-
1
-
-
84872108080
-
A privacy enhanced authentication scheme for telecare medical information systems
-
Jiang, Q., Ma, J., Ma, Z., and Li, G., A privacy enhanced authentication scheme for telecare medical information systems. J. Med. Syst. 37(1), 2013. doi:10.1007/s10916-012-9897-0.
-
(2013)
J. Med. Syst
, vol.37
, Issue.1
-
-
Jiang, Q.1
Ma, J.2
Ma, Z.3
Li, G.4
-
2
-
-
84867869987
-
An improved authentication scheme for telecare medicine information systems
-
PID: 22374237
-
Wei, J., Hu, X., and Liu, W., An improved authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3597–3604, 2012. doi:10.1007/s10916-012-9835-1.
-
(2012)
J. Med. Syst.
, vol.36
, Issue.6
, pp. 3597-3604
-
-
Wei, J.1
Hu, X.2
Liu, W.3
-
3
-
-
84873031582
-
An efficient key-management scheme for hierarchical access control in e-medicine system
-
PID: 21526333
-
Wu, S., and Chen, K., An efficient key-management scheme for hierarchical access control in e-medicine system. J. Med. Syst. 36(4):2325–2337, 2012.
-
(2012)
J. Med. Syst.
, vol.36
, Issue.4
, pp. 2325-2337
-
-
Wu, S.1
Chen, K.2
-
4
-
-
84929842561
-
A single round-trip sip authentication scheme for voice over internet protocol using smart card
-
http://dx.doi.org/10.1007/s11042-013-1807-z
-
Irshad, A., Sher, M., Rehman, E., Ch, S. A., Hassan, M. U., and Ghani, A., A single round-trip sip authentication scheme for voice over internet protocol using smart card. Multimedia Tools and Applications 74(11): 3967–3984, 2015. doi:10.1007/s11042-013-1807-z.
-
(2015)
Multimedia Tools and Applications
, vol.74
, Issue.11
, pp. 3967-3984
-
-
Irshad, A.1
Sher, M.2
Rehman, E.3
Ch, S.A.4
Hassan, M.U.5
Ghani, A.6
-
5
-
-
84866660545
-
An efficient key agreement with rekeying for secured body sensor networks
-
Mehmood, Z., uddin, N., Ch, S. A., Nasar, W., and Ghani, A., An efficient key agreement with rekeying for secured body sensor networks. In: Digital Information Processing and Communications (ICDIPC), 2012 Second International Conference on, IEEE, pp. 164–167, 2012.
-
(2012)
Digital Information Processing and Communications (ICDIPC), 2012 Second International Conference on, IEEE
, pp. 164-167
-
-
Mehmood, Z.1
uddin, N.2
Ch, S.A.3
Nasar, W.4
Ghani, A.5
-
6
-
-
74149091306
-
A new secure password authenticated key agreement scheme for sip using self-certified public keys on elliptic curves
-
Liao, Y.-P., and Wang, S.-S., A new secure password authenticated key agreement scheme for sip using self-certified public keys on elliptic curves. Comput. Commun. 33(3):372–380, 2010.
-
(2010)
Comput. Commun.
, vol.33
, Issue.3
, pp. 372-380
-
-
Liao, Y.-P.1
Wang, S.-S.2
-
7
-
-
84928814458
-
Comment on ‘robust and efficient password authenticated key agreement with user anonymity for session initiation protocol-based communications’
-
Chaudhry, S. A., Comment on ‘robust and efficient password authenticated key agreement with user anonymity for session initiation protocol-based communications’. IET Commun 9(1):1034–1034, 2015.
-
(2015)
IET Commun
, vol.9
, Issue.1
, pp. 1034
-
-
Chaudhry, S.A.1
-
8
-
-
84863110431
-
A., An authenticated key agreement with rekeying for secured body sensor networks based on hybrid cryptosystem
-
Ul Amin, N., Asad, M., Din, N., and Ch, S. A., An authenticated key agreement with rekeying for secured body sensor networks based on hybrid cryptosystem. In: Networking, Sensing and Control (ICNSC), 2012 9th IEEE International Conference on, IEEE, pp. 118–121, 2012.
-
(2012)
Networking, Sensing and Control (ICNSC), 2012 9th IEEE International Conference on, IEEE
, pp. 118-121
-
-
Ul Amin, N.1
Asad, M.2
Din, N.3
Ch, S.4
-
9
-
-
80051571433
-
An id-based client authentication with key agreement protocol for mobile client–server environment on ecc with provable security
-
Debiao, H., Jianhua, C., and Jin, H., An id-based client authentication with key agreement protocol for mobile client–server environment on ecc with provable security. Information Fusion 13(3):223–230, 2012.
-
(2012)
Information Fusion
, vol.13
, Issue.3
, pp. 223-230
-
-
Debiao, H.1
Jianhua, C.2
Jin, H.3
-
10
-
-
80052774690
-
A more efficient and secure id-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem
-
Islam, S., and Biswas, G., A more efficient and secure id-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. J. Syst. Softw. 84(11):1892–1898, 2011.
-
(2011)
J. Syst. Softw.
, vol.84
, Issue.11
, pp. 1892-1898
-
-
Islam, S.1
Biswas, G.2
-
11
-
-
84919914712
-
Cryptanalysis and improvement of authentication and key agreement protocols for telecare medicine information systems
-
Islam, S., and Khan, M., Cryptanalysis and improvement of authentication and key agreement protocols for telecare medicine information systems. J. Med. Syst. 38(10), 2014. doi:10.1007/s10916-014-0135-9.
-
(2014)
J. Med. Syst
, vol.38
, Issue.10
-
-
Islam, S.1
Khan, M.2
-
12
-
-
84953364637
-
S., Security analysis and enhancements of an improved authentication for session initiation protocol with provable security
-
Farash, M. S., Security analysis and enhancements of an improved authentication for session initiation protocol with provable security. Peer-to-Peer Networking and Applications,1–10, 2014. doi:10.1007/s12083-014-0315-x.
-
(2014)
Peer-to-Peer Networking and Applications
, pp. 1-10
-
-
Farash, M.1
-
13
-
-
84905565168
-
A secure and efficient identity-based authenticated key exchange protocol for mobile client–server networks
-
Farash, M. S., and Attari, M. A., A secure and efficient identity-based authenticated key exchange protocol for mobile client–server networks. J. Supercomput. 69(1):395–411, 2014.
-
(2014)
J. Supercomput.
, vol.69
, Issue.1
, pp. 395-411
-
-
Farash, M.S.1
Attari, M.A.2
-
14
-
-
84919909125
-
An efficient and robust rsa-based remote user authentication for telecare medical information systems
-
Giri, D., Maitra, T., Amin, R., and Srivastava, P., An efficient and robust rsa-based remote user authentication for telecare medical information systems. J. Med. Syst. 39(1), 2015. doi:10.1007/s10916-014-0145-7.
-
(2015)
J. Med. Syst
, vol.39
, Issue.1
-
-
Giri, D.1
Maitra, T.2
Amin, R.3
Srivastava, P.4
-
15
-
-
84902778355
-
An enhanced and secure three-party password-based authenticated key exchange protocol without using server’s public-keys and symmetric cryptosystems
-
Farash, M. S., and Attari, M. A., An enhanced and secure three-party password-based authenticated key exchange protocol without using server’s public-keys and symmetric cryptosystems. Information Technology And Control 43 (2):143–150, 2014.
-
(2014)
Information Technology And Control
, vol.43
, Issue.2
, pp. 143-150
-
-
Farash, M.S.1
Attari, M.A.2
-
16
-
-
85006172493
-
S., An improved password-based authentication scheme for session initiation protocol using smart cards without verification table. Int. J. Commun
-
Farash, M. S., An improved password-based authentication scheme for session initiation protocol using smart cards without verification table. Int. J. Commun. Syst., 2014. doi:10.1002/dac.2879.
-
(2014)
Syst.
-
-
Farash, M.1
-
17
-
-
84902266968
-
An efficient and provably secure three-party password-based authenticated key exchange protocol based on chebyshev chaotic maps
-
Farash, M. S., and Attari, M. A., An efficient and provably secure three-party password-based authenticated key exchange protocol based on chebyshev chaotic maps. Nonlinear Dyn. 77(1-2):399–411, 2014.
-
(2014)
Nonlinear Dyn.
, vol.77
, Issue.1-2
, pp. 399-411
-
-
Farash, M.S.1
Attari, M.A.2
-
18
-
-
84904860928
-
A secure authentication scheme for session initiation protocol by using ecc on the basis of the tang and liu scheme
-
http://dx.doi.org/10.1002/sec.834
-
Irshad, A., Sher, M., Faisal, M. S., Ghani, A., Ul Hassan, M., and Ch, S. A., A secure authentication scheme for session initiation protocol by using ecc on the basis of the tang and liu scheme. Secur. Commun. Netw. 7(8):1210–1218, 2014. doi:10.1002/sec.834.
-
(2014)
Secur. Commun. Netw.
, vol.7
, Issue.8
, pp. 1210-1218
-
-
Irshad, A.1
Sher, M.2
Faisal, M.S.3
Ghani, A.4
Ul Hassan, M.5
Ch, S.A.6
-
19
-
-
85010422698
-
K., A lightweight anonymous authentication scheme for consumer roaming in ubiquitous networks with provable security. Int. J. Commun
-
Farash, M. S., Chaudhry, S. A., Heydari, M., Sajad Sadough, S. M., Kumari, S., and Khan, M. K., A lightweight anonymous authentication scheme for consumer roaming in ubiquitous networks with provable security. Int. J. Commun. Syst., 2015. doi:10.1002/dac.3019.
-
(2015)
Syst.
-
-
Farash, M.S.1
Chaudhry, S.A.2
Heydari, M.3
Sajad Sadough, S.M.4
Kumari, S.5
Khan, M.6
-
20
-
-
84925507784
-
An efficient signcryption scheme with forward secrecy and public verifiability based on hyper elliptic curve cryptography
-
Ch, S. A., Uddin, N., Sher, M., Ghani, A., Naqvi, H., and Irshad, A., An efficient signcryption scheme with forward secrecy and public verifiability based on hyper elliptic curve cryptography. Multimedia Tools and Applications 74(5):1711–1723, 2015. doi:10.1007/s11042-014-2283-9.
-
(2015)
Multimedia Tools and Applications
, vol.74
, Issue.5
, pp. 1711-1723
-
-
Ch, S.A.1
Uddin, N.2
Sher, M.3
Ghani, A.4
Naqvi, H.5
Irshad, A.6
-
21
-
-
84864061174
-
A secure authentication scheme for telecare medicine information systems
-
PID: 20978928
-
Wu, Z.-Y., Lee, Y.-C., Lai, F., Lee, H.-C., and Chung, Y., A secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1529–1535, 2012. doi:10.1007/s10916-010-9614-9.
-
(2012)
J. Med. Syst.
, vol.36
, Issue.3
, pp. 1529-1535
-
-
Wu, Z.-Y.1
Lee, Y.-C.2
Lai, F.3
Lee, H.-C.4
Chung, Y.5
-
22
-
-
84864058187
-
A more secure authentication scheme for telecare medicine information systems
-
PID: 21360017
-
Debiao, H., Jianhua, C., and Rui, Z., A more secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1989–1995, 2012. doi:10.1007/s10916-011-9658-5.
-
(2012)
J. Med. Syst.
, vol.36
, Issue.3
, pp. 1989-1995
-
-
Debiao, H.1
Jianhua, C.2
Rui, Z.3
-
23
-
-
84867843422
-
An efficient authentication scheme for telecare medicine information systems
-
PID: 22527784
-
Zhu, Z., An efficient authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6): 3833–3838, 2012. doi:10.1007/s10916-012-9856-9.
-
(2012)
J. Med. Syst.
, vol.36
, Issue.6
, pp. 3833-3838
-
-
Zhu, Z.1
-
24
-
-
84928669844
-
An improved anonymous authentication scheme for telecare medical information systems
-
Wen, F., and Guo, D., An improved anonymous authentication scheme for telecare medical information systems. J. Med. Syst. 36(5):1–11, 2015. doi:10.1007/s10916-015-0244-0.
-
(2015)
J. Med. Syst.
, vol.36
, Issue.5
, pp. 1-11
-
-
Wen, F.1
Guo, D.2
-
25
-
-
84891784504
-
A secure and efficient authentication and key agreement scheme based on ecc for telecare medicine information systems
-
Xu, X., Zhu, P., Wen, Q., Jin, Z., Zhang, H., and He, L., A secure and efficient authentication and key agreement scheme based on ecc for telecare medicine information systems. J. Med. Syst. 38(1):1–7, 2013.
-
(2013)
J. Med. Syst.
, vol.38
, Issue.1
, pp. 1-7
-
-
Xu, X.1
Zhu, P.2
Wen, Q.3
Jin, Z.4
Zhang, H.5
He, L.6
-
26
-
-
84928669844
-
-
Chaudhry, S. A., Naqvi, H., Shon, T., Sher, M., and Farash, M. S., Cryptanalysis and improvement of an improved two factor authentication protocol for telecare medical information systems. J. Med. Syst. 39(6)
-
Chaudhry, S. A., Naqvi, H., Shon, T., Sher, M., and Farash, M. S., Cryptanalysis and improvement of an improved two factor authentication protocol for telecare medical information systems. J. Med. Syst. 39(6).
-
-
-
-
27
-
-
84883251252
-
Cryptanalysis and improvement of a privacy enhanced scheme for telecare medical information systems
-
Kumari, S., Khan, M. K., and Kumar, R., Cryptanalysis and improvement of a privacy enhanced scheme for telecare medical information systems. J. Med. Syst. 37(4), 2013. doi:10.1007/s10916-013-9952-5.
-
(2013)
J. Med. Syst
, vol.37
, Issue.4
-
-
Kumari, S.1
Khan, M.K.2
Kumar, R.3
-
28
-
-
84893037497
-
Cryptanalysis and improvement of an efficient and secure dynamic id-based authentication scheme for telecare medical information systems
-
Khan, M. K., and Kumari, S., Cryptanalysis and improvement of an efficient and secure dynamic id-based authentication scheme for telecare medical information systems. Secur. Commun. Netw. 7(2):399–408, 2014. doi:10.1002/sec.791.
-
(2014)
Secur. Commun. Netw.
, vol.7
, Issue.2
, pp. 399-408
-
-
Khan, M.K.1
Kumari, S.2
-
29
-
-
0036566408
-
Examining smart-card security under the threat of power analysis attacks
-
Messerges, T. S., Dabbish, E. A., and Sloan, R. H., Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Comput. 51(5):541–552, 2002.
-
(2002)
IEEE Trans. Comput.
, vol.51
, Issue.5
, pp. 541-552
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
-
30
-
-
84939573910
-
Differential power analysis
-
Kocher, P., Jaffe, J., and Jun, B., Differential power analysis. In: Advances in Cryptology CRYPTO 99, Springer, pp. 388–397 (1999)
-
(1999)
Advances in Cryptology CRYPTO 99, Springer
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
31
-
-
70349792182
-
An efficient biometrics-based remote user authentication scheme using smart cards
-
Li, C.-T., and Hwang, M.-S., An efficient biometrics-based remote user authentication scheme using smart cards. J. Netw. Comput. Appl. 33(1):1–5, 2010.
-
(2010)
J. Netw. Comput. Appl.
, vol.33
, Issue.1
, pp. 1-5
-
-
Li, C.-T.1
Hwang, M.-S.2
-
32
-
-
84919951345
-
Robust biometrics-based authentication scheme for multiserver environment
-
He, D., and Wang, D., Robust biometrics-based authentication scheme for multiserver environment. IEEE Syst. J. 4(1):253–264, 2014.
-
(2014)
IEEE Syst. J.
, vol.4
, Issue.1
, pp. 253-264
-
-
He, D.1
Wang, D.2
-
33
-
-
84904039251
-
Cryptanalysis and improvement of Yan et al.’s biometric-based authentication scheme for telecare medicine information systems
-
Mishra, D., Mukhopadhyay, S., Chaturvedi, A., Kumari, S., and Khan, M. K., Cryptanalysis and improvement of Yan et al.’s biometric-based authentication scheme for telecare medicine information systems. J. Med. Syst. 38 (6):1–12, 2014.
-
(2014)
J. Med. Syst.
, vol.38
, Issue.6
, pp. 1-12
-
-
Mishra, D.1
Mukhopadhyay, S.2
Chaturvedi, A.3
Kumari, S.4
Khan, M.K.5
-
34
-
-
84919949740
-
Secure privacy-preserving biometric authentication scheme for telecare medicine information systems
-
COI: 1:CAS:528:DC%2BC2cXps1Ontr4%3D
-
Li, X., Wen, Q., Li, W., Zhang, H., and Jin, Z., Secure privacy-preserving biometric authentication scheme for telecare medicine information systems. J. Med. Syst. 38(11):1–8, 2014.
-
(2014)
J. Med. Syst.
, vol.38
, Issue.11
, pp. 1-8
-
-
Li, X.1
Wen, Q.2
Li, W.3
Zhang, H.4
Jin, Z.5
-
35
-
-
67549132170
-
Fingerprint biometric-based self-authentication and deniable authentication schemes for the electronic world
-
Khan, M. K., Fingerprint biometric-based self-authentication and deniable authentication schemes for the electronic world. IETE Tech. Rev. 26(3):191–195, 2009.
-
(2009)
IETE Tech. Rev.
, vol.26
, Issue.3
, pp. 191-195
-
-
Khan, M.K.1
-
36
-
-
33745634868
-
An efficient and practical fingerprint-based remote user authentication scheme with smart cards
-
Khan, M. K., and Zhang, J., An efficient and practical fingerprint-based remote user authentication scheme with smart cards. In: Information Security Practice and Experience, Springer, pp. 260–268 (2006)
-
(2006)
Information Security Practice and Experience, Springer
, pp. 260-268
-
-
Khan, M.K.1
Zhang, J.2
-
37
-
-
84932615516
-
A secure three-factor user authentication and key agreement protocol for tmis with user anonymity
-
Amin, R., and Biswas, G., A secure three-factor user authentication and key agreement protocol for tmis with user anonymity. J. Med. Syst. 39(8):1–19, 2015.
-
(2015)
J. Med. Syst.
, vol.39
, Issue.8
, pp. 1-19
-
-
Amin, R.1
Biswas, G.2
-
38
-
-
84933506630
-
An improved RSA based user authentication and session key agreement protocol usable in TMIS
-
Amin, R., and Biswas, G., An improved RSA based user authentication and session key agreement protocol usable in TMIS. J. Med. Syst. 39(8):1–14, 2015.
-
(2015)
J. Med. Syst.
, vol.39
, Issue.8
, pp. 1-14
-
-
Amin, R.1
Biswas, G.2
-
39
-
-
84923296566
-
A novel user authentication and key agreement protocol for accessing multi-medical server usable in TMIS
-
Amin, R., and Biswas, G., A novel user authentication and key agreement protocol for accessing multi-medical server usable in TMIS. J. Med. Syst. 39(3):1–17, 2015.
-
(2015)
J. Med. Syst.
, vol.39
, Issue.3
, pp. 1-17
-
-
Amin, R.1
Biswas, G.2
-
40
-
-
84881359003
-
A biometric authentication scheme for telecare medicine information systems with nonce
-
Awasthi, A. K., and Srivastava, K., A biometric authentication scheme for telecare medicine information systems with nonce. J. Med. Syst. 37(5):1–4, 2013.
-
(2013)
J. Med. Syst.
, vol.37
, Issue.5
, pp. 1-4
-
-
Awasthi, A.K.1
Srivastava, K.2
-
41
-
-
84898905921
-
A user anonymity preserving three-factor authentication scheme for telecare medicine information systems
-
Tan, Z., A user anonymity preserving three-factor authentication scheme for telecare medicine information systems. J. Med. Syst. 38(3):1–9, 2014.
-
(2014)
J. Med. Syst.
, vol.38
, Issue.3
, pp. 1-9
-
-
Tan, Z.1
-
42
-
-
84919928059
-
Three-factor anonymous authentication and key agreement scheme for telecare medicine information systems
-
Arshad, H., and Nikooghadam, M., Three-factor anonymous authentication and key agreement scheme for telecare medicine information systems. J. Med. Syst. 38(12):1–12, 2014.
-
(2014)
J. Med. Syst.
, vol.38
, Issue.12
, pp. 1-12
-
-
Arshad, H.1
Nikooghadam, M.2
-
43
-
-
84923090025
-
An enhanced biometric-based authentication scheme for telecare medicine information systems using elliptic curve cryptosystem
-
Lu, Y., Li, L., Peng, H., and Yang, Y., An enhanced biometric-based authentication scheme for telecare medicine information systems using elliptic curve cryptosystem. J. Med. Syst. 39(3):1–8, 2015.
-
(2015)
J. Med. Syst.
, vol.39
, Issue.3
, pp. 1-8
-
-
Lu, Y.1
Li, L.2
Peng, H.3
Yang, Y.4
-
44
-
-
12344259813
-
Biohashing: two factor authentication featuring fingerprint data and tokenised random number
-
Jin, A. T. B., Ling, D. N. C., and Goh, A., Biohashing: two factor authentication featuring fingerprint data and tokenised random number. Pattern Recogn. 37(11):2245–2255, 2004.
-
(2004)
Pattern Recogn.
, vol.37
, Issue.11
, pp. 2245-2255
-
-
Jin, A.T.B.1
Ling, D.N.C.2
Goh, A.3
-
45
-
-
33750533142
-
An improved biohashing for human authentication
-
Lumini, A., and Nanni, L., An improved biohashing for human authentication. Pattern Recogn. 40(3): 1057–1065, 2007.
-
(2007)
Pattern Recogn.
, vol.40
, Issue.3
, pp. 1057-1065
-
-
Lumini, A.1
Nanni, L.2
-
46
-
-
84904066086
-
A remote cancelable palmprint authentication protocol based on multi-directional two-dimensional palmphasor-fusion
-
Leng, L., Teoh, A. B. J., Li, M., and Khan, M. K., A remote cancelable palmprint authentication protocol based on multi-directional two-dimensional palmphasor-fusion. Secur. Commun. Netw. 7(11):1860–1871, 2014.
-
(2014)
Secur. Commun. Netw.
, vol.7
, Issue.11
, pp. 1860-1871
-
-
Leng, L.1
Teoh, A.B.J.2
Li, M.3
Khan, M.K.4
-
47
-
-
84925674999
-
Alignment-free row-co-occurrence cancelable palmprint fuzzy vault
-
Leng, L., and Teoh, A. B. J., Alignment-free row-co-occurrence cancelable palmprint fuzzy vault. Pattern Recogn. 48(7):2290–2303, 2015.
-
(2015)
Pattern Recogn.
, vol.48
, Issue.7
, pp. 2290-2303
-
-
Leng, L.1
Teoh, A.B.J.2
-
48
-
-
84901726882
-
Security enhancement of a biometric based authentication scheme for telecare medicine information systems with nonce
-
Mishra, D., Mukhopadhyay, S., Kumari, S., Khan, M. K., and Chaturvedi, A., Security enhancement of a biometric based authentication scheme for telecare medicine information systems with nonce. J. Med. Syst. 38(5):1–11, 2014.
-
(2014)
J. Med. Syst.
, vol.38
, Issue.5
, pp. 1-11
-
-
Mishra, D.1
Mukhopadhyay, S.2
Kumari, S.3
Khan, M.K.4
Chaturvedi, A.5
-
49
-
-
51849131973
-
On the power of power analysis in the real world: A complete break of the keeloq code hopping scheme
-
Wagner D, (ed), Springer, Berlin Heidelberg: http://dx.doi.org/10.1007/978-3-540-85174-5∖_12
-
Eisenbarth, T., Kasper, T., Moradi, A., Paar, C., Salmasizadeh, M., and Shalmani, M., On the power of power analysis in the real world: A complete break of the keeloq code hopping scheme. In: Wagner, D. (Ed.) Advances in Cryptology, CRYPTO 2008, Vol. 5157 of Lecture Notes in Computer Science, pp. 203–220. Berlin Heidelberg: Springer, 2008. doi:10.1007/978-3-540-85174-5_12
-
(2008)
Advances in Cryptology, CRYPTO 2008, Vol. 5157 of Lecture Notes in Computer Science
, pp. 203-220
-
-
Eisenbarth, T.1
Kasper, T.2
Moradi, A.3
Paar, C.4
Salmasizadeh, M.5
Shalmani, M.6
-
50
-
-
84940945644
-
An improved and provably secure privacy preserving authentication protocol for SIP
-
Chaudhry, S. A., Naqvi, H., Sher, M., Farash, M. S., and ul Hassan, M., An improved and provably secure privacy preserving authentication protocol for SIP. Peer-to-Peer Networking and Applications, 2015. doi:10.1007/s12083-015-0400-9.
-
(2015)
Peer-to-Peer Networking and Applications
-
-
Chaudhry, S.A.1
Naqvi, H.2
Sher, M.3
Farash, M.S.4
ul Hassan, M.5
-
51
-
-
84941712425
-
K., An improved smart card based authentication scheme for session initiation protocol
-
Kumari, S., Chaudhry, S. A., Wu, F., Li, X., Farash, M. S., and Khan, M. K., An improved smart card based authentication scheme for session initiation protocol. Peer-to-Peer Networking and Applications, 2015. doi:10.1007/s12083-015-0409-0.
-
(2015)
Peer-to-Peer Networking and Applications
-
-
Kumari, S.1
Chaudhry, S.A.2
Wu, F.3
Li, X.4
Farash, M.S.5
Khan, M.6
-
52
-
-
0020720357
-
On the security of public key protocols
-
Dolev, D., and Yao, A. C., On the security of public key protocols. IEEE Trans. Inf. Theory 29(2):198–208, 1983.
-
(1983)
IEEE Trans. Inf. Theory
, vol.29
, Issue.2
, pp. 198-208
-
-
Dolev, D.1
Yao, A.C.2
-
53
-
-
33747592366
-
Breaking a remote user authentication scheme for multi-server architecture
-
Cao, X., and Zhong, S., Breaking a remote user authentication scheme for multi-server architecture. IEEE Commun. Lett. 10(8):580–581, 2006.
-
(2006)
IEEE Commun. Lett.
, vol.10
, Issue.8
, pp. 580-581
-
-
Cao, X.1
Zhong, S.2
-
54
-
-
70350241650
-
Models and proofs of protocol security: A progress report
-
Abadi, M., Blanchet, B., and Comon-Lundh, H., Models and proofs of protocol security: A progress report. In: Computer Aided Verification, Springer, pp. 35–49, 2009.
-
(2009)
Computer Aided Verification, Springer
, pp. 35-49
-
-
Abadi, M.1
Blanchet, B.2
Comon-Lundh, H.3
-
55
-
-
84958043300
-
A secure and efficient authenticated encryption for electronic payment systems using elliptic curve cryptography
-
Chaudhry, S. A., Farash, M. S., Naqvi, H., and Sher, M., A secure and efficient authenticated encryption for electronic payment systems using elliptic curve cryptography. Electron. Commer. Res., 1–27, 2015. doi:10.1007/s10660-015-9192-5.
-
(2015)
Electron. Commer. Res.
, pp. 1-27
-
-
Chaudhry, S.A.1
Farash, M.S.2
Naqvi, H.3
Sher, M.4
-
56
-
-
84933564535
-
K., An enhanced privacy preserving remote user authentication scheme with provable security
-
Chaudhry, S. A., Farash, M. S., Naqvi, H., Kumari, S., and Khan, M. K., An enhanced privacy preserving remote user authentication scheme with provable security. Secur. Commun. Netw., 1–13, 2015. doi:10.1002/sec.1299.
-
(2015)
Secur. Commun. Netw.
, pp. 1-13
-
-
Chaudhry, S.A.1
Farash, M.S.2
Naqvi, H.3
Kumari, S.4
Khan, M.5
-
57
-
-
84904544082
-
Anonymous three-party password-authenticated key exchange scheme for telecare medical information systems
-
PID: 25047235
-
Xie, Q., Hu, B., Dong, N., and Wong, D. S., Anonymous three-party password-authenticated key exchange scheme for telecare medical information systems. PloS one 9(7):e102747, 2014.
-
(2014)
PloS one
, vol.9
, Issue.7
, pp. e102747
-
-
Xie, Q.1
Hu, B.2
Dong, N.3
Wong, D.S.4
|