-
1
-
-
0025386404
-
A logic of authentication
-
Burrows, M., Abadi, M., Needham, R., A logic of authentication. ACM Trans. Comput. Syst. 8(1):18–36, 1990.
-
(1990)
ACM Trans. Comput. Syst.
, vol.8
, Issue.1
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
2
-
-
46749130059
-
A novel mutual authentication scheme based on quadratic residues for RFID systems
-
Chen, Y., Chou, J.S., Sun, H.M., A novel mutual authentication scheme based on quadratic residues for RFID systems. Computer Networks 52(12):2373–2380, 2008.
-
(2008)
Computer Networks
, vol.52
, Issue.12
, pp. 2373-2380
-
-
Chen, Y.1
Chou, J.S.2
Sun, H.M.3
-
3
-
-
84922455207
-
A secure and robust password-based remote user authentication scheme using smart cards for the integrated EPR information system
-
PID: 25666924
-
Das, A.K., A secure and robust password-based remote user authentication scheme using smart cards for the integrated EPR information system. Journal of Medical Systems 39(3):25, 2015.
-
(2015)
Journal of Medical Systems
, vol.39
, Issue.3
, pp. 25
-
-
Das, A.K.1
-
4
-
-
84916883747
-
A variable threshold-value authentication architecture for wireless mesh networks
-
Guo, P., Wang, J., Li, B., Lee, S., A variable threshold-value authentication architecture for wireless mesh networks. Journal of Internet Technology 15(6):929–936, 2014.
-
(2014)
Journal of Internet Technology
, vol.15
, Issue.6
, pp. 929-936
-
-
Guo, P.1
Wang, J.2
Li, B.3
Lee, S.4
-
5
-
-
84872265840
-
A chaotic map-based authentication scheme for telecare medicine information systems
-
PID: 23334801
-
Hao, X., Wang, J., Yang, Q., Yan, X., Li, P., A chaotic map-based authentication scheme for telecare medicine information systems. Journal of Medical Systems 37(2):9919, 2013.
-
(2013)
Journal of Medical Systems
, vol.37
, Issue.2
, pp. 9919
-
-
Hao, X.1
Wang, J.2
Yang, Q.3
Yan, X.4
Li, P.5
-
6
-
-
84895056653
-
Cryptanalysis and improvement of an anonymous authentication protocol for wireless access networks
-
He, D., Zhang, Y., Chen, J., Cryptanalysis and improvement of an anonymous authentication protocol for wireless access networks. Wirel. Pers. Commun. 74(2):229–243, 2014.
-
(2014)
Wirel. Pers. Commun.
, vol.74
, Issue.2
, pp. 229-243
-
-
He, D.1
Zhang, Y.2
Chen, J.3
-
7
-
-
84936743193
-
Lightweight ECC based RFID authentication integrated with an ID verifier transfer protocol
-
PID: 25096968
-
He, D., Kumar, N., Chilamkurti, N., Lee, J.H., Lightweight ECC based RFID authentication integrated with an ID verifier transfer protocol. Journal of Medical Systems 38(10):116, 2014.
-
(2014)
Journal of Medical Systems
, vol.38
, Issue.10
, pp. 116
-
-
He, D.1
Kumar, N.2
Chilamkurti, N.3
Lee, J.H.4
-
8
-
-
84935865949
-
-
N.: A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks. Inf. Sci.
-
He, D., Kumar, N., Chilamkurti, N., A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks. Inf. Sci., 2015. doi:10.1016/j.ins.2015.02.010.
-
(2015)
Chilamkurti
-
-
He, D.1
Kumar, N.2
-
9
-
-
84921481484
-
Authentication protocol for ambient assisted living system
-
He, D., and Zeadally, S., Authentication protocol for ambient assisted living system. IEEE Commun. Mag. 35(1):71–77, 2015.
-
(2015)
IEEE Commun. Mag.
, vol.35
, Issue.1
, pp. 71-77
-
-
He, D.1
Zeadally, S.2
-
10
-
-
84893187211
-
Robust chaotic map-based authentication and key agreement scheme with strong anonymity for telecare medicine information systems
-
PID: 24493073
-
Jiang, Q., Ma, J., Lu, X., Tian, Y., Robust chaotic map-based authentication and key agreement scheme with strong anonymity for telecare medicine information systems. Journal of Medical Systems 38(2):12, 2014.
-
(2014)
Journal of Medical Systems
, vol.38
, Issue.2
, pp. 12
-
-
Jiang, Q.1
Ma, J.2
Lu, X.3
Tian, Y.4
-
12
-
-
84875510914
-
A secure and efficient password-based user authentication scheme using smart cards for the integrated EPR information system
-
PID: 23553734
-
Lee, T.F., Chang, I.P., Lin, T.H., Wang, C.C., A secure and efficient password-based user authentication scheme using smart cards for the integrated EPR information system. J. Med. Syst. 37(3):9941, 2013.
-
(2013)
J. Med. Syst.
, vol.37
, Issue.3
, pp. 9941
-
-
Lee, T.F.1
Chang, I.P.2
Lin, T.H.3
Wang, C.C.4
-
13
-
-
70349792182
-
An efficient biometrics-based remote user authentication scheme using smart cards
-
Li, C.T., and Hwang, M.S., An efficient biometrics-based remote user authentication scheme using smart cards. J. Netw. Comput. Appl. 33(1):1–5, 2010.
-
(2010)
J. Netw. Comput. Appl.
, vol.33
, Issue.1
, pp. 1-5
-
-
Li, C.T.1
Hwang, M.S.2
-
14
-
-
80053379375
-
A robust remote user authentication scheme using smart card
-
Li, C.T., and Lee, C.C., A robust remote user authentication scheme using smart card. Information Technology and Control 40(3):236–245, 2011.
-
(2011)
Information Technology and Control
, vol.40
, Issue.3
, pp. 236-245
-
-
Li, C.T.1
Lee, C.C.2
-
15
-
-
82755189733
-
A novel user authentication and privacy preserving scheme with smart cards for wireless communications
-
Li, C.T., and Lee, C.C., A novel user authentication and privacy preserving scheme with smart cards for wireless communications. Math. Comput. Model. 55(1-2):35–44, 2012.
-
(2012)
Math. Comput. Model.
, vol.55
, Issue.1-2
, pp. 35-44
-
-
Li, C.T.1
Lee, C.C.2
-
16
-
-
84888642495
-
An extended chaotic maps based user authentication and privacy preserving scheme against DoS attacks in pervasive and ubiquitous computing environments
-
Li, C.T., Lee, C.C., Weng, C.Y., An extended chaotic maps based user authentication and privacy preserving scheme against DoS attacks in pervasive and ubiquitous computing environments. Nonlinear Dynamics 74(4):1133–1143, 2013.
-
(2013)
Nonlinear Dynamics
, vol.74
, Issue.4
, pp. 1133-1143
-
-
Li, C.T.1
Lee, C.C.2
Weng, C.Y.3
-
17
-
-
84905560609
-
A secure chaotic maps and smart cards based password authentication and key agreement scheme with user anonymity for telecare medicine information systems
-
PID: 24997858
-
Li, C.T., Lee, C.C., Weng, C.Y., A secure chaotic maps and smart cards based password authentication and key agreement scheme with user anonymity for telecare medicine information systems. Journal of Medical Systems 38(9):77, 2014.
-
(2014)
Journal of Medical Systems
, vol.38
, Issue.9
, pp. 77
-
-
Li, C.T.1
Lee, C.C.2
Weng, C.Y.3
-
18
-
-
84935850541
-
A secure RFID tag authentication protocol with privacy preserving in telecare medicine information systems
-
PID: 26084587
-
Li, C.T., Weng, C.Y., Lee, C.C., A secure RFID tag authentication protocol with privacy preserving in telecare medicine information systems. J. Med. Syst. 39(8):77, 2015.
-
(2015)
J. Med. Syst.
, vol.39
, Issue.8
, pp. 77
-
-
Li, C.T.1
Weng, C.Y.2
Lee, C.C.3
-
19
-
-
84939958429
-
An extended chaotic maps based keyword search scheme over encrypted data resist outside and inside keyword guessing attacks in cloud storage services
-
Li, C.T., Lee, C.W., Shen, J.J., An extended chaotic maps based keyword search scheme over encrypted data resist outside and inside keyword guessing attacks in cloud storage services. Nonlinear Dynamics 80(3):1601–1611, 2015.
-
(2015)
Nonlinear Dynamics
, vol.80
, Issue.3
, pp. 1601-1611
-
-
Li, C.T.1
Lee, C.W.2
Shen, J.J.3
-
20
-
-
84909998552
-
Group rekeying in wireless sensor networks: a survey
-
Li, W.T., Ling, C.H., Hwang, M.S., Group rekeying in wireless sensor networks: a survey. International Journal of Network Security 16(6):401–410, 2014.
-
(2014)
International Journal of Network Security
, vol.16
, Issue.6
, pp. 401-410
-
-
Li, W.T.1
Ling, C.H.2
Hwang, M.S.3
-
21
-
-
33748126252
-
A password authentication scheme over insecure networks
-
Liao, I.E., Lee, C.C., Hwang, M.S., A password authentication scheme over insecure networks. J. Comput. Syst. Sci. 72(4):727–740, 2006.
-
(2006)
J. Comput. Syst. Sci.
, vol.72
, Issue.4
, pp. 727-740
-
-
Liao, I.E.1
Lee, C.C.2
Hwang, M.S.3
-
22
-
-
0036566408
-
Examining smart-card security under the threat of power analysis attacks
-
Messerges, T.S., Dabbish, E.A., Sloan, R.H., Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Commun. 51(5):541–552, 2002.
-
(2002)
IEEE Trans. Commun.
, vol.51
, Issue.5
, pp. 541-552
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
-
23
-
-
84858212560
-
An efficient password authentication scheme for smart card
-
Ramasamy, R., and Muniyandi, A.P., An efficient password authentication scheme for smart card. International Journal of Network Security 14(3):180–186, 2012.
-
(2012)
International Journal of Network Security
, vol.14
, Issue.3
, pp. 180-186
-
-
Ramasamy, R.1
Muniyandi, A.P.2
-
24
-
-
84941300436
-
-
RFC 2104 − HMAC. Keyed-hashing for message authentication. 〈〉
-
RFC 2104 − HMAC. Keyed-hashing for message authentication. 〈http://www.ietf.org/rfc/rfc2104.txt〉
-
-
-
-
25
-
-
84922323888
-
A novel routing protocol providing good transmission reliability in underwater sensor networks
-
Shen, J., Tan, H., Wang, J., Wang, J., Lee, S., A novel routing protocol providing good transmission reliability in underwater sensor networks. Journal of Internet Technology 16 (1):171–178, 2015.
-
(2015)
Journal of Internet Technology
, vol.16
, Issue.1
, pp. 171-178
-
-
Shen, J.1
Tan, H.2
Wang, J.3
Wang, J.4
Lee, S.5
-
26
-
-
84901732410
-
A more secure anonymous user authentication scheme for the integrated EPR information system
-
PID: 24760224
-
Wen, F., A more secure anonymous user authentication scheme for the integrated EPR information system. J. Med. Syst. 38:42, 2014.
-
(2014)
J. Med. Syst.
, vol.38
, pp. 42
-
-
Wen, F.1
-
27
-
-
84863200393
-
A password-based user authentication scheme for the integrated EPR information system
-
PID: 20703670
-
Wu, Z.Y., Chung, Y.F., Lai, F., Chen, T.S., A password-based user authentication scheme for the integrated EPR information system. J. Med. Syst. 36(2):631–638, 2012.
-
(2012)
J. Med. Syst.
, vol.36
, Issue.2
, pp. 631-638
-
-
Wu, Z.Y.1
Chung, Y.F.2
Lai, F.3
Chen, T.S.4
-
28
-
-
84856430473
-
Security improvement on an anonymous key agreement protocol based on chaotic maps
-
Xue, K., and Hong, P., Security improvement on an anonymous key agreement protocol based on chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 17(7):29691V2977, 2012.
-
(2012)
Commun. Nonlinear Sci. Numer. Simul.
, vol.17
, Issue.7
, pp. 29691V2977
-
-
Xue, K.1
Hong, P.2
-
29
-
-
84863285679
-
Mutual authentication scheme with smart cards and password under trusted computing
-
Yang, L., Ma, J.F., Jiang, Q., Mutual authentication scheme with smart cards and password under trusted computing. International Journal of Network Security 14(3):156–163, 2012.
-
(2012)
International Journal of Network Security
, vol.14
, Issue.3
, pp. 156-163
-
-
Yang, L.1
Ma, J.F.2
Jiang, Q.3
-
30
-
-
78751649779
-
Improvement of the RFID authentication scheme based on quadratic residues
-
Yeh, T.C., Wu, C.H., Tseng, Y.M., Improvement of the RFID authentication scheme based on quadratic residues. Comput. Commun. 34(3):337–341, 2011.
-
(2011)
Comput. Commun.
, vol.34
, Issue.3
, pp. 337-341
-
-
Yeh, T.C.1
Wu, C.H.2
Tseng, Y.M.3
|