-
1
-
-
0019634370
-
Password authentication with insecure communication
-
Lamport L,. Password authentication with insecure communication. Communications of the ACM 1981; 24 (11): 770-772.
-
(1981)
Communications of the ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
3
-
-
78049329614
-
Security enhancement on an improvement on two remote user authentication schemes using smart cards
-
Chen TH, Hsiang HC, Shih WK,. Security enhancement on an improvement on two remote user authentication schemes using smart cards. Future Generation Computer Systems 2011; 27 (4): 377-380.
-
(2011)
Future Generation Computer Systems
, vol.27
, Issue.4
, pp. 377-380
-
-
Chen, T.H.1
Hsiang, H.C.2
Shih, W.K.3
-
4
-
-
28044451335
-
Robust remote authentication scheme with smart cards
-
Fan CI, Chan YC, Zhang ZK,. Robust remote authentication scheme with smart cards. Computer and Security 2005; 24 (8): 619-628.
-
(2005)
Computer and Security
, vol.24
, Issue.8
, pp. 619-628
-
-
Fan, C.I.1
Chan, Y.C.2
Zhang, Z.K.3
-
5
-
-
0034140374
-
A new remote user authentication scheme using smart cards
-
Hwang MS, Li LH,. A new remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics 2000; 46 (1): 28-30.
-
(2000)
IEEE Transactions on Consumer Electronics
, vol.46
, Issue.1
, pp. 28-30
-
-
Hwang, M.S.1
Li, L.H.2
-
6
-
-
78751642788
-
Cryptanalysis and security enhancement of a 'more efficient & secure dynamic ID-based remote user authentication scheme
-
Khan MK, Kim SK, Alghathbar K,. Cryptanalysis and security enhancement of a 'more efficient & secure dynamic ID-based remote user authentication scheme. Computer Communications 2010; 34 (3): 305-309.
-
(2010)
Computer Communications
, vol.34
, Issue.3
, pp. 305-309
-
-
Khan, M.K.1
Kim, S.K.2
Alghathbar, K.3
-
7
-
-
84906780054
-
More Efficient Key-Hash Based Fingerprint Remote Authentication Scheme Using Mobile Device
-
Khan MK, Kumari S, Gupta MK,. More Efficient Key-Hash Based Fingerprint Remote Authentication Scheme Using Mobile Device. Computing 2013; DOI: 10.1007/s00607-013-0308-2.
-
(2013)
Computing
-
-
Khan, M.K.1
Kumari, S.2
Gupta, M.K.3
-
8
-
-
33751167604
-
Improving the security of a flexible biometrics remote user authentication scheme
-
Khan MK, Zhang JS,. Improving the security of a flexible biometrics remote user authentication scheme. Computer Standards & Interfaces 2007; 29 (1): 82-85.
-
(2007)
Computer Standards & Interfaces
, vol.29
, Issue.1
, pp. 82-85
-
-
Khan, M.K.1
Zhang, J.S.2
-
9
-
-
84866619118
-
An improved efficient remote password authentication scheme with smart card over insecure networks
-
Kumar M, Gupta MK, Kumari S,. An improved efficient remote password authentication scheme with smart card over insecure networks. International Journal of Network Security 2011; 13 (3): 167-177.
-
(2011)
International Journal of Network Security
, vol.13
, Issue.3
, pp. 167-177
-
-
Kumar, M.1
Gupta, M.K.2
Kumari, S.3
-
10
-
-
84866625525
-
Cryptanalysis and security enhancement of Chen et al.'s remote user authentication scheme using smart card
-
Kumari S, Gupta MK, Kumar M,. Cryptanalysis and security enhancement of Chen et al.'s remote user authentication scheme using smart card. Central European Journal of Computer Science 2012; 2 (1): 60-75.
-
(2012)
Central European Journal of Computer Science
, vol.2
, Issue.1
, pp. 60-75
-
-
Kumari, S.1
Gupta, M.K.2
Kumar, M.3
-
11
-
-
84914669082
-
Cryptanalysis and improvement of 'a robust smart-card-based remote user password authentication scheme'
-
Kumari S, Khan MK,. Cryptanalysis and improvement of 'a robust smart-card-based remote user password authentication scheme'. International Journal of Communication Systems, 2013; DOI: 10.1002/dac.2590.
-
(2013)
International Journal of Communication Systems
-
-
Kumari, S.1
Khan, M.K.2
-
13
-
-
44549086640
-
A new mutual authentication scheme based on nonce and smart cards
-
Liu JY, Zhou AM, Gao MX,. A new mutual authentication scheme based on nonce and smart cards. Computer Communications 2008; 31 (10): 2205-2209.
-
(2008)
Computer Communications
, vol.31
, Issue.10
, pp. 2205-2209
-
-
Liu, J.Y.1
Zhou, A.M.2
Gao, M.X.3
-
14
-
-
61849087915
-
Cryptanalysis of a mutual authentication scheme based on nonce and smart cards
-
Sun DZ, Huai JP, Sun JZ, Li JX,. Cryptanalysis of a mutual authentication scheme based on nonce and smart cards. Computer Communications 2009; 32 (6): 1015-1017.
-
(2009)
Computer Communications
, vol.32
, Issue.6
, pp. 1015-1017
-
-
Sun, D.Z.1
Huai, J.P.2
Sun, J.Z.3
Li, J.X.4
-
15
-
-
34248666700
-
Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards
-
Wang XM, Zhang WF, Jhang JS, Khan MK,. Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards. Computer Standards and Interfaces 2007; 29 (5): 507-512.
-
(2007)
Computer Standards and Interfaces
, vol.29
, Issue.5
, pp. 507-512
-
-
Wang, X.M.1
Zhang, W.F.2
Jhang, J.S.3
Khan, M.K.4
-
16
-
-
78049322666
-
Two robust remote user authentication protocols using smart cards
-
Yeh KH, Su C, Lo NW, Li Y, Hung YX,. Two robust remote user authentication protocols using smart cards. The Journal of System and Software 2010; 83 (12): 2556-2565.
-
(2010)
The Journal of System and Software
, vol.83
, Issue.12
, pp. 2556-2565
-
-
Yeh, K.H.1
Su, C.2
Lo, N.W.3
Li, Y.4
Hung, Y.X.5
-
17
-
-
4043152192
-
Further improvement of an efficient password based remote user authentication scheme using smart cards
-
Yoon EJ, Ryu EK, Yoo KY,. Further improvement of an efficient password based remote user authentication scheme using smart cards. IEEE Transactions of Consumer Electronics 2004; 50 (2) 612-614.
-
(2004)
IEEE Transactions of Consumer Electronics
, vol.50
, Issue.2
, pp. 612-614
-
-
Yoon, E.J.1
Ryu, E.K.2
Yoo, K.Y.3
-
19
-
-
0036566408
-
Examining smart-card security under the threat of power analysis attacks
-
Messerges TS, Dabbish EA, Sloan RH,. Examining smart-card security under the threat of power analysis attacks. IEEE Transactions on Computers 2002; 51 (5): 541-552.
-
(2002)
IEEE Transactions on Computers
, vol.51
, Issue.5
, pp. 541-552
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
-
22
-
-
78650282598
-
Security analysis and improvement of the remote user authentication scheme without using smart cards
-
Shieh WG, Horng WB,. Security analysis and improvement of the remote user authentication scheme without using smart cards. ICIC Express Letters 2010; 4 (6): 2431-2436.
-
(2010)
ICIC Express Letters
, vol.4
, Issue.6
, pp. 2431-2436
-
-
Shieh, W.G.1
Horng, W.B.2
-
23
-
-
84872223681
-
A secure password-based remote user authentication scheme without smart cards
-
Chen BL, Kuo WC, Wuu LC,. A secure password-based remote user authentication scheme without smart cards. Information Technology and Control 2012; 41 (1): 53-59.
-
(2012)
Information Technology and Control
, vol.41
, Issue.1
, pp. 53-59
-
-
Chen, B.L.1
Kuo, W.C.2
Wuu, L.C.3
-
26
-
-
84878989011
-
An improved password-based remote user authentication protocol without smart cards
-
Jiang Q, Ma J, Li G, Ma Z,. An improved password-based remote user authentication protocol without smart cards. Information Technology and Control 2013; 42 (2): 150-158.
-
(2013)
Information Technology and Control
, vol.42
, Issue.2
, pp. 150-158
-
-
Jiang, Q.1
Ma, J.2
Li, G.3
Ma, Z.4
-
27
-
-
84878967179
-
Cryptanalysis and Improvement of a password-based remote user authentication scheme without smart cards
-
He D, Wang D, Wu S,. Cryptanalysis and Improvement of a password-based remote user authentication scheme without smart cards. Information Technology and Control 2013; 42 (2): 170-177.
-
(2013)
Information Technology and Control
, vol.42
, Issue.2
, pp. 170-177
-
-
He, D.1
Wang, D.2
Wu, S.3
-
28
-
-
52949137008
-
Two-factor mutual authentication based on smart cards and passwords
-
Yang G, Wong D, Wang H, Deng X,. Two-factor mutual authentication based on smart cards and passwords. Journal of Computer and System Sciences 2008; 74 (7): 1160-1172.
-
(2008)
Journal of Computer and System Sciences
, vol.74
, Issue.7
, pp. 1160-1172
-
-
Yang, G.1
Wong, D.2
Wang, H.3
Deng, X.4
-
29
-
-
4243365845
-
-
Bellcore Press Release. Bellcore Press Release, September
-
Bellcore Press Release. New threat model breaks crypto codes. Bellcore Press Release, September 1996.
-
(1996)
New Threat Model Breaks Crypto Codes
-
-
-
30
-
-
0034276289
-
Checking before output may not be enough against fault-based cryptanalysis
-
Yen SM, Joye M,. Checking before output may not be enough against fault-based cryptanalysis. IEEE Transactions on Computers 2002; 49 (9): 967-970.
-
(2002)
IEEE Transactions on Computers
, vol.49
, Issue.9
, pp. 967-970
-
-
Yen, S.M.1
Joye, M.2
|