-
1
-
-
24144491593
-
Password-based authenticated key exchange in the three-party setting
-
S. Vaudenay, LNCS Springer Berlin Heidelberg
-
M. Abdalla, P.-A. Fouque, and D. Pointcheval Password-based authenticated key exchange in the three-party setting S. Vaudenay, PKC 2005 LNCS vol. 3386 2005 Springer Berlin Heidelberg 65 84
-
(2005)
PKC 2005
, vol.3386
, pp. 65-84
-
-
Abdalla, M.1
Fouque, P.-A.2
Pointcheval, D.3
-
2
-
-
84921898213
-
Privacy and human behavior in the age of information
-
A. Acquisti, L. Brandimarte, and G. Loewenstein Privacy and human behavior in the age of information Science 347 6221 2015 509 514
-
(2015)
Science
, vol.347
, Issue.6221
, pp. 509-514
-
-
Acquisti, A.1
Brandimarte, L.2
Loewenstein, G.3
-
3
-
-
84857768581
-
Power analysis of Atmel CryptoMemory-recovering keys from secure EEPROMs
-
O. Dunkelman, LNCS Springer Berlin/Heidelberg
-
J. Balasch, B. Gierlichs, R. Verdult, L. Batina, and I. Verbauwhede Power analysis of Atmel CryptoMemory-recovering keys from secure EEPROMs O. Dunkelman, CT-RSA 2012 LNCS vol. 7178 2012 Springer Berlin/Heidelberg 19 34
-
(2012)
CT-RSA 2012
, vol.7178
, pp. 19-34
-
-
Balasch, J.1
Gierlichs, B.2
Verdult, R.3
Batina, L.4
Verbauwhede, I.5
-
4
-
-
84867877630
-
Fault injection attacks on cryptographic devices: theory, practice, and countermeasures
-
A. Barenghi, L. Breveglieri, I. Koren, and D. Naccache Fault injection attacks on cryptographic devices: theory, practice, and countermeasures Proc. IEEE 100 11 2012 3056 3076
-
(2012)
Proc. IEEE
, vol.100
, Issue.11
, pp. 3056-3076
-
-
Barenghi, A.1
Breveglieri, L.2
Koren, I.3
Naccache, D.4
-
5
-
-
0026850091
-
Encrypted key exchange: password-based protocols secure against dictionary attacks
-
IEEE
-
S.M. Bellovin, and M. Merritt Encrypted key exchange: password-based protocols secure against dictionary attacks Proceedings of IEEE S&P 1992 1992 IEEE 72 84
-
(1992)
Proceedings of IEEE S&P 1992
, pp. 72-84
-
-
Bellovin, S.M.1
Merritt, M.2
-
6
-
-
84869403808
-
Before we knew it: an empirical study of zero-day attacks in the real world
-
ACM
-
L. Bilge, and T. Dumitras Before we knew it: an empirical study of zero-day attacks in the real world Proceedings of ACM CCS 2012 2012 ACM 833 844
-
(2012)
Proceedings of ACM CCS 2012
, pp. 833-844
-
-
Bilge, L.1
Dumitras, T.2
-
7
-
-
84925546406
-
Credit card study blows holes in anonymity
-
468-468
-
J. Bohannon Credit card study blows holes in anonymity Science 347 6221 2015 468-468
-
(2015)
Science
, vol.347
, Issue.6221
-
-
Bohannon, J.1
-
8
-
-
84878356177
-
The science of guessing: analyzing an anonymized corpus of 70 million passwords
-
IEEE Computer Society
-
J. Bonneau The science of guessing: analyzing an anonymized corpus of 70 million passwords Proceedings of IEEE S&P 2012 2012 IEEE Computer Society 538 552
-
(2012)
Proceedings of IEEE S&P 2012
, pp. 538-552
-
-
Bonneau, J.1
-
9
-
-
77955315492
-
Whats in a name?
-
R. Sion, LNCS Springer Berlin/Heidelberg
-
J. Bonneau, M. Just, and G. Matthews Whats in a name? R. Sion, FC 2010 LNCS vol. 6052 2010 Springer Berlin/Heidelberg 98 113
-
(2010)
FC 2010
, vol.6052
, pp. 98-113
-
-
Bonneau, J.1
Just, M.2
Matthews, G.3
-
11
-
-
18744393738
-
Security proofs for an efficient password-based key exchange
-
ACM New York, NY, USA
-
E. Bresson, O. Chevassut, and D. Pointcheval Security proofs for an efficient password-based key exchange Proceedings of ACM CCS 2003 2003 ACM New York, NY, USA 241 250
-
(2003)
Proceedings of ACM CCS 2003
, pp. 241-250
-
-
Bresson, E.1
Chevassut, O.2
Pointcheval, D.3
-
12
-
-
35048866891
-
New security results on encrypted key exchange
-
F. Bao, R. Deng, J. Zhou, LNCS Springer-Verlag
-
E. Bresson, O. Chevassut, and D. Pointcheval New security results on encrypted key exchange F. Bao, R. Deng, J. Zhou, PKC 2004 LNCS vol. 2947 2004 Springer-Verlag 145 158
-
(2004)
PKC 2004
, vol.2947
, pp. 145-158
-
-
Bresson, E.1
Chevassut, O.2
Pointcheval, D.3
-
13
-
-
70349155465
-
Attacks and improvements to an RIFD mutual authentication protocol and its extensions
-
ACM New York, NY, USA
-
S. Cai, Y. Li, T. Li, and R.H. Deng Attacks and improvements to an RIFD mutual authentication protocol and its extensions Proceedings of ACM WiSec 2009 2009 ACM New York, NY, USA 51 58
-
(2009)
Proceedings of ACM WiSec 2009
, pp. 51-58
-
-
Cai, S.1
Li, Y.2
Li, T.3
Deng, R.H.4
-
14
-
-
0026153410
-
Remote password authentication with smart cards
-
C.C. Chang, and T.C. Wu Remote password authentication with smart cards IEE Proc.-Comp. Dig. Techniq. 138 3 1991 165 168
-
(1991)
IEE Proc.-Comp. Dig. Techniq.
, vol.138
, Issue.3
, pp. 165-168
-
-
Chang, C.C.1
Wu, T.C.2
-
15
-
-
84911978076
-
Untraceable dynamic-identity-based remote user authentication scheme with verifiable password update
-
Y.-F. Chang, W.-L. Tai, and H.-C. Chang Untraceable dynamic-identity-based remote user authentication scheme with verifiable password update Int. J. Commun. Syst. 27 11 2014 3430 3440
-
(2014)
Int. J. Commun. Syst.
, vol.27
, Issue.11
, pp. 3430-3440
-
-
Chang, Y.-F.1
Tai, W.-L.2
Chang, H.-C.3
-
16
-
-
84892516382
-
Robust smart-card-based remote user password authentication scheme
-
B. Chen, W. Kuo, and L. Wuu Robust smart-card-based remote user password authentication scheme Int. J. Commun. Syst. 27 2 2014 377 389
-
(2014)
Int. J. Commun. Syst.
, vol.27
, Issue.2
, pp. 377-389
-
-
Chen, B.1
Kuo, W.2
Wuu, L.3
-
17
-
-
78049329614
-
Security enhancement on an improvement on two remote user authentication schemes using smart cards
-
T.H. Chen, H.C. Hsiang, and W.K. Shih Security enhancement on an improvement on two remote user authentication schemes using smart cards Fut. Gener. Comp. Syst. 27 4 2011 377 380
-
(2011)
Fut. Gener. Comp. Syst.
, vol.27
, Issue.4
, pp. 377-380
-
-
Chen, T.H.1
Hsiang, H.C.2
Shih, W.K.3
-
18
-
-
64249169230
-
Weaknesses and improvement of Wang et al.'s remote user password authentication scheme for resource-limited environments
-
H. Chung, W. Ku, and M. Tsaur Weaknesses and improvement of Wang et al.'s remote user password authentication scheme for resource-limited environments Comput. Stand. Inter. 31 4 2009 863 868
-
(2009)
Comput. Stand. Inter.
, vol.31
, Issue.4
, pp. 863-868
-
-
Chung, H.1
Ku, W.2
Tsaur, M.3
-
20
-
-
51849085606
-
The random oracle model and the ideal cipher model are equivalent
-
D. Wagner, LNCS Springer Berlin/Heidelberg
-
J.-S. Coron, J. Patarin, and Y. Seurin The random oracle model and the ideal cipher model are equivalent D. Wagner, CRYPTO 2008 LNCS vol. 5157 2008 Springer Berlin/Heidelberg 1 20
-
(2008)
CRYPTO 2008
, vol.5157
, pp. 1-20
-
-
Coron, J.-S.1
Patarin, J.2
Seurin, Y.3
-
21
-
-
85133463240
-
The tangled web of password reuse
-
The Internet Society
-
A. Das, J. Bonneau, M. Caesar, N. Borisov, and X. Wang The tangled web of password reuse Proceedings of NDSS 2014 2014 The Internet Society 1 15
-
(2014)
Proceedings of NDSS 2014
, pp. 1-15
-
-
Das, A.1
Bonneau, J.2
Caesar, M.3
Borisov, N.4
Wang, X.5
-
22
-
-
4043122631
-
A dynamic id-based remote user authentication scheme
-
M. Das, A. Saxena, and V. Gulati A dynamic id-based remote user authentication scheme IEEE Trans. Consum. Electron. 50 2 2004 629 631
-
(2004)
IEEE Trans. Consum. Electron.
, vol.50
, Issue.2
, pp. 629-631
-
-
Das, M.1
Saxena, A.2
Gulati, V.3
-
23
-
-
62949130774
-
Two-factor user authentication in wireless sensor networks
-
M.L. Das Two-factor user authentication in wireless sensor networks IEEE Trans. Wirel. Commun. 8 3 2009 1086 1090
-
(2009)
IEEE Trans. Wirel. Commun.
, vol.8
, Issue.3
, pp. 1086-1090
-
-
Das, M.L.1
-
28
-
-
63149173170
-
Primary care physician's attitude towards the german e-health card projectłdeterminants and implications
-
N. Ernstmann, O. Ommen, M. Neumann, A. Hammer, R. Voltz, and H. Pfaff Primary care physician's attitude towards the german e-health card projectłdeterminants and implications J. Med. Syst. 33 3 2009 181 188
-
(2009)
J. Med. Syst.
, vol.33
, Issue.3
, pp. 181-188
-
-
Ernstmann, N.1
Ommen, O.2
Neumann, M.3
Hammer, A.4
Voltz, R.5
Pfaff, H.6
-
30
-
-
28044451335
-
Robust remote authentication scheme with smart cards
-
C. Fan, Y. Chan, and Z. Zhang Robust remote authentication scheme with smart cards Comp. Sec. 24 8 2005 619 628
-
(2005)
Comp. Sec.
, vol.24
, Issue.8
, pp. 619-628
-
-
Fan, C.1
Chan, Y.2
Zhang, Z.3
-
32
-
-
35348884906
-
A large-scale study of web password habits
-
ACM New York, NY, USA
-
D. Florencio, and C. Herley A large-scale study of web password habits Proceedings of WWW 2007 2007 ACM New York, NY, USA 657 666
-
(2007)
Proceedings of WWW 2007
, pp. 657-666
-
-
Florencio, D.1
Herley, C.2
-
33
-
-
84955339164
-
Secure integration of asymmetric and symmetric encryption schemes
-
M. Wiener, LNCS Springer Verlag
-
E. Fujisaki, and T. Okamoto Secure integration of asymmetric and symmetric encryption schemes M. Wiener, Proceedings of CRYPTO 1999 LNCS vol. 1666 1999 Springer Verlag 537 554
-
(1999)
Proceedings of CRYPTO 1999
, vol.1666
, pp. 537-554
-
-
Fujisaki, E.1
Okamoto, T.2
-
34
-
-
84877995596
-
An empirical analysis of malicious internet banking software behavior
-
ACM
-
A.R.A. Grégio, D.S. Fernandes, V.M. Afonso, P.L. de Geus, V.F. Martins, and M. Jino An empirical analysis of malicious internet banking software behavior Proceedings of the 28th Annual ACM Symposium on Applied Computing (SAC 2013) 2013 ACM 1830 1835
-
(2013)
Proceedings of the 28th Annual ACM Symposium on Applied Computing (SAC 2013)
, pp. 1830-1835
-
-
Grégio, A.R.A.1
Fernandes, D.S.2
Afonso, V.M.3
De Geus, P.L.4
Martins, V.F.5
Jino, M.6
-
35
-
-
71849087704
-
Public-key cryptography and password protocols
-
S. Halevi, and H. Krawczyk Public-key cryptography and password protocols ACM Trans. Inf. Syst. Sec. 2 3 1999 230 268
-
(1999)
ACM Trans. Inf. Syst. Sec.
, vol.2
, Issue.3
, pp. 230-268
-
-
Halevi, S.1
Krawczyk, H.2
-
36
-
-
84935865949
-
A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks
-
D. He, N. Kumar, and N. Chilamkurti A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks Inf. Sci. 321 2015 263 277
-
(2015)
Inf. Sci.
, vol.321
, pp. 263-277
-
-
He, D.1
Kumar, N.2
Chilamkurti, N.3
-
37
-
-
84878978708
-
Improvement on a smart card based password authentication scheme
-
D.B. He, J.H. Chen, and J. Hu Improvement on a smart card based password authentication scheme J. Internet Technol. 13 3 2012 38 42
-
(2012)
J. Internet Technol.
, vol.13
, Issue.3
, pp. 38-42
-
-
He, D.B.1
Chen, J.H.2
Hu, J.3
-
38
-
-
84873910697
-
Security and efficiency in roaming services for wireless networks: challenges, approaches, and prospects
-
D.J. He, C. Chen, J. Bu, S. Chan, and Y. Zhang Security and efficiency in roaming services for wireless networks: challenges, approaches, and prospects IEEE Commun. Magaz. 51 2 2013 142 150
-
(2013)
IEEE Commun. Magaz.
, vol.51
, Issue.2
, pp. 142-150
-
-
He, D.J.1
Chen, C.2
Bu, J.3
Chan, S.4
Zhang, Y.5
-
39
-
-
78751648745
-
A strong user authentication scheme with smart cards for wireless communications
-
D.J. He, M.D. Ma, Y. Zhang, C. Chen, and J.J. Bu A strong user authentication scheme with smart cards for wireless communications Comput. Commun. 34 3 2011 367 374
-
(2011)
Comput. Commun.
, vol.34
, Issue.3
, pp. 367-374
-
-
He, D.J.1
Ma, M.D.2
Zhang, Y.3
Chen, C.4
Bu, J.J.5
-
40
-
-
84903203451
-
Further observations on smart-card-based password-authenticated key agreement in distributed systems
-
X. Huang, X. Chen, J. Li, Y. Xiang, and L. Xu Further observations on smart-card-based password-authenticated key agreement in distributed systems IEEE Trans. Parallel Distrib. Syst. 25 7 2014 1767 1775
-
(2014)
IEEE Trans. Parallel Distrib. Syst.
, vol.25
, Issue.7
, pp. 1767-1775
-
-
Huang, X.1
Chen, X.2
Li, J.3
Xiang, Y.4
Xu, L.5
-
41
-
-
0344875575
-
anonymity and privacy: a modular approach
-
D. Hughes, V. Shmatikov, and Information hiding anonymity and privacy: a modular approach J. Comp. Sec. 12 1 2004 3 36
-
(2004)
J. Comp. Sec.
, vol.12
, Issue.1
, pp. 3-36
-
-
Hughes, D.1
Shmatikov, V.2
Hiding, I.3
-
42
-
-
84870064630
-
Group signatures with controllable linkability for dynamic membership
-
J.Y. Hwang, S. Lee, B.-H. Chung, H.S. Cho, and D. Nyang Group signatures with controllable linkability for dynamic membership Inf. Sci. 222 2013 761 778
-
(2013)
Inf. Sci.
, vol.222
, pp. 761-778
-
-
Hwang, J.Y.1
Lee, S.2
Chung, B.-H.3
Cho, H.S.4
Nyang, D.5
-
43
-
-
84988227377
-
Improvement of robust smart-card-based password authentication scheme
-
Q. Jiang, J. Ma, G. Li, and X. Li Improvement of robust smart-card-based password authentication scheme Int. J. Commun. Syst. 28 2 2015 383 393
-
(2015)
Int. J. Commun. Syst.
, vol.28
, Issue.2
, pp. 383-393
-
-
Jiang, Q.1
Ma, J.2
Li, G.3
Li, X.4
-
44
-
-
84872108080
-
A privacy enhanced authentication scheme for telecare medical information systems
-
Q. Jiang, J. Ma, Z. Ma, and G. Li A privacy enhanced authentication scheme for telecare medical information systems J. Med. Syst. 37 1 2013 1 8
-
(2013)
J. Med. Syst.
, vol.37
, Issue.1
, pp. 1-8
-
-
Jiang, Q.1
Ma, J.2
Ma, Z.3
Li, G.4
-
45
-
-
84872473654
-
Security enhancement of robust user authentication framework for wireless sensor networks
-
Q. Jiang, Z. Ma, J.F. Ma, and G. Li Security enhancement of robust user authentication framework for wireless sensor networks China Commun. 9 10 2012 103 111
-
(2012)
China Commun.
, vol.9
, Issue.10
, pp. 103-111
-
-
Jiang, Q.1
Ma, Z.2
Ma, J.F.3
Li, G.4
-
46
-
-
62549133356
-
Robust and efficient password-authenticated key agreement using smart cards
-
W.-S. Juang, S.-T. Chen, and H.-T. Liaw Robust and efficient password-authenticated key agreement using smart cards IEEE Trans. Ind. Electron. 55 6 2008 2551 2556
-
(2008)
IEEE Trans. Ind. Electron.
, vol.55
, Issue.6
, pp. 2551-2556
-
-
Juang, W.-S.1
Chen, S.-T.2
Liaw, H.-T.3
-
47
-
-
84855988718
-
Two-server password-only authenticated key exchange
-
J. Katz, P. MacKenzie, G. Taban, and V. Gligor Two-server password-only authenticated key exchange J. Comp. Syst. Sci. 78 2 2012 651 669
-
(2012)
J. Comp. Syst. Sci.
, vol.78
, Issue.2
, pp. 651-669
-
-
Katz, J.1
MacKenzie, P.2
Taban, G.3
Gligor, V.4
-
48
-
-
71449093776
-
Efficient and secure authenticated key exchange using weak passwords
-
J. Katz, R. Ostrovsky, and M. Yung Efficient and secure authenticated key exchange using weak passwords J. ACM 57 1 2009 1 41
-
(2009)
J. ACM
, vol.57
, Issue.1
, pp. 1-41
-
-
Katz, J.1
Ostrovsky, R.2
Yung, M.3
-
49
-
-
78751642788
-
Cryptanalysis and security enhancement of a more efficient & secure dynamic id-based remote user authentication scheme'
-
M. Khan, S. Kim, and K. Alghathbar Cryptanalysis and security enhancement of a more efficient & secure dynamic id-based remote user authentication scheme' Comp. Commun. 34 3 2011 305 309
-
(2011)
Comp. Commun.
, vol.34
, Issue.3
, pp. 305-309
-
-
Khan, M.1
Kim, S.2
Alghathbar, K.3
-
51
-
-
33745179557
-
HMQV: a high-performance secure Diffie-Hellman protocol
-
V. Shoup, LNCS Springer Berlin/Heidelberg
-
H. Krawczyk HMQV: a high-performance secure Diffie-Hellman protocol V. Shoup, CRYPTO 2005 LNCS vol. 3621 2005 Springer Berlin/Heidelberg 546 566
-
(2005)
CRYPTO 2005
, vol.3621
, pp. 546-566
-
-
Krawczyk, H.1
-
52
-
-
84914669082
-
Cryptanalysis and improvement of a robust smart-card-based remote user password authentication scheme
-
S. Kumari, and M.K. Khan Cryptanalysis and improvement of a robust smart-card-based remote user password authentication scheme Int. J. Commun. Syst. 27 12 2014 3939 3955
-
(2014)
Int. J. Commun. Syst.
, vol.27
, Issue.12
, pp. 3939-3955
-
-
Kumari, S.1
Khan, M.K.2
-
53
-
-
84906756164
-
CPAL: a conditional privacy-preserving authentication with access linkability for roaming service
-
C. Lai, H. Li, X. Liang, R. Lu, K. Zhang, and X. Shen CPAL: a conditional privacy-preserving authentication with access linkability for roaming service IEEE Internet Things J. 1 1 2014 46 57
-
(2014)
IEEE Internet Things J.
, vol.1
, Issue.1
, pp. 46-57
-
-
Lai, C.1
Li, H.2
Liang, X.3
Lu, R.4
Zhang, K.5
Shen, X.6
-
54
-
-
84901208306
-
Smart Card Security From a Programming Language and Static Analysis Perspective
-
X. Leroy, Smart Card Security From a Programming Language and Static Analysis Perspective, INRIA Rocquencourt & Trusted Logic, Tecnical Report, 2013 < http://pauillac.inria.fr/-xleroy/talks/language-security-etaps03.pdf.
-
(2013)
INRIA Rocquencourt & Trusted Logic, Tecnical Report
-
-
Leroy, X.1
-
55
-
-
84877844458
-
A new password authentication and user anonymity scheme based on elliptic curve cryptography and smart card
-
C.-T. Li A new password authentication and user anonymity scheme based on elliptic curve cryptography and smart card IET Inf. Sec. 7 1 2013 3 10
-
(2013)
IET Inf. Sec.
, vol.7
, Issue.1
, pp. 3-10
-
-
Li, C.-T.1
-
56
-
-
80052938422
-
A lightweight anonymous routing protocol without public key en/decryptions for wireless ad hoc networks
-
C.-T. Li, and M.-S. Hwang A lightweight anonymous routing protocol without public key en/decryptions for wireless ad hoc networks Inf. Sci. 181 23 2011 5333 5347
-
(2011)
Inf. Sci.
, vol.181
, Issue.23
, pp. 5333-5347
-
-
Li, C.-T.1
Hwang, M.-S.2
-
57
-
-
80053379375
-
A robust remote user authentication scheme using smart card
-
C.T. Li, and C.C. Lee A robust remote user authentication scheme using smart card Inf. Technol. Control 40 3 2011 236 245
-
(2011)
Inf. Technol. Control
, vol.40
, Issue.3
, pp. 236-245
-
-
Li, C.T.1
Lee, C.C.2
-
58
-
-
36248977046
-
Security analysis of two ultra-lightweight RFID authentication protocols
-
H. Venter, M. Eloff, L. Labuschagne, J. Eloff, R. Solms, IFIP AICT Springer-Verlag
-
T.-Y. Li, and G.-L. Wang Security analysis of two ultra-lightweight RFID authentication protocols H. Venter, M. Eloff, L. Labuschagne, J. Eloff, R. Solms, Proceedings of SEC 2007 IFIP AICT vol. 232 2007 Springer-Verlag 109 120
-
(2007)
Proceedings of SEC 2007
, vol.232
, pp. 109-120
-
-
Li, T.-Y.1
Wang, G.-L.2
-
59
-
-
84883653668
-
An enhanced smart card based remote user password authentication scheme
-
X. Li, J. Niu, M.K. Khan, and J. Liao An enhanced smart card based remote user password authentication scheme J. Netw. Comput. Appl. 36 5 2013 1365 1371
-
(2013)
J. Netw. Comput. Appl.
, vol.36
, Issue.5
, pp. 1365-1371
-
-
Li, X.1
Niu, J.2
Khan, M.K.3
Liao, J.4
-
60
-
-
84856217617
-
An enhanced and security dynamic identity based authentication protocol for multi-server architecture using smart cards
-
X. Li, Y. Xiong, J. Ma, and W. Wang An enhanced and security dynamic identity based authentication protocol for multi-server architecture using smart cards J. Netw. Comput. Appl. 35 2 2012 763 769
-
(2012)
J. Netw. Comput. Appl.
, vol.35
, Issue.2
, pp. 763-769
-
-
Li, X.1
Xiong, Y.2
Ma, J.3
Wang, W.4
-
61
-
-
75449106985
-
Anonymity enhancement on robust and efficient password-authenticated key agreement using smart cards
-
X.X. Li, W.D. Qiu, D. Zheng, K.F. Chen, and J. Li Anonymity enhancement on robust and efficient password-authenticated key agreement using smart cards IEEE Trans. Ind. Electron. 57 2 2010 793 800
-
(2010)
IEEE Trans. Ind. Electron.
, vol.57
, Issue.2
, pp. 793-800
-
-
Li, X.X.1
Qiu, W.D.2
Zheng, D.3
Chen, K.F.4
Li, J.5
-
63
-
-
84911988880
-
Security flaws in two improved remote user authentication schemes using smart cards
-
C.-G. Ma, D. Wang, and S. Zhao Security flaws in two improved remote user authentication schemes using smart cards Int. J. Commun. Syst. 27 10 2014 2215 2227
-
(2014)
Int. J. Commun. Syst.
, vol.27
, Issue.10
, pp. 2215-2227
-
-
Ma, C.-G.1
Wang, D.2
Zhao, S.3
-
64
-
-
84860376061
-
Dynamic id-based remote user password authentication schemes using smart cards: a review
-
R. Madhusudhan, and R. Mittal Dynamic id-based remote user password authentication schemes using smart cards: a review J. Netw. Comput. Appl. 35 4 2012 1235 1248
-
(2012)
J. Netw. Comput. Appl.
, vol.35
, Issue.4
, pp. 1235-1248
-
-
Madhusudhan, R.1
Mittal, R.2
-
65
-
-
33748125161
-
A secure identification and key agreement protocol with user anonymity (sika)
-
K. Mangipudi, and R. Katti A secure identification and key agreement protocol with user anonymity (sika) Comp. Sec. 25 6 2006 420 425
-
(2006)
Comp. Sec.
, vol.25
, Issue.6
, pp. 420-425
-
-
Mangipudi, K.1
Katti, R.2
-
66
-
-
0036566408
-
Examining smart-card security under the threat of power analysis attacks
-
T.S. Messerges, E.A. Dabbish, and R.H. Sloan Examining smart-card security under the threat of power analysis attacks IEEE Trans. Comp. 51 5 2002 541 552
-
(2002)
IEEE Trans. Comp.
, vol.51
, Issue.5
, pp. 541-552
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
-
67
-
-
80755168368
-
On the vulnerability of FPGA bitstream encryption against power analysis attacks: extracting keys from xilinx Virtex-II FPGAs
-
ACM New York, NY, USA
-
A. Moradi, A. Barenghi, T. Kasper, and C. Paar On the vulnerability of FPGA bitstream encryption against power analysis attacks: extracting keys from xilinx Virtex-II FPGAs Proceedings of ACM CCS 2011 2011 ACM New York, NY, USA 111 124
-
(2011)
Proceedings of ACM CCS 2011
, pp. 111-124
-
-
Moradi, A.1
Barenghi, A.2
Kasper, T.3
Paar, C.4
-
68
-
-
29744436477
-
FIPS 201: Personal Identity Verification of Federal Employees and Contractors
-
McLean, VA, August
-
E. Morse, M. Theofanos, Y. Choong, C. Paul, A. Zhang, FIPS 201: Personal Identity Verification of Federal Employees and Contractors, Tech. rep., National Institute of Standards and Technology, McLean, VA, August 2013, http://dx.doi.org/10.6028/NIST/.FIPS.201-2.
-
(2013)
Tech. rep., National Institute of Standards and Technology
-
-
Morse E.Theofanos, M.1
Choong, Y.2
Paul, C.3
Zhang, A.4
-
70
-
-
84893081352
-
Reverse-engineering a cryptographic RFID tag
-
USENIX Association
-
K. Nohl, D. Evans, S. Starbug, H. Plötz, Reverse-engineering a cryptographic RFID tag, in: USENIX Security 2008, USENIX Association, 2008, pp. 185-193.
-
(2008)
USENIX Security 2008
, pp. 185-193
-
-
Nohl, K.1
Evans, D.2
Starbug, S.3
Plötz, H.4
-
71
-
-
21844456657
-
Feature-based watermarking of 3d objects: toward robustness against remeshing and desynchronization
-
A. Patrice, B.B. Macq, Feature-based watermarking of 3d objects: toward robustness against remeshing and desynchronization, in: Proceedings of SPIE, vol. 5681, 2005, pp. 400-408.
-
(2005)
Proceedings of SPIE
, vol.5681
, pp. 400-408
-
-
Patrice, A.1
Macq, B.B.2
-
72
-
-
0038687701
-
Securing passwords against dictionary attacks
-
ACM
-
B. Pinkas, and T. Sander Securing passwords against dictionary attacks Proceedings of ACM CCS 2002 2002 ACM 161 170
-
(2002)
Proceedings of ACM CCS 2002
, pp. 161-170
-
-
Pinkas, B.1
Sander, T.2
-
73
-
-
38149027287
-
Provable security for public key schemes
-
Springer
-
D. Pointcheval Provable security for public key schemes Contemporary Cryptology 2005 Springer 133 190
-
(2005)
Contemporary Cryptology
, pp. 133-190
-
-
Pointcheval, D.1
-
74
-
-
84861657933
-
Password-based authenticated key exchange
-
M. Fischlin, J. Buchmann, M. Manulis, LNCS Springer Berlin/Heidelberg
-
D. Pointcheval Password-based authenticated key exchange M. Fischlin, J. Buchmann, M. Manulis, PKC 2012 LNCS vol. 7293 2012 Springer Berlin/Heidelberg 390 397
-
(2012)
PKC 2012
, vol.7293
, pp. 390-397
-
-
Pointcheval, D.1
-
75
-
-
84938216787
-
-
Miracl Library, CertiVox UK Ltd.
-
M. Scott, Miracl Library, CertiVox UK Ltd., 2011 < https://www.certivox.com/miracl >.
-
(2011)
-
-
Scott, M.1
-
76
-
-
33750710411
-
Implementing cryptographic pairings on smartcards
-
L. Goubin, M. Matsui, LNCS Springer Berlin Heidelberg
-
M. Scott, N. Costigan, and W. Abdulwahab Implementing cryptographic pairings on smartcards L. Goubin, M. Matsui, CHES 2006 LNCS vol. 4249 2006 Springer Berlin Heidelberg 134 147
-
(2006)
CHES 2006
, vol.4249
, pp. 134-147
-
-
Scott, M.1
Costigan, N.2
Abdulwahab, W.3
-
77
-
-
84858112506
-
Security flaws in three password-based remote user authentication schemes with smart cards
-
K. Shim Security flaws in three password-based remote user authentication schemes with smart cards Cryptologia 36 1 2012 62 69
-
(2012)
Cryptologia
, vol.36
, Issue.1
, pp. 62-69
-
-
Shim, K.1
-
78
-
-
77649192852
-
A cooperative cellular and broadcast conditional access system for pay-tv systems
-
H. Shirazi, J. Cosmas, and D. Cutts A cooperative cellular and broadcast conditional access system for pay-tv systems IEEE Trans. Multim. 56 1 2010 44 57
-
(2010)
IEEE Trans. Multim.
, vol.56
, Issue.1
, pp. 44-57
-
-
Shirazi, H.1
Cosmas, J.2
Cutts, D.3
-
79
-
-
77955312905
-
Advanced smart card based password authentication protocol
-
R. Song Advanced smart card based password authentication protocol Comp. Stand. Interf. 32 5 2010 321 325
-
(2010)
Comp. Stand. Interf.
, vol.32
, Issue.5
, pp. 321-325
-
-
Song, R.1
-
80
-
-
84938213320
-
A provable authenticated group key agreement protocol for mobile environment
-
H.-M. Sun, B.-Z. He, C.-M. Chen, T.-Y. Wu, C.-H. Lin, and H. Wang A provable authenticated group key agreement protocol for mobile environment Inf. Sci. 321 2015 224 237
-
(2015)
Inf. Sci.
, vol.321
, pp. 224-237
-
-
Sun, H.-M.1
He, B.-Z.2
Chen, C.-M.3
Wu, T.-Y.4
Lin, C.-H.5
Wang, H.6
-
81
-
-
78751651500
-
Sat: a security architecture achieving anonymity and traceability in wireless mesh networks
-
J. Sun, C. Zhang, Y. Zhang, and Y. Fang Sat: a security architecture achieving anonymity and traceability in wireless mesh networks IEEE Trans. Depend. Secur. Comput. 8 2 2011 295 307
-
(2011)
IEEE Trans. Depend. Secur. Comput.
, vol.8
, Issue.2
, pp. 295-307
-
-
Sun, J.1
Zhang, C.2
Zhang, Y.3
Fang, Y.4
-
82
-
-
78649878863
-
New dynamic id authentication scheme using smart cards
-
J. Tsai, T. Wu, and K. Tsai New dynamic id authentication scheme using smart cards Int. J. Commun. Syst. 23 12 2010 1449 1462
-
(2010)
Int. J. Commun. Syst.
, vol.23
, Issue.12
, pp. 1449-1462
-
-
Tsai, J.1
Wu, T.2
Tsai, K.3
-
83
-
-
84886653936
-
Novel anonymous authentication scheme using smart cards
-
J.-L. Tsai, N.-W. Lo, and T.-C. Wu Novel anonymous authentication scheme using smart cards IEEE Trans. Ind. Inform. 9 4 2013 2004 2013
-
(2013)
IEEE Trans. Ind. Inform.
, vol.9
, Issue.4
, pp. 2004-2013
-
-
Tsai, J.-L.1
Lo, N.-W.2
Wu, T.-C.3
-
84
-
-
84857366012
-
An efficient and secure multi-server authentication scheme with key agreement
-
W.-J. Tsaur, J.-H. Li, and W.-B. Lee An efficient and secure multi-server authentication scheme with key agreement J. Syst. Softw. 85 4 2012 876 882
-
(2012)
J. Syst. Softw.
, vol.85
, Issue.4
, pp. 876-882
-
-
Tsaur, W.-J.1
Li, J.-H.2
Lee, W.-B.3
-
85
-
-
77956600221
-
Remote automation laboratory using a cluster of virtual machines
-
A.G. Vicente, I.B. Munoz, J.L.L. Galilea, and P.A.R. del Toro Remote automation laboratory using a cluster of virtual machines IEEE Trans. Ind. Electron. 57 10 2010 3276 3283
-
(2010)
IEEE Trans. Ind. Electron.
, vol.57
, Issue.10
, pp. 3276-3283
-
-
Vicente, A.G.1
Munoz, I.B.2
Galilea, J.L.L.3
Del Toro, P.A.R.4
-
87
-
-
84975275069
-
Anonymous two-factor authentication in distributed systems: certain goals are beyond attainment
-
D. Wang, D. He, P. Wang, and C.-H. Chu Anonymous two-factor authentication in distributed systems: certain goals are beyond attainment IEEE Trans. Depend. Secur. Comput. 2014 http://dx.doi.org/10.1109/TDSC.2014.2355850
-
(2014)
IEEE Trans. Depend. Secur. Comput.
-
-
Wang, D.1
He, D.2
Wang, P.3
Chu, C.-H.4
-
88
-
-
84901199502
-
Offline dictionary attack on password authentication schemes using smart cards
-
Y. Desmedt, B. Thuraisingham, K. Hamlen, LNCS Springer Berlin/Heidelberg
-
D. Wang, and P. Wang Offline dictionary attack on password authentication schemes using smart cards Y. Desmedt, B. Thuraisingham, K. Hamlen, ISC 2013 LNCS 2013 Springer Berlin/Heidelberg 1 16 < http://eprint.iacr.org/2014/208.pdf >
-
(2013)
ISC 2013
, pp. 1-16
-
-
Wang, D.1
Wang, P.2
-
89
-
-
84938198294
-
On the usability of two-factor authentication
-
Lecture Notes in Computer Science Springer Berlin/Heidelberg
-
D. Wang, and P. Wang On the usability of two-factor authentication Proceedings of SecureComm 2014 Lecture Notes in Computer Science 2015 Springer Berlin/Heidelberg 1 9
-
(2015)
Proceedings of SecureComm 2014
, pp. 1-9
-
-
Wang, D.1
Wang, P.2
-
91
-
-
84901208308
-
Robust Smart-Card-Based Password Authentication Scheme Against Smart Card Security Breach
-
D. Wang, P. Wang, C.G. Ma, Z. Chen, Robust Smart-Card-Based Password Authentication Scheme Against Smart Card Security Breach, Cryptology ePrint Archive, Report 2012/439, 2012 < http://eprint.iacr.org/2012/439.pdf >.
-
(2012)
Cryptology ePrint Archive, Report 2012/439
-
-
Wang, D.1
Wang, P.2
Ma, C.G.3
Chen, Z.4
-
92
-
-
78751645363
-
Robust authentication and key agreement scheme preserving the privacy of secret key
-
R.C. Wang, W.S. Juang, and C.L. Lei Robust authentication and key agreement scheme preserving the privacy of secret key Comp. Commun. 34 3 2011 274 280
-
(2011)
Comp. Commun.
, vol.34
, Issue.3
, pp. 274-280
-
-
Wang, R.C.1
Juang, W.S.2
Lei, C.L.3
-
93
-
-
59649083248
-
A more efficient and secure dynamic id-based remote user authentication scheme
-
Y. Wang, J. Liu, F. Xiao, and J. Dan A more efficient and secure dynamic id-based remote user authentication scheme Comp. Commun. 32 4 2009 583 585
-
(2009)
Comp. Commun.
, vol.32
, Issue.4
, pp. 583-585
-
-
Wang, Y.1
Liu, J.2
Xiao, F.3
Dan, J.4
-
94
-
-
84863921959
-
Password protected smart card and memory stick authentication against off-line dictionary attacks
-
D. Gritzalis, S. Furnell, M. Theoharidou, IFIP AICT Springer Boston
-
Y.G. Wang Password protected smart card and memory stick authentication against off-line dictionary attacks D. Gritzalis, S. Furnell, M. Theoharidou, SEC 2012 IFIP AICT vol. 376 2012 Springer Boston 489 500
-
(2012)
SEC 2012
, vol.376
, pp. 489-500
-
-
Wang, Y.G.1
-
95
-
-
84901732410
-
A more secure anonymous user authentication scheme for the integrated epr information system
-
F. Wen A more secure anonymous user authentication scheme for the integrated epr information system J. Med. Syst. 38 5 2014 1 7
-
(2014)
J. Med. Syst.
, vol.38
, Issue.5
, pp. 1-7
-
-
Wen, F.1
-
96
-
-
84858082073
-
An improved dynamic id-based remote user authentication with key agreement scheme
-
F. Wen, and X. Li An improved dynamic id-based remote user authentication with key agreement scheme Comp. Electr. Eng. 38 2 2012 381 387
-
(2012)
Comp. Electr. Eng.
, vol.38
, Issue.2
, pp. 381-387
-
-
Wen, F.1
Li, X.2
-
97
-
-
84890555385
-
A secure and effective anonymous user authentication scheme for roaming service in global mobility networks
-
F. Wen, W. Susilo, and G. Yang A secure and effective anonymous user authentication scheme for roaming service in global mobility networks Wirel. Pers. Commun. 73 3 2013 993 1004
-
(2013)
Wirel. Pers. Commun.
, vol.73
, Issue.3
, pp. 993-1004
-
-
Wen, F.1
Susilo, W.2
Yang, G.3
-
98
-
-
84863056589
-
Robust smart-cards-based user authentication scheme with user anonymity
-
S.H. Wu, Y.F. Zhu, and Q. Pu Robust smart-cards-based user authentication scheme with user anonymity Secur. Commun. Netw. 5 2 2012 236 248
-
(2012)
Secur. Commun. Netw.
, vol.5
, Issue.2
, pp. 236-248
-
-
Wu, S.H.1
Zhu, Y.F.2
Pu, Q.3
-
99
-
-
43649083106
-
Cryptanalysis of a password authentication scheme over insecure networks
-
T. Xiang, K. Wong, and X. Liao Cryptanalysis of a password authentication scheme over insecure networks J. Comp. Syst. Sci. 74 5 2008 657 661
-
(2008)
J. Comp. Syst. Sci.
, vol.74
, Issue.5
, pp. 657-661
-
-
Xiang, T.1
Wong, K.2
Liao, X.3
-
100
-
-
84869595555
-
Dynamic id-based password authentication protocol with strong security against smart card lost attacks
-
P. Snac, M. Ott, A. Seneviratne, O. Akan, LNICST Springer Berlin/Heidelberg
-
Q. Xie Dynamic id-based password authentication protocol with strong security against smart card lost attacks P. Snac, M. Ott, A. Seneviratne, O. Akan, Proceedings of ICWCA 2012 LNICST vol. 72 2012 Springer Berlin/Heidelberg 412 418
-
(2012)
Proceedings of ICWCA 2012
, vol.72
, pp. 412-418
-
-
Xie, Q.1
-
101
-
-
84875929826
-
Finding and fixing vulnerabilities in several three-party password authenticated key exchange protocols without server public keys
-
H. Xiong, Y. Chen, Z. Guan, and Z. Chen Finding and fixing vulnerabilities in several three-party password authenticated key exchange protocols without server public keys Inf. Sci. 235 2013 329 340
-
(2013)
Inf. Sci.
, vol.235
, pp. 329-340
-
-
Xiong, H.1
Chen, Y.2
Guan, Z.3
Chen, Z.4
-
102
-
-
84880049034
-
A generic framework for anonymous authentication in mobile networks
-
J. Xu, and W.-T. Zhu A generic framework for anonymous authentication in mobile networks J. Comp. Sci. Technol. 28 4 2013 732 742
-
(2013)
J. Comp. Sci. Technol.
, vol.28
, Issue.4
, pp. 732-742
-
-
Xu, J.1
Zhu, W.-T.2
-
103
-
-
78751650071
-
An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks
-
J. Xu, W.-T. Zhu, and D.-G. Feng An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks Comp. Commun. 34 3 2011 319 325
-
(2011)
Comp. Commun.
, vol.34
, Issue.3
, pp. 319-325
-
-
Xu, J.1
Zhu, W.-T.2
Feng, D.-G.3
-
104
-
-
84884990326
-
A lightweight dynamic pseudonym identity based authentication and key agreement protocol without verification tables for multi-server architecture
-
K. Xue, P. Hong, and C. Ma A lightweight dynamic pseudonym identity based authentication and key agreement protocol without verification tables for multi-server architecture J. Comp. Syst. Sci. 80 1 2014 195 206
-
(2014)
J. Comp. Syst. Sci.
, vol.80
, Issue.1
, pp. 195-206
-
-
Xue, K.1
Hong, P.2
Ma, C.3
-
105
-
-
84894217609
-
On limitations of designing leakage-resilient password systems: attacks, principles and usability
-
The Internet Society San Diego, USA
-
Q. Yan, J. Han, Y. Li, and R.H. Deng On limitations of designing leakage-resilient password systems: attacks, principles and usability Proceedings of NDSS 2012, February 5-8 2012 The Internet Society San Diego, USA 1 16
-
(2012)
Proceedings of NDSS 2012, February 5-8
, pp. 1-16
-
-
Yan, Q.1
Han, J.2
Li, Y.3
Deng, R.H.4
-
106
-
-
52949137008
-
Two-factor mutual authentication based on smart cards and passwords
-
G. Yang, D. Wong, H. Wang, and X. Deng Two-factor mutual authentication based on smart cards and passwords J. Comp. Syst. Sci. 74 7 2008 1160 1172
-
(2008)
J. Comp. Syst. Sci.
, vol.74
, Issue.7
, pp. 1160-1172
-
-
Yang, G.1
Wong, D.2
Wang, H.3
Deng, X.4
-
107
-
-
80052599286
-
Across-authority lightweight ownership transfer protocol
-
M.H. Yang Across-authority lightweight ownership transfer protocol Electron. Comm. Res. Appl. 10 4 2011 375 383
-
(2011)
Electron. Comm. Res. Appl.
, vol.10
, Issue.4
, pp. 375-383
-
-
Yang, M.H.1
-
108
-
-
78049322666
-
Two robust remote user authentication protocols using smart cards
-
K.H. Yeh, C. Su, N.W. Lo, Y. Li, and Y.X. Hung Two robust remote user authentication protocols using smart cards J. Syst. Softw. 83 12 2010 2556 2565
-
(2010)
J. Syst. Softw.
, vol.83
, Issue.12
, pp. 2556-2565
-
-
Yeh, K.H.1
Su, C.2
Lo, N.W.3
Li, Y.4
Hung, Y.X.5
-
109
-
-
84881079256
-
Efficient two-server password-only authenticated key exchange
-
X. Yi, S. Ling, and H.-X. Wang Efficient two-server password-only authenticated key exchange IEEE Trans. Paral. Distrib. Syst. 24 9 2013 1773 1782
-
(2013)
IEEE Trans. Paral. Distrib. Syst.
, vol.24
, Issue.9
, pp. 1773-1782
-
-
Yi, X.1
Ling, S.2
Wang, H.-X.3
-
110
-
-
84919397560
-
An efficient password authentication scheme using smart card based on elliptic curve cryptography
-
Y. Zhang, J. Chen, B. Huang, and C. Peng An efficient password authentication scheme using smart card based on elliptic curve cryptography Inf. Technol. Control 43 4 2014 390 401
-
(2014)
Inf. Technol. Control
, vol.43
, Issue.4
, pp. 390-401
-
-
Zhang, Y.1
Chen, J.2
Huang, B.3
Peng, C.4
-
111
-
-
78651364381
-
Provable secure authentication protocol with anonymity for roaming service in global mobility networks
-
T. Zhou, and J. Xu Provable secure authentication protocol with anonymity for roaming service in global mobility networks Comp. Netw. 55 1 2011 205 213
-
(2011)
Comp. Netw.
, vol.55
, Issue.1
, pp. 205-213
-
-
Zhou, T.1
Xu, J.2
|