Syst. Softw
, vol.81
, Issue.9
, pp. 1581-1590
-
-
Chen, T.1
Lee, W.B.2
Chen, H.B.3
-
7
-
-
68049147074
-
A simple three-party password-based key exchange protocol
-
HF Huang, A simple three-party password-based key exchange protocol. Int. J. Commun. Syst. 22(7), 857–862 (2009).
-
(2009)
Int. J. Commun. Syst
, vol.22
, Issue.7
, pp. 857-862
-
-
Huang, H.F.1
-
8
-
-
67649791953
-
Communication-efficient three-party protocols for authentication and key agreement
-
TF Lee, JL Liu, MJ Sung, SB Yang, CM Chen, Communication-efficient three-party protocols for authentication and key agreement. Comput. Math. Appl. 58(4), 641–648 (2009).
-
(2009)
Comput. Math. Appl
, vol.58
, Issue.4
, pp. 641-648
-
-
Lee, T.F.1
Liu, J.L.2
Sung, M.J.3
Yang, S.B.4
Chen, C.M.5
-
9
-
-
84940005131
-
Liang, Design and analysis of a chaotic maps-based three-party authenticated key agreement protocol
-
X Li, JW Niu, S Kumari, MK Khan, J Liao, W Liang, Design and analysis of a chaotic maps-based three-party authenticated key agreement protocol. Nonlinear Dyn. 80 (2015). doi:10.1007/s11071-015-1937-0.
-
(2015)
Nonlinear Dyn
, pp. 80
-
-
X Li, J.W.1
Niu, S.2
Kumari, M.K.3
Khan, J.4
Liao, W.5
-
10
-
-
84883653668
-
Liao, An enhanced smart card based remote user password authentication scheme
-
X Li, J Niu, MK Khan, JG Liao, An enhanced smart card based remote user password authentication scheme. J. Netw. Comp. Appl. 365, 1365–1371 (2013).
-
(2013)
J. Netw. Comp. Appl
, vol.365
, pp. 1365-1371
-
-
X Li, J.1
Niu, M.K.2
Khan, J.G.3
-
11
-
-
44849118543
-
Cryptanalysis of simple three-party key exchange protocol
-
H Guo, Z Li, Y Mu, X Zhang, Cryptanalysis of simple three-party key exchange protocol. Comput. Secur. 27(1-2), 16–21 (2008).
-
(2008)
Comput. Secur
, vol.27
, Issue.1-2
, pp. 16-21
-
-
Guo, H.1
Li, Z.2
Mu, Y.3
Zhang, X.4
-
12
-
-
58049215501
-
Enhanced password-based simple three-party key exchange protocol.Comput
-
HS Kim, JY Choi, Enhanced password-based simple three-party key exchange protocol.Comput. Electrical Eng. 35(1), 107–114 (2009).
-
(2009)
Electrical Eng
, vol.35
, Issue.1
, pp. 107-114
-
-
Kim, H.S.1
Choi, J.Y.2
-
13
-
-
50249114107
-
Body area network and its standardization at IEEE 802.15.MBAN
-
HB Li, T Ken-ichi, B Zhen, K Ryuji, Body area network and its standardization at IEEE 802.15.MBAN. Mob. Wirel. Commun. Summit. 16th IST, 1–5 (2007).
-
(2007)
Mob. Wirel. Commun. Summit
, vol.16th IST
-
-
Li, H.B.1
Ken-ichi, T.2
Zhen, B.3
Ryuji, K.4
-
14
-
-
84937471347
-
-
B Zhen, P Maulin, L SungHyup, W EunTae, A Arthur, TG6 technical Requirements Document (TRD). IEEE (2008). ID: 802.15-08-0644
-
B Zhen, P Maulin, L SungHyup, W EunTae, A Arthur, TG6 technical Requirements Document (TRD). IEEE (2008). ID: 802.15-08-0644.
-
-
-
-
15
-
-
84863537000
-
Ransford, K Fu, in Proceedings of Design Automation Conference(DAC), 49th ACM/EDAC/IEEE
-
W Burleson, SS Clark, B Ransford, K Fu, in Proceedings of Design Automation Conference(DAC), 49th ACM/EDAC/IEEE. Design challenges for secure implantable medical devices (IEEE, 2012), pp. 12–17.
-
(2012)
Design challenges for secure implantable medical devices (IEEE
, pp. 12-17
-
-
W Burleson, S.S.1
Clark, B.2
-
16
-
-
84869181957
-
-
JM Ho, in The 8th International Wireless Communications and Mobile Computing Conference (IWCMC). A versatile suite of strong authenticated key agreement protocols for body area networks (IEEE,Limassol, 2012), pp. 683–688
-
JM Ho, in The 8th International Wireless Communications and Mobile Computing Conference (IWCMC). A versatile suite of strong authenticated key agreement protocols for body area networks (IEEE,Limassol, 2012), pp. 683–688, doi:10.1109/IWCMC.2012.6314287.
-
-
-
-
17
-
-
33750836663
-
in Proceeding of Wearable and Implantable Body Sensor Networks. A design proposal of security architecture for medical body sensor networks (IEEE
-
SD Bao, YT Zhang, LF Shen, in Proceeding of Wearable and Implantable Body Sensor Networks. A design proposal of security architecture for medical body sensor networks (IEEE, BSN, 2006), pp. 84–90, doi:10.1109/BSN.2006.2.
-
(2006)
BSN
, pp. 84-90
-
-
Bao, S.D.1
Zhang, Y.T.2
Shen, L.F.3
-
18
-
-
84891804845
-
Certificateless remote anonymous authentication schemes for wireless body area networks
-
JW Liu, ZH Zhang, XF Chen, K Sup Kwak, Certificateless remote anonymous authentication schemes for wireless body area networks. IEEE Trans. Parallel Distributed Syst. 25(2), 332–342 (2014).
-
(2014)
IEEE Trans. Parallel Distributed Syst
, vol.25
, Issue.2
, pp. 332-342
-
-
Liu, J.W.1
Zhang, Z.H.2
Chen, X.F.3
Sup Kwak, K.4
-
20
-
-
84937471349
-
-
M Rostami, W Burleson, A Juels, in Design Automation Conference (DAC). Balancing security and utility in medical devices? (IEEE, 2013), pp. 1–6. 50th ACM/EDAC/IEEE
-
M Rostami, W Burleson, A Juels, in Design Automation Conference (DAC). Balancing security and utility in medical devices? (IEEE, 2013), pp. 1–6. 50th ACM/EDAC/IEEE.
-
-
-
-
22
-
-
77953856139
-
The study on the application of BAN logic in formal analysis of authentication protocols
-
7th International Conference on Electronic Commerce, ICEC05: Towards Ubiquitous Business
-
JH Wen, M Zhang, X Li, The study on the application of BAN logic in formal analysis of authentication protocols. ACM Int. Conf. Proc. Series. 113, 744–747 (2005). 7th International Conference on Electronic Commerce, ICEC05: Towards Ubiquitous Business.
-
(2005)
ACM Int. Conf. Proc. Series
, vol.113
, pp. 744-747
-
-
Wen, J.H.1
Zhang, M.2
Li, X.3
-
23
-
-
84937471351
-
-
PXA, 270 processor electrical, mechanical, and thermal specification
-
PXA, 270 processor electrical, mechanical, and thermal specification. http://pdf.dzsc.com/CXX/NHPXA270Cxxx.pdf.
-
-
-
-
24
-
-
42949161502
-
Improving the novel three-party encrypted key exchange protocol
-
EJ Yoon, KY Yoo, Improving the novel three-party encrypted key exchange protocol. Comput. Stand. Interfaces. 30(5), 309–314 (2008).
-
(2008)
Comput. Stand. Interfaces
, vol.30
, Issue.5
, pp. 309-314
-
-
Yoon, E.J.1
Yoo, K.Y.2
-
25
-
-
77953893048
-
Ma, An efficient three-party authenticated key exchange protocol with one-time key
-
C Lv, M Ma, H Li, J Ma, An efficient three-party authenticated key exchange protocol with one-time key. IEEE INFOCOM, 1–5 (2010). doi:10.1109/INFCOMW.2010.5466648.
-
(2010)
IEEE INFOCOM
-
-
C Lv, M.1
Ma, H.2
Li, J.3
|