-
1
-
-
84923316212
-
Cryptanalysis and an efficient secure ID-based remote user authentication using smart card
-
Amin, R. (2013). Cryptanalysis and an efficient secure ID-based remote user authentication using smart card. International Journal of Computer Applications, 75(13), 43–48.
-
(2013)
International Journal of Computer Applications
, vol.75
, Issue.13
, pp. 43-48
-
-
Amin, R.1
-
2
-
-
84923296566
-
A novel user authentication and key agreement protocol for accessing multi-medical server usable in TMIS
-
Amin, R., & Biswas, G. P. (2015). A novel user authentication and key agreement protocol for accessing multi-medical server usable in TMIS. Journal of Medical Systems, 39(3), 33. doi:10.1007/s10916-015-0217-3.
-
(2015)
Journal of Medical Systems
, vol.39
, Issue.3
, pp. 33
-
-
Amin, R.1
Biswas, G.P.2
-
3
-
-
84922032139
-
-
Amin, R., & Biswas, G. P. (2015). Remote access control mechanism using rabin public key cryptosystem. In Information systems design and intelligent applications, advances in intelligent systems and computing (vol. 339, pp. 525–533). Springer.
-
Amin, R., & Biswas, G. P. (2015). Remote access control mechanism using rabin public key cryptosystem. In Information systems design and intelligent applications, advances in intelligent systems and computing (vol. 339, pp. 525–533). Springer. doi:10.1007/978-81-322-2250-7_52.
-
-
-
-
4
-
-
84908624175
-
An improved efficient remote user authentication scheme in multi-server environment using smart card
-
Amin, R., Maitra, T., & Giri, D. (2013). An improved efficient remote user authentication scheme in multi-server environment using smart card. International Journal of Computer Applications, 69(22), 1–6.
-
(2013)
International Journal of Computer Applications
, vol.69
, Issue.22
, pp. 1-6
-
-
Amin, R.1
Maitra, T.2
Giri, D.3
-
5
-
-
4043089982
-
An enhanced remote user authentication scheme using smart cards
-
Awasthi, A. K., & Lal, S. (2004). An enhanced remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics, 50(2), 583–586.
-
(2004)
IEEE Transactions on Consumer Electronics
, vol.50
, Issue.2
, pp. 583-586
-
-
Awasthi, A.K.1
Lal, S.2
-
7
-
-
84874324906
-
-
Boneh, D., & Franklin, M. (2001). Identity-based encryption from the weil pairing. In Advances in cryptology CRYPTO 2001, lecture notes in computer science (vol. 2139, pp. 213–229). Springer, Berlin.
-
Boneh, D., & Franklin, M. (2001). Identity-based encryption from the weil pairing. In Advances in cryptology CRYPTO 2001, lecture notes in computer science (vol. 2139, pp. 213–229). Springer, Berlin. doi:10.1007/3-540-44647-8_13.
-
-
-
-
8
-
-
84938985075
-
-
Boyd, C., & Mathuria, A. (2003). In Protocols for authentication and key establishment.
-
Boyd, C., & Mathuria, A. (2003). In Protocols for authentication and key establishment. doi:10.1007/978-3-662-09527-0.
-
-
-
-
9
-
-
0025386404
-
A logic of authentication
-
Burrows, M., Abadi, M., & Needham, R. (1990). A logic of authentication. ACM Transactions on Computer Systems, 8(1), 18–36. doi:10.1145/77648.77649.
-
(1990)
ACM Transactions on Computer Systems
, vol.8
, Issue.1
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
10
-
-
0026153410
-
Remote password authentication with smart cards
-
Chang, C. C., & Wu, T. C. (1991). Remote password authentication with smart cards. IEE Proceedings E Computers and Digital Techniques, 138(3), 165–168.
-
(1991)
IEE Proceedings E Computers and Digital Techniques
, vol.138
, Issue.3
, pp. 165-168
-
-
Chang, C.C.1
Wu, T.C.2
-
11
-
-
84872112386
-
A uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care
-
Chang, Y. F., Yu, S. H., & Shiao, D. R. (2013). A uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. Journal of Medical Systems, 37(2), 1–9. doi:10.1007/s10916-012-9902-7.
-
(2013)
Journal of Medical Systems
, vol.37
, Issue.2
, pp. 1-16
-
-
Chang, Y.F.1
Yu, S.H.2
Shiao, D.R.3
-
12
-
-
84864775732
-
An improved secure dynamic ID based remote user authentication scheme for multi-server environment
-
Lee, C.-C., Lai, Y.-M., & Li, C. T. (2011). An improved secure dynamic ID based remote user authentication scheme for multi-server environment. Expert Systems with Applications, 38(11), 203–209.
-
(2011)
Expert Systems with Applications
, vol.38
, Issue.11
, pp. 203-209
-
-
Lee, C.-C.1
Lai, Y.-M.2
Li, C.T.3
-
13
-
-
84938993004
-
-
Cheon, J. H., & Lee, D. H. (2002). Diffie-hellman problems and bilinear maps. Cryptology ePrint Archive: Report 2002.
-
Cheon, J. H., & Lee, D. H. (2002). Diffie-hellman problems and bilinear maps. Cryptology ePrint Archive: Report 2002.
-
-
-
-
14
-
-
0036302680
-
An efficient and practical solution to remote authentication: Smart card
-
Chien, H. Y., Jan, J. K., & Tseng, Y. M. (2002). An efficient and practical solution to remote authentication: Smart card. Computers and Security, 21(4), 372–375. doi:10.1016/S0167-4048(02)00415-7.
-
(2002)
Computers and Security
, vol.21
, Issue.4
, pp. 372-375
-
-
Chien, H.Y.1
Jan, J.K.2
Tseng, Y.M.3
-
15
-
-
51849131973
-
-
Eisenbarth, T., Kasper, T., Moradi, A., Paar, C., Salmasizadeh, M., & Shalmani, M. (2008). On the power of power analysis in the real world: A complete break of the keeloq code hopping scheme. In Advances in cryptology CRYPTO 2008, lecture notes in computer science (vol. 5157, pp. 203–220). Springer, Berlin.
-
Eisenbarth, T., Kasper, T., Moradi, A., Paar, C., Salmasizadeh, M., & Shalmani, M. (2008). On the power of power analysis in the real world: A complete break of the keeloq code hopping scheme. In Advances in cryptology CRYPTO 2008, lecture notes in computer science (vol. 5157, pp. 203–220). Springer, Berlin. doi:10.1007/978-3-540-85174-5_12.
-
-
-
-
16
-
-
84968502759
-
A remark concerning m-divisibility and the discrete logarithm in the divisor class group of curves
-
Frey, G., & Rück, H. G. (1994). A remark concerning m-divisibility and the discrete logarithm in the divisor class group of curves. Mathematics of computation, 62(206), 865–874. doi:10.2307/2153546.
-
(1994)
Mathematics of computation
, vol.62
, Issue.206
, pp. 865-874
-
-
Frey, G.1
Rück, H.G.2
-
17
-
-
56449110391
-
A dynamic ID-based user authentication and key agreement scheme for multi-server environment using bilinear pairings. In Power electronics and intelligent transportation system, 2008. PEITS ’08
-
Geng, J., & Zhang, L. (2008). A dynamic ID-based user authentication and key agreement scheme for multi-server environment using bilinear pairings. In Power electronics and intelligent transportation system, 2008. PEITS ’08. Workshop on (pp. 33–37). doi:10.1109/PEITS.2008.35.
-
(2008)
Workshop on
, pp. 33-37
-
-
Geng, J.1
Zhang, L.2
-
18
-
-
68849128250
-
Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment
-
Hsiang, H. C., & Shih, W. K. (2009). Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment. Computer Standards and Interfaces, 31(6), 1118–1123. doi:10.1016/j.csi.2008.11.002.
-
(2009)
Computer Standards and Interfaces
, vol.31
, Issue.6
, pp. 1118-1123
-
-
Hsiang, H.C.1
Shih, W.K.2
-
19
-
-
84907590232
-
An anonymous mobile user authentication protocol using self-certified public keys based on multi-server architectures
-
Hsieh, W. B., & Leu, J. S. (2014). An anonymous mobile user authentication protocol using self-certified public keys based on multi-server architectures. The Journal of Supercomputing, 70(1), 133–148. doi:10.1007/s11227-014-1135-8.
-
(2014)
The Journal of Supercomputing
, vol.70
, Issue.1
, pp. 133-148
-
-
Hsieh, W.B.1
Leu, J.S.2
-
20
-
-
84920258664
-
A provably secure ID-based mutual authentication and key agreement scheme for mobile multi-server environment without esl attack
-
Islam, S. (2014). A provably secure ID-based mutual authentication and key agreement scheme for mobile multi-server environment without esl attack. Wireless Personal Communications, 79(3), 1975–1991. doi:10.1007/s11277-014-1968-8.
-
(2014)
Wireless Personal Communications
, vol.79
, Issue.3
, pp. 1975-1991
-
-
Islam, S.1
-
21
-
-
12344259813
-
Biohashing: Two factor authentication featuring fingerprint data and tokenised random number
-
Jin, A. T. B., Ling, D. N. C., & Goh, A. (2004). Biohashing: Two factor authentication featuring fingerprint data and tokenised random number. Pattern Recognition, 37(11), 2245–2255.
-
(2004)
Pattern Recognition
, vol.37
, Issue.11
, pp. 2245-2255
-
-
Jin, A.T.B.1
Ling, D.N.C.2
Goh, A.3
-
22
-
-
1942455353
-
Efficient multi-server password authenticated key agreement using smart cards
-
Juang, W. S. (2004). Efficient multi-server password authenticated key agreement using smart cards. IEEE Transactions on Consumer Electronics, 50(1), 251–255. doi:10.1109/TCE.2004.1277870.
-
(2004)
IEEE Transactions on Consumer Electronics
, vol.50
, Issue.1
, pp. 251-255
-
-
Juang, W.S.1
-
23
-
-
84939573910
-
Differential power analysis
-
Kocher, P., Jaffe, J., & Jun, B. (1999). Differential power analysis. In Advances in cryptology CRYPTO 99, lecture notes in computer science (vol. 1666, pp. 388–397).
-
(1999)
In Advances in cryptology CRYPTO 99, lecture notes in computer science
, vol.1666
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
24
-
-
0034225062
-
User identification and key distribution maintaining anonymity for distributed computer network
-
Lee, W. B., & Chang, C. C. (2000). User identification and key distribution maintaining anonymity for distributed computer network. Computer and System Science, 15(4), 211–214.
-
(2000)
Computer and System Science
, vol.15
, Issue.4
, pp. 211-214
-
-
Lee, W.B.1
Chang, C.C.2
-
25
-
-
79959970986
-
A secure dynamic ID based remote user authentication scheme for multi-server environment using smart cards
-
Lee, C. C., Lin, T. H., & Chang, R. X. (2011). A secure dynamic ID based remote user authentication scheme for multi-server environment using smart cards. Expert Systems with Applications, 38(11), 13,863–13,870. doi:10.1016/j.eswa.2011.04.190.
-
(2011)
Expert Systems with Applications
, vol.38
, Issue.11
, pp. 863-870
-
-
Lee, C.C.1
Lin, T.H.2
Chang, R.X.3
-
26
-
-
84878597719
-
A novel smart card and dynamic ID based remote user authentication scheme for multi-server environments. Mathematical and Computer Modelling 58(1–2), 85–95 (2013). doi:10.1016/j.mcm.2012.06.033
-
Li, X., Ma, J., Wang, W., Xiong, Y., & Zhang, J. (2010). A novel smart card and dynamic ID based remote user authentication scheme for multi-server environments. Mathematical and Computer Modelling 58(1–2), 85–95 (2013). doi:10.1016/j.mcm.2012.06.033. Financial IT and security and international symposium on computational electronics.
-
(2010)
Financial IT and security and international symposium on computational electronics
-
-
Li, X.1
Ma, J.2
Wang, W.3
Xiong, Y.4
Zhang, J.5
-
27
-
-
84938960924
-
An enhancement of a smart card authentication scheme for multi-server architecture
-
Li, X., Niu, J., Kumari, S., Liao, J., & Liang, W. (2015). An enhancement of a smart card authentication scheme for multi-server architecture. Wireless Personal Communications, 80(1), 175–192. doi:10.1007/s11277-014-2002-x.
-
(2015)
Wireless Personal Communications
, vol.80
, Issue.1
, pp. 175-192
-
-
Li, X.1
Niu, J.2
Kumari, S.3
Liao, J.4
Liang, W.5
-
28
-
-
75449106985
-
Anonymity enhancement on robust and efficient password-authenticated key agreement using smart cards
-
Li, X., Qiu, W., Zheng, D., Chen, K., & Li, J. (2010). Anonymity enhancement on robust and efficient password-authenticated key agreement using smart cards. IEEE Transactions on Industrial Electronics, 57(2), 793–800. doi:10.1109/TIE.2009.2028351.
-
(2010)
IEEE Transactions on Industrial Electronics
, vol.57
, Issue.2
, pp. 793-800
-
-
Li, X.1
Qiu, W.2
Zheng, D.3
Chen, K.4
Li, J.5
-
29
-
-
84856217617
-
An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards
-
Li, X., Xiong, Y., Ma, J., & Wang, W. (2012). An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards. Journal of Network and Computer Applications, 35(2), 763–769. doi:10.1016/j.jnca.2011.11.009.
-
(2012)
Journal of Network and Computer Applications
, vol.35
, Issue.2
, pp. 763-769
-
-
Li, X.1
Xiong, Y.2
Ma, J.3
Wang, W.4
-
30
-
-
84870314409
-
A novel multi-server remote user authentication scheme using self-certified public keys for mobile clients
-
Liao, Y. P., & Hsiao, C. M. (2013). A novel multi-server remote user authentication scheme using self-certified public keys for mobile clients. Future Generation Computer Systems, 29(3), 886–900.
-
(2013)
Future Generation Computer Systems
, vol.29
, Issue.3
, pp. 886-900
-
-
Liao, Y.P.1
Hsiao, C.M.2
-
31
-
-
54449094667
-
A secure dynamic ID based remote user authentication scheme for multi-server environment
-
Liao, Y. P., & Wang, S. S. (2009). A secure dynamic ID based remote user authentication scheme for multi-server environment. Computer Standards and Interfaces, 31(1), 24–29. doi:10.1016/j.csi.2007.10.007.
-
(2009)
Computer Standards and Interfaces
, vol.31
, Issue.1
, pp. 24-29
-
-
Liao, Y.P.1
Wang, S.S.2
-
32
-
-
0037211327
-
A new remote user authentication scheme for multi-server architecture
-
Lin, I. C., Hwang, M. S., & Li, L. H. (2003). A new remote user authentication scheme for multi-server architecture. Future Generation Computer Systems, 19(1), 13–22. doi:10.1016/S0167-739X(02)00093-6.
-
(2003)
Future Generation Computer Systems
, vol.19
, Issue.1
, pp. 13-22
-
-
Lin, I.C.1
Hwang, M.S.2
Li, L.H.3
-
33
-
-
33750533142
-
An improved biohashing for human authentication
-
Lumini, A., & Nanni, L. (2007). An improved biohashing for human authentication. Pattern Recognition, 40(3), 1057–1065. doi:10.1016/j.patcog.2006.05.030.
-
(2007)
Pattern Recognition
, vol.40
, Issue.3
, pp. 1057-1065
-
-
Lumini, A.1
Nanni, L.2
-
34
-
-
85030330304
-
Reducing elliptic curve logarithms to logarithms in a finite field. In Proceedings of the twenty-third annual ACM symposium on theory of computing
-
Menezes, A., Vanstone, S., & Okamoto, T. (1991). Reducing elliptic curve logarithms to logarithms in a finite field. In Proceedings of the twenty-third annual ACM symposium on theory of computing, STOC ’91 (pp. 80–89). doi:10.1145/103418.103434.
-
(1991)
STOC ’91
, pp. 80-89
-
-
Menezes, A.1
Vanstone, S.2
Okamoto, T.3
-
35
-
-
0036566408
-
Examining smart-card security under the threat of power analysis attacks
-
Messerges, T. S., Dabbish, E. A., & Sloan, R. H. (2002). Examining smart-card security under the threat of power analysis attacks. IEEE Transactions on Computers, 51(5), 541–552.
-
(2002)
IEEE Transactions on Computers
, vol.51
, Issue.5
, pp. 541-552
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
-
36
-
-
84893698401
-
Robust smart card authentication scheme for multi-server architecture
-
Pippal, R., Jaidhar, C., & Tapaswi, S. (2013). Robust smart card authentication scheme for multi-server architecture. Wireless Personal Communications, 72(1), 729–745. doi:10.1007/s11277-013-1039-6.
-
(2013)
Wireless Personal Communications
, vol.72
, Issue.1
, pp. 729-745
-
-
Pippal, R.1
Jaidhar, C.2
Tapaswi, S.3
-
37
-
-
78650397518
-
-
Shao, M.H., & Chin, Y.C. (2010). A novel approach to dynamic ID-based remote user authentication scheme for multi-server environment. In Proceedings of the 2010 fourth international conference on network and system security, NSS ’10 (pp. 548–553). IEEE Computer Society, Washington, DC, USA.
-
Shao, M.H., & Chin, Y.C. (2010). A novel approach to dynamic ID-based remote user authentication scheme for multi-server environment. In Proceedings of the 2010 fourth international conference on network and system security, NSS ’10 (pp. 548–553). IEEE Computer Society, Washington, DC, USA. doi:10.1109/NSS.2010.95.
-
-
-
-
38
-
-
79251600218
-
-
Sood, S. K., Sarje, A. K., & Singh, K. (2011). A secure dynamic identity based authentication protocol for multi-server architecture. Journal of Network and Computer Applications, 34(2), 609–618. Efficient and Robust Security and Services of Wireless Mesh Networks.
-
Sood, S. K., Sarje, A. K., & Singh, K. (2011). A secure dynamic identity based authentication protocol for multi-server architecture. Journal of Network and Computer Applications, 34(2), 609–618. doi:10.1016/j.jnca.2010.11.011. Efficient and Robust Security and Services of Wireless Mesh Networks.
-
-
-
-
39
-
-
78649878863
-
New dynamic ID authentication scheme using smart cards
-
Tsai, J. L., Wu, T. C., & Tsai, K. Y. (2010). New dynamic ID authentication scheme using smart cards. International Journal of Communication Systems, 23(3), 1449–1462.
-
(2010)
International Journal of Communication Systems
, vol.23
, Issue.3
, pp. 1449-1462
-
-
Tsai, J.L.1
Wu, T.C.2
Tsai, K.Y.3
-
40
-
-
47949104161
-
A pairing-based user authentication scheme for wireless clients with smart card
-
Tseng, Y. M., Wu, T. Y., & Wu, J. (2008). A pairing-based user authentication scheme for wireless clients with smart card. Informatics, 19(2), 285–302.
-
(2008)
Informatics
, vol.19
, Issue.2
, pp. 285-302
-
-
Tseng, Y.M.1
Wu, T.Y.2
Wu, J.3
-
41
-
-
26844506188
-
-
Tsuar, W. J., Chang, C. C., & Wu, W. L. (2001). A flexible user authentication scheme for multi-server internet services. In Networking ICN 2001, lecture notes in computer science (vol. 2093, pp. 174–183). Springer, Berlin.
-
Tsuar, W. J., Chang, C. C., & Wu, W. L. (2001). A flexible user authentication scheme for multi-server internet services. In Networking ICN 2001, lecture notes in computer science (vol. 2093, pp. 174–183). Springer, Berlin. doi:10.1007/3-540-47728-4_18.
-
-
-
-
42
-
-
84901188390
-
A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the internet of things notion
-
Turkanovic, M., Brumen, B., & Hölbl, M. (2014). A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the internet of things notion. Ad Hoc Networks, 20, 96–112. doi:10.1016/j.adhoc.2014.03.009.
-
(2014)
Ad Hoc Networks
, vol.20
, pp. 96-112
-
-
Turkanovic, M.1
Brumen, B.2
Hölbl, M.3
-
43
-
-
84872324933
-
A smart card based efficient and secured multi-server authentication scheme
-
Wang, B., & Ma, M. (2013). A smart card based efficient and secured multi-server authentication scheme. Wireless Personal Communications, 68(2), 361–378. doi:10.1007/s11277-011-0456-7.
-
(2013)
Wireless Personal Communications
, vol.68
, Issue.2
, pp. 361-378
-
-
Wang, B.1
Ma, M.2
-
44
-
-
84903695746
-
Cryptanalysis and improvement of a robust smart card authentication scheme for multi-server architecture
-
Wei, J., Liu, W., & Hu, X. (2014). Cryptanalysis and improvement of a robust smart card authentication scheme for multi-server architecture. Wireless Personal Communications, 77(3), 2255–2269. doi:10.1007/s11277-014-1636-z.
-
(2014)
Wireless Personal Communications
, vol.77
, Issue.3
, pp. 2255-2269
-
-
Wei, J.1
Liu, W.2
Hu, X.3
-
45
-
-
64249125305
-
An improved smart card based password authentication scheme with provable security
-
Xu, J., Zhu, W. T., & Feng, D. G. (2009). An improved smart card based password authentication scheme with provable security. Computer Standards and Interfaces, 31(4), 723–728. doi:10.1016/j.csi.2008.09.006.
-
(2009)
Computer Standards and Interfaces
, vol.31
, Issue.4
, pp. 723-728
-
-
Xu, J.1
Zhu, W.T.2
Feng, D.G.3
-
46
-
-
85018131068
-
An efficient dynamic ID based remote user authentication scheme using self-certified public keys for multi-server environment
-
Zhao, D., Peng, H., Li, S., & Yang, Y. (2013) An efficient dynamic ID based remote user authentication scheme using self-certified public keys for multi-server environment. CoRR abs/1305.6350. http://arxiv.org/abs/1305.6350
-
(2013)
CoRR abs/1305
, pp. 6350
-
-
Zhao, D.1
Peng, H.2
Li, S.3
Yang, Y.4
|