-
1
-
-
80054070102
-
New real time multicast authentication
-
R. Abdellatif, H. K. Aslan, and S. H. Elramly, "New real time multicast authentication", International Journal of Network Security, Vol. 12, 2011, pp. 13-20.
-
(2011)
International Journal of Network Security
, vol.12
, pp. 13-20
-
-
Abdellatif, R.1
Aslan, H.K.2
Elramly, S.H.3
-
2
-
-
0025386404
-
A logic of authentication
-
M. Burrows, M. Abadi, and R. Needham, "A logic of authentication", ACM Transactions Computer Systems, Vol. 8, 1990, pp. 8-36.
-
(1990)
ACM Transactions Computer Systems
, vol.8
, pp. 8-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
4
-
-
84891602863
-
An efficient smart card based authentication scheme using image encryption
-
C. C. Chang, H. L. Wu, Z. H. Wang, and Q. Mao, "An efficient smart card based authentication scheme using image encryption", Journal of Information Science and Engineering, Vol. 29, 2013, pp. 1135-1150.
-
(2013)
Journal of Information Science and Engineering
, vol.29
, pp. 1135-1150
-
-
Chang, C.C.1
Wu, H.L.2
Wang, Z.H.3
Mao, Q.4
-
5
-
-
84876252922
-
Hybrid key management architecture for robust SCADA systems
-
D. Choi, H. Jeong, D. Won, and S. Kim, "Hybrid key management architecture for robust SCADA systems", Journal of Information Science and Engineering, Vol. 29, 2013, pp. 281-298.
-
(2013)
Journal of Information Science and Engineering
, vol.29
, pp. 281-298
-
-
Choi, D.1
Jeong, H.2
Won, D.3
Kim, S.4
-
6
-
-
80054060630
-
An authentication protocol based on Kerberos 5
-
E. El-Emam, M. Koutb, H. Kelash, and O. S. Faragallah, "An authentication protocol based on Kerberos 5", International Journal of Network Security, Vol. 12, 2011, pp. 159-170.
-
(2011)
International Journal of Network Security
, vol.12
, pp. 159-170
-
-
El-Emam, E.1
Koutb, M.2
Kelash, H.3
Faragallah, O.S.4
-
7
-
-
80054052709
-
Weaknesses of a remote user password authentication scheme using smart card
-
D. He, J. Chen, and J. Hu, "Weaknesses of a remote user password authentication scheme using smart card", International Journal of Network Security, Vol. 13, 2011, pp. 58-60.
-
(2011)
International Journal of Network Security
, vol.13
, pp. 58-60
-
-
He, D.1
Chen, J.2
Hu, J.3
-
8
-
-
68849128250
-
Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment
-
H. C. Hsiang and W. K. Shih, "Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment", Computer Standards and Interfaces, Vol. 31, 2009, pp. 1118-1123.
-
(2009)
Computer Standards and Interfaces
, vol.31
, pp. 1118-1123
-
-
Hsiang, H.C.1
Shih, W.K.2
-
9
-
-
84902317834
-
A strong designated verifier ring signcryption scheme providing strongest signers' anonymity
-
S. J. Hwang and J. Y. Chen, "A strong designated verifier ring signcryption scheme providing strongest signers' anonymity", Journal of Information Science and Engineering, Vol. 30, 2014, pp. 895-910.
-
(2014)
Journal of Information Science and Engineering
, vol.30
, pp. 895-910
-
-
Hwang, S.J.1
Chen, J.Y.2
-
10
-
-
71649104505
-
Dos-resistant ID-based password authentication scheme using smart cards
-
M. S. Hwang, S. K. Chong, and T. Y. Chen, "Dos-resistant ID-based password authentication scheme using smart cards", Journal of Systems and Software, Vol. 83, 2010, pp. 163-172.
-
(2010)
Journal of Systems and Software
, vol.83
, pp. 163-172
-
-
Hwang, M.S.1
Chong, S.K.2
Chen, T.Y.3
-
11
-
-
1942455353
-
Efficient multi-server password authenticated key agreement using smart cards
-
W. Juang, "Efficient multi-server password authenticated key agreement using smart cards", IEEE Transactions on Consumer Electronics, Vol. 50, 2004, pp. 251-255.
-
(2004)
IEEE Transactions on Consumer Electronics
, vol.50
, pp. 251-255
-
-
Juang, W.1
-
12
-
-
0002548429
-
The evaluation of the Kerberos authentication system
-
IEEE CS Press
-
J. T. Kohl, B. C. Neuman, and T. Tso, "The evaluation of the Kerberos authentication system", in Distributed Open System, IEEE CS Press, 1994, pp. 78-94.
-
(1994)
Distributed Open System
, pp. 78-94
-
-
Kohl, J.T.1
Neuman, B.C.2
Tso, T.3
-
13
-
-
79959970986
-
A secure dynamic ID based remote user authentication scheme for multi-server environment using smart cards
-
C. C. Lee, T. H. Lin, and R. X. Chang, "A secure dynamic ID based remote user authentication scheme for multi-server environment using smart cards", Expert Systems with Applications, Vol. 38, 2011, pp. 13863-13870.
-
(2011)
Expert Systems with Applications
, vol.38
, pp. 13863-13870
-
-
Lee, C.C.1
Lin, T.H.2
Chang, R.X.3
-
14
-
-
84911004693
-
A practical RFID authentication mechanism for digital television
-
C. C. Lee, C. T. Chen, C. T. Li, and P. H. Wu, "A practical RFID authentication mechanism for digital television", Telecommunication Systems, Vol. 57, 2014, pp. 239-246.
-
(2014)
Telecommunication Systems
, vol.57
, pp. 239-246
-
-
Lee, C.C.1
Chen, C.T.2
Li, C.T.3
Wu, P.H.4
-
15
-
-
84891592609
-
Weakness and improvement of the smart card based remote user authentication scheme with anonymity
-
Y. C. Lee, "Weakness and improvement of the smart card based remote user authentication scheme with anonymity", Journal of Information Science and Engineering, Vol. 29, 2013, pp. 1121-1134.
-
(2013)
Journal of Information Science and Engineering
, vol.29
, pp. 1121-1134
-
-
Lee, Y.C.1
-
16
-
-
84856217617
-
An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards
-
X. Li, Y. Xiong, J. Ma, and W. Wang, "An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards", Journal of Network and Computer Applications, Vol. 35, 2012, pp. 763-769.
-
(2012)
Journal of Network and Computer Applications
, vol.35
, pp. 763-769
-
-
Li, X.1
Xiong, Y.2
Ma, J.3
Wang, W.4
-
17
-
-
0035506864
-
A remote password authentication scheme for multi-server architecture using neural networks
-
L. H. Li, I. C. Lin, and M. S. Hwang, "A remote password authentication scheme for multi-server architecture using neural networks", IEEE Transactions on Neural Network, Vol. 12, 2001, pp. 1498-1504.
-
(2001)
IEEE Transactions on Neural Network
, vol.12
, pp. 1498-1504
-
-
Li, L.H.1
Lin, I.C.2
Hwang, M.S.3
-
18
-
-
82755189733
-
An novel user authentication and privacy preserving scheme with smart cards for wireless communications
-
C. T. Li and C. C. Lee, "An novel user authentication and privacy preserving scheme with smart cards for wireless communications", Mathematical and Computer Modelling, Vol. 55, 2012, pp. 35-44.
-
(2012)
Mathematical and Computer Modelling
, vol.55
, pp. 35-44
-
-
Li, C.T.1
Lee, C.C.2
-
19
-
-
84878597719
-
A novel smart card and dynamic ID based remote user authentication scheme for multi-server environments
-
X. Li, J. Ma, W. Wang, Y. Xiong, and J. Zhang, "A novel smart card and dynamic ID based remote user authentication scheme for multi-server environments", Mathematical and Computer Modelling, Vol. 58, 2013, pp. 85-95.
-
(2013)
Mathematical and Computer Modelling
, vol.58
, pp. 85-95
-
-
Li, X.1
Ma, J.2
Wang, W.3
Xiong, Y.4
Zhang, J.5
-
20
-
-
54449094667
-
A secure dynamic ID based remote user authentication scheme for multi-server environment
-
Y. P. Liao and S. S. Wang, "A secure dynamic ID based remote user authentication scheme for multi-server environment", Computer Standards and Interfaces, Vol. 31, 2009, pp. 24-29.
-
(2009)
Computer Standards and Interfaces
, vol.31
, pp. 24-29
-
-
Liao, Y.P.1
Wang, S.S.2
-
21
-
-
0037211327
-
A new remote user authentication scheme for multi-server architecture
-
I. C. Lin, M. S. Hwang, and L. H. Li, "A new remote user authentication scheme for multi-server architecture", Future Generation Computer Systems, Vol. 19, 2003, pp. 13-22.
-
(2003)
Future Generation Computer Systems
, vol.19
, pp. 13-22
-
-
Lin, I.C.1
Hwang, M.S.2
Li, L.H.3
-
22
-
-
79251600218
-
A secure dynamic identity based authentication protocol for multi-server architecture
-
S. K. Sood, A. K. Sarje, and K. Singh, "A secure dynamic identity based authentication protocol for multi-server architecture", Journal of Network and Computer Applications, Vol. 34, 2011, pp. 609-618.
-
(2011)
Journal of Network and Computer Applications
, vol.34
, pp. 609-618
-
-
Sood, S.K.1
Sarje, A.K.2
Singh, K.3
-
23
-
-
49849096355
-
Efficient multi-server authentication scheme based on one-way hash function without verification table
-
J. L. Tsai, "Efficient multi-server authentication scheme based on one-way hash function without verification table", Computers and Security, Vol. 27, 2008, pp. 115-121.
-
(2008)
Computers and Security
, vol.27
, pp. 115-121
-
-
Tsai, J.L.1
|