-
1
-
-
84962448916
-
A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data
-
Xia, Z., Wang, X., Sun, X., Wang, Q.: A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. (2015). doi:10.1109/TPDS.2015.2401003
-
(2015)
IEEE Trans. Parallel Distrib. Syst.
-
-
Xia, Z.1
Wang, X.2
Sun, X.3
Wang, Q.4
-
2
-
-
84922280033
-
Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing
-
Fu, Z., Sun, X., Liu, Q., Zhou, L., Shu, J.: Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans. Commun. E98–B(1), 190–200 (2015)
-
(2015)
IEICE Trans. Commun.
, vol.E98–B
, Issue.1
, pp. 190-200
-
-
Fu, Z.1
Sun, X.2
Liu, Q.3
Zhou, L.4
Shu, J.5
-
3
-
-
84928106743
-
Mutual verifiable provable data auditing in public cloud storage
-
Ren, Y., Shen, J., Wang, J., Han, J., Lee, S.: Mutual verifiable provable data auditing in public cloud storage. J. Internet Technol. 16(2), 317–323 (2015)
-
(2015)
J. Internet Technol.
, vol.16
, Issue.2
, pp. 317-323
-
-
Ren, Y.1
Shen, J.2
Wang, J.3
Han, J.4
Lee, S.5
-
4
-
-
84916883747
-
A variable threshold-value authentication architecture for wireless mesh networks
-
Guo, P., Wang, J., Li, B., Lee, S.: A variable threshold-value authentication architecture for wireless mesh networks. J. Internet Technol. 15(6), 929–936 (2014)
-
(2014)
J. Internet Technol.
, vol.15
, Issue.6
, pp. 929-936
-
-
Guo, P.1
Wang, J.2
Li, B.3
Lee, S.4
-
5
-
-
84906345040
-
A secure and effective anonymous authentication scheme for roaming service in global mobility networks
-
Zhao, D., Peng, H., Li, L., Yang, Y.: A secure and effective anonymous authentication scheme for roaming service in global mobility networks. Wirel. Pers. Commun. 78(1), 247–269 (2014)
-
(2014)
Wirel. Pers. Commun.
, vol.78
, Issue.1
, pp. 247-269
-
-
Zhao, D.1
Peng, H.2
Li, L.3
Yang, Y.4
-
6
-
-
84975275069
-
Anonymous two-factor authentication in distributed systems: certain goals are beyond attainment
-
Wang, D., He, D., Wang, P., Chu, C.-H.: Anonymous two-factor authentication in distributed systems: certain goals are beyond attainment. IEEE Trans. Depend. Secure Comput. 12(4), 428–442 (2015). doi:10.1109/TDSC.2014.2355850
-
(2015)
IEEE Trans. Depend. Secure Comput.
, vol.12
, Issue.4
, pp. 428-442
-
-
Wang, D.1
He, D.2
Wang, P.3
Chu, C.-H.4
-
7
-
-
84938203681
-
Preserving privacy for free: efficient and provably secure two-factor authentication scheme with user anonymity
-
Wang, D., Wang, N., Wang, P., Qing, S.: Preserving privacy for free: efficient and provably secure two-factor authentication scheme with user anonymity. Inf. Sci. 321, 162–178 (2015). doi:10.1016/j.ins.2015.03.070
-
(2015)
Inf. Sci.
, vol.321
, pp. 162-178
-
-
Wang, D.1
Wang, N.2
Wang, P.3
Qing, S.4
-
8
-
-
10044293457
-
Comparing passwords, tokens, and biometrics for user authentication
-
O’Gorman, L.: Comparing passwords, tokens, and biometrics for user authentication. Proc. IEEE 91(12), 2021–2040 (2003)
-
(2003)
Proc. IEEE
, vol.91
, Issue.12
, pp. 2021-2040
-
-
O’Gorman, L.1
-
9
-
-
84911059606
-
An efficient and improved generic framework for three-factor authentication with provably secure instantiation
-
Yu, J., Wang, G., Mu, Y., Gao, W.: An efficient and improved generic framework for three-factor authentication with provably secure instantiation. IEEE Trans. Inf. Forensics Secur. 9(12), 2302–2313 (2014). doi:10.1109/TIFS.2014.2362979
-
(2014)
IEEE Trans. Inf. Forensics Secur.
, vol.9
, Issue.12
, pp. 2302-2313
-
-
Yu, J.1
Wang, G.2
Mu, Y.3
Gao, W.4
-
10
-
-
79959689122
-
A generic framework for three-factor authentication: preserving security and privacy in distributed systems
-
Huang, X., Xiang, Y., Chonka, A., Zhou, J., Deng, R.H.: A generic framework for three-factor authentication: preserving security and privacy in distributed systems. IEEE Trans. Parallel Distrib. Syst. 22(8), 1390–1397 (2011)
-
(2011)
IEEE Trans. Parallel Distrib. Syst.
, vol.22
, Issue.8
, pp. 1390-1397
-
-
Huang, X.1
Xiang, Y.2
Chonka, A.3
Zhou, J.4
Deng, R.H.5
-
11
-
-
4043139259
-
A flexible biometrics remote user authentication scheme
-
Lin, C.H., Lai, Y.Y.C.H.: A flexible biometrics remote user authentication scheme. Comput. Stand. Interfaces 27, 19–23 (2004)
-
(2004)
Comput. Stand. Interfaces
, vol.27
, pp. 19-23
-
-
Lin, C.H.1
Lai, Y.Y.C.H.2
-
12
-
-
33751167604
-
Improving the security of ‘a flexible biometrics remote user authentication scheme’
-
Khan, M.K., Zhang, J.S.: Improving the security of ‘a flexible biometrics remote user authentication scheme’. Comput. Stand. Interfaces 29, 82–85 (2007)
-
(2007)
Comput. Stand. Interfaces
, vol.29
, pp. 82-85
-
-
Khan, M.K.1
Zhang, J.S.2
-
13
-
-
70349792182
-
An efficient biometrics-based remote user authentication scheme using smart cards
-
Li, C.-T., Hwang, M.-S.: An efficient biometrics-based remote user authentication scheme using smart cards. J. Netw. Comput. Appl. 33, 1–5 (2010)
-
(2010)
J. Netw. Comput. Appl.
, vol.33
, pp. 1-5
-
-
Li, C.-T.1
Hwang, M.-S.2
-
14
-
-
78649335192
-
Cryptanalysis and improvement of a biometric-based remote authentication scheme using smart cards
-
Li, X., Niu, J.W., Ma, J., Wang, W.D., Liu, C.L.: Cryptanalysis and improvement of a biometric-based remote authentication scheme using smart cards. J. Netw. Comput. Appl. 34, 73–79 (2011)
-
(2011)
J. Netw. Comput. Appl.
, vol.34
, pp. 73-79
-
-
Li, X.1
Niu, J.W.2
Ma, J.3
Wang, W.D.4
Liu, C.L.5
-
15
-
-
81855227196
-
Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards
-
Das, A.K.: Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards. IET Inf. Secur. 5(3), 145–151 (2012)
-
(2012)
IET Inf. Secur.
, vol.5
, Issue.3
, pp. 145-151
-
-
Das, A.K.1
-
16
-
-
70450285606
-
Provably secure remote truly three factor authentication scheme with privacy protection on biometrics
-
Fan, C.I., Lin, Y.H.: Provably secure remote truly three factor authentication scheme with privacy protection on biometrics. IEEE Trans. Inf. Forensics Secur. 4, 933–945 (2009)
-
(2009)
IEEE Trans. Inf. Forensics Secur.
, vol.4
, pp. 933-945
-
-
Fan, C.I.1
Lin, Y.H.2
-
17
-
-
84908157951
-
Applying biometrics to design three-factor remote user authentication scheme with key agreement
-
Li, X., Niu, J., Wang, Z., Chen, C.: Applying biometrics to design three-factor remote user authentication scheme with key agreement. Secur. Commun. Netw. 7(10), 1488–1497 (2013)
-
(2013)
Secur. Commun. Netw.
, vol.7
, Issue.10
, pp. 1488-1497
-
-
Li, X.1
Niu, J.2
Wang, Z.3
Chen, C.4
-
18
-
-
84902189092
-
Chaos-order transition in foraging behavior of ants
-
Li, L., Peng, H., Kurths, J., Yang, Y., Schellnhuber, H.J.: Chaos-order transition in foraging behavior of ants. PNAS 111(23), 8392–8397 (2014)
-
(2014)
PNAS
, vol.111
, Issue.23
, pp. 8392-8397
-
-
Li, L.1
Peng, H.2
Kurths, J.3
Yang, Y.4
Schellnhuber, H.J.5
-
19
-
-
78049382801
-
An anonymous key agreement protocol based on chaotic maps
-
Niu, Y.J., Wang, X.Y.: An anonymous key agreement protocol based on chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 16, 1986–1992 (2011)
-
(2011)
Commun. Nonlinear Sci. Numer. Simul.
, vol.16
, pp. 1986-1992
-
-
Niu, Y.J.1
Wang, X.Y.2
-
20
-
-
84856430473
-
Security improvement on an anonymous key agreement protocol based on chaotic maps
-
Xue, K., Hong, P.: Security improvement on an anonymous key agreement protocol based on chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 17, 2969–2977 (2012)
-
(2012)
Commun. Nonlinear Sci. Numer. Simul.
, vol.17
, pp. 2969-2977
-
-
Xue, K.1
Hong, P.2
-
21
-
-
84926315405
-
Enhancing the security of password authenticated key agreement protocols based on chaotic maps
-
Lee, T.-F.: Enhancing the security of password authenticated key agreement protocols based on chaotic maps. Inf. Sci. 290, 63–71 (2015)
-
(2015)
Inf. Sci.
, vol.290
, pp. 63-71
-
-
Lee, T.-F.1
-
22
-
-
84870863840
-
A secure chaotic maps-based key agreement protocol without using smart cards
-
Gong, P., Li, P., Shi, W.: A secure chaotic maps-based key agreement protocol without using smart cards. Nonlinear Dyn. 70, 2401–2406 (2012)
-
(2012)
Nonlinear Dyn.
, vol.70
, pp. 2401-2406
-
-
Gong, P.1
Li, P.2
Shi, W.3
-
23
-
-
84888643068
-
Chaotic maps-based three-party password authenticated key agreement scheme
-
Xie, Q., Tu, X.: Chaotic maps-based three-party password authenticated key agreement scheme. Nonlinear Dyn. 74, 1021–1027 (2013)
-
(2013)
Nonlinear Dyn.
, vol.74
, pp. 1021-1027
-
-
Xie, Q.1
Tu, X.2
-
24
-
-
84883751308
-
Cryptanalysis and improvement of a three-party key agreement protocol using enhanced Chebyshev polynomials
-
Zhao, F., Gong, P., Li, S., Li, M., Li, P.: Cryptanalysis and improvement of a three-party key agreement protocol using enhanced Chebyshev polynomials. Nonlinear Dyn. 74, 419–427 (2013)
-
(2013)
Nonlinear Dyn.
, vol.74
, pp. 419-427
-
-
Zhao, F.1
Gong, P.2
Li, S.3
Li, M.4
Li, P.5
-
25
-
-
84879782333
-
A three-party password based authenticated key exchange protocol with user anonymity using extended chaotic maps
-
Lee, C.-C., Li, C.-T., Hsu, C.-W.: A three-party password based authenticated key exchange protocol with user anonymity using extended chaotic maps. Nonlinear Dyn. 73, 125–132 (2013)
-
(2013)
Nonlinear Dyn.
, vol.73
, pp. 125-132
-
-
Lee, C.-C.1
Li, C.-T.2
Hsu, C.-W.3
-
26
-
-
84902266968
-
An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps
-
Farash, M.S., Attari, M.A.: An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps. Nonlinear Dyn. 77(1), 399–411 (2014). doi:10.1007/s11071-014-1304-6
-
(2014)
Nonlinear Dyn.
, vol.77
, Issue.1
, pp. 399-411
-
-
Farash, M.S.1
Attari, M.A.2
-
27
-
-
84901574009
-
Provably secure three-party key agreement protocol using Chebyshev chaotic maps in the standard model
-
Lai, H., Orgun, M.A., Xiao, J., Pieprzyk, J., Xue, L., Yang, Y.: Provably secure three-party key agreement protocol using Chebyshev chaotic maps in the standard model. Nonlinear Dyn. 77(4), 1427–1439 (2014)
-
(2014)
Nonlinear Dyn.
, vol.77
, Issue.4
, pp. 1427-1439
-
-
Lai, H.1
Orgun, M.A.2
Xiao, J.3
Pieprzyk, J.4
Xue, L.5
Yang, Y.6
-
28
-
-
84872373047
-
Chaotic maps-based password authenticated key agreement using smart cards
-
Guo, C., Chang, C.-C.: Chaotic maps-based password authenticated key agreement using smart cards. Commun. Nonlinear Sci. Numer. Simul. 18(6), 1433–1440 (2013)
-
(2013)
Commun. Nonlinear Sci. Numer. Simul.
, vol.18
, Issue.6
, pp. 1433-1440
-
-
Guo, C.1
Chang, C.-C.2
-
29
-
-
84872265840
-
A chaotic map based authentication scheme for telecare medicine information systems
-
Hao, X., Wang, J., Yang, Q., Yan, X., Li, P.: A chaotic map based authentication scheme for telecare medicine information systems. J. Med. Syst. 37(2), 1–7 (2013)
-
(2013)
J. Med. Syst.
, vol.37
, Issue.2
, pp. 1-7
-
-
Hao, X.1
Wang, J.2
Yang, Q.3
Yan, X.4
Li, P.5
-
30
-
-
84893187211
-
Robust chaotic map-based authentication and key agreement scheme with strong anonymity for telecare medicine information systems
-
Jiang, Q., Ma, J., Lu, X., Tian, Y.: Robust chaotic map-based authentication and key agreement scheme with strong anonymity for telecare medicine information systems. J. Med. Syst. 38(2), 1–8 (2014)
-
(2014)
J. Med. Syst.
, vol.38
, Issue.2
, pp. 1-8
-
-
Jiang, Q.1
Ma, J.2
Lu, X.3
Tian, Y.4
-
31
-
-
84886744243
-
Security analysis of a chaotic map based authentication scheme for telecare medicine information systems
-
Yau, W.C., Phan, R.C.W.: Security analysis of a chaotic map based authentication scheme for telecare medicine information systems. J. Med. Syst. 37(6), 1–9 (2013)
-
(2013)
J. Med. Syst.
, vol.37
, Issue.6
, pp. 1-9
-
-
Yau, W.C.1
Phan, R.C.W.2
-
32
-
-
84925539937
-
Cryptanalysis and improvement of a three-party key agreement protocol using enhanced Chebyshev polynomials
-
Yau, W.C., Phan, R.C.W.: Cryptanalysis and improvement of a three-party key agreement protocol using enhanced Chebyshev polynomials. Nonlinear Dyn. 79(2), 809–821 (2014). doi:10.1007/s11071-014-1704-7
-
(2014)
Nonlinear Dyn.
, vol.79
, Issue.2
, pp. 809-821
-
-
Yau, W.C.1
Phan, R.C.W.2
-
33
-
-
84875673567
-
A chaotic maps-based authenticated key agreement protocol with strong anonymity
-
Tan, Z.: A chaotic maps-based authenticated key agreement protocol with strong anonymity. Nonlinear Dyn. 72(1–2), 311–320 (2013)
-
(2013)
Nonlinear Dyn.
, vol.72
, Issue.1-2
, pp. 311-320
-
-
Tan, Z.1
-
34
-
-
84888642495
-
An extended chaotic maps based user authentication and privacy preserving scheme against DoS attacks in pervasive and ubiquitous computing environments
-
Li, C.T., Lee, C.C., Weng, C.Y.: An extended chaotic maps based user authentication and privacy preserving scheme against DoS attacks in pervasive and ubiquitous computing environments. Nonlinear Dyn. 74(4), 1133–1143 (2013)
-
(2013)
Nonlinear Dyn.
, vol.74
, Issue.4
, pp. 1133-1143
-
-
Li, C.T.1
Lee, C.C.2
Weng, C.Y.3
-
35
-
-
84899085643
-
An extended chaotic maps-based protocol with key agreement for multiserver environments
-
Lee, C.C., Lou, D.C., Li, C.T.: An extended chaotic maps-based protocol with key agreement for multiserver environments. Nonlinear Dyn. 76(1), 853–866 (2013). doi:10.1007/s11071-013-1174-3
-
(2013)
Nonlinear Dyn.
, vol.76
, Issue.1
, pp. 853-866
-
-
Lee, C.C.1
Lou, D.C.2
Li, C.T.3
-
36
-
-
34548620637
-
Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices
-
Khan, M.K., Zhang, J., Wang, X.: Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices. Chaos, Solitons Fract. 35(3), 519–524 (2008)
-
(2008)
Chaos, Solitons Fract.
, vol.35
, Issue.3
, pp. 519-524
-
-
Khan, M.K.1
Zhang, J.2
Wang, X.3
-
37
-
-
84861748201
-
An extended chaotic maps-based key agreement protocol with user anonymity
-
Lee, C.C., Chen, C.C., Wu, C.Y., Huang, S.-Y.: An extended chaotic maps-based key agreement protocol with user anonymity. Nonlinear Dyn. 69(1–2), 79–87 (2012)
-
(2012)
Nonlinear Dyn.
, vol.69
, Issue.1-2
, pp. 79-87
-
-
Lee, C.C.1
Chen, C.C.2
Wu, C.Y.3
Huang, S.-Y.4
-
38
-
-
84863989374
-
Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol
-
He, D., Chen, Y., Chen, J.: Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol. Nonlinear Dyn. 69(3), 1149–1157 (2012)
-
(2012)
Nonlinear Dyn.
, vol.69
, Issue.3
, pp. 1149-1157
-
-
He, D.1
Chen, Y.2
Chen, J.3
-
39
-
-
84871955339
-
A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps
-
Lee, C.C., Hsu, C.W.: A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps. Nonlinear Dyn. 71(1–2), 201–211 (2013)
-
(2013)
Nonlinear Dyn.
, vol.71
, Issue.1-2
, pp. 201-211
-
-
Lee, C.C.1
Hsu, C.W.2
-
40
-
-
84910132760
-
Provably secure dynamic identity-based three-factor password authentication scheme using extended chaotic maps
-
Islam, S.K.H.: Provably secure dynamic identity-based three-factor password authentication scheme using extended chaotic maps. Nonlinear Dyn. 78(3), 2261–2276 (2014). doi:10.1007/s11071-014-1584-x
-
(2014)
Nonlinear Dyn.
, vol.78
, Issue.3
, pp. 2261-2276
-
-
Islam, S.K.H.1
-
43
-
-
77957941531
-
Securing fingerprint template: fuzzy vault with minutiae descriptors
-
Nagar, A., Nandakumar, K., Jain, A.K.: Securing fingerprint template: fuzzy vault with minutiae descriptors. In: Proceedings of 19th International Conference on Pattern Recognition, pp. 1–4 (2008)
-
(2008)
Proceedings of 19th International Conference on Pattern Recognition
, pp. 1-4
-
-
Nagar, A.1
Nandakumar, K.2
Jain, A.K.3
-
44
-
-
84898048082
-
Enhanced three-factor security protocol for USB consumer storage devices
-
He, D., Kumar, N., Lee, J.-H.: Enhanced three-factor security protocol for USB consumer storage devices. IEEE Trans. Consum. Electr. 60(1), 30–37 (2014)
-
(2014)
IEEE Trans. Consum. Electr.
, vol.60
, Issue.1
, pp. 30-37
-
-
He, D.1
Kumar, N.2
Lee, J.-H.3
-
45
-
-
85027949488
-
Robust biometrics-based authentication scheme for multi-server environment
-
He, D., Wang, D.: Robust biometrics-based authentication scheme for multi-server environment. IEEE Syst. J. 9(3), 816–823 (2015). doi:10.1109/JSYST.2014.2301517
-
(2015)
IEEE Syst. J.
, vol.9
, Issue.3
, pp. 816-823
-
-
He, D.1
Wang, D.2
-
46
-
-
84901208308
-
Chen, Z.: iPass: privacy preserving two-factor authentication scheme against smart card loss problem
-
Wang, D., Wang, P., Ma, C., Chen, Z.: iPass: privacy preserving two-factor authentication scheme against smart card loss problem. Cryptology ePrint Archive 439, 1–35 (2012). http://eprint.iacr.org/2012/439.pdf
-
(2012)
Cryptology ePrint Archive
, vol.439
, pp. 1-35
-
-
Wang, D.1
Wang, P.2
Ma, C.3
-
47
-
-
23144460039
-
Security of public key cryptosystems based on Chebyshev polynomials
-
Bergamo, P., Arco, P., Santis, A., Kocarev, L.: Security of public key cryptosystems based on Chebyshev polynomials. IEEE. Trans. Circ. Syst. 52, 1382–1393 (2005)
-
(2005)
IEEE. Trans. Circ. Syst.
, vol.52
, pp. 1382-1393
-
-
Bergamo, P.1
Arco, P.2
Santis, A.3
Kocarev, L.4
-
48
-
-
40249103088
-
Cryptanalysis of the public key encryption based on multiple chaotic systems
-
Zhang, L.: Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos Solitons Fract. 37(3), 669–674 (2008)
-
(2008)
Chaos Solitons Fract.
, vol.37
, Issue.3
, pp. 669-674
-
-
Zhang, L.1
-
49
-
-
84939573910
-
Differential power analysis
-
Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Proceedings of Advances in Cryptology (Crypto’99), LNCS, pp. 388–397 (1999)
-
(1999)
Proceedings of Advances in Cryptology (Crypto’99), LNCS
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
50
-
-
0036566408
-
Examining smart-card security under the threat of power analysis attacks
-
Messerges, T.S., Dabbish, E.A., Sloan, R.H.: Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Comput. 51(5), 541–552 (2002)
-
(2002)
IEEE Trans. Comput.
, vol.51
, Issue.5
, pp. 541-552
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
-
51
-
-
84903610217
-
An efficient ticket based authentication protocol with unlinkability for wireless access networks
-
Jiang, Q., Ma, J., Li, G., Yang, L.: An efficient ticket based authentication protocol with unlinkability for wireless access networks. Wirel. Pers. Commun. 77(2), 1489–1506 (2014)
-
(2014)
Wirel. Pers. Commun.
, vol.77
, Issue.2
, pp. 1489-1506
-
-
Jiang, Q.1
Ma, J.2
Li, G.3
Yang, L.4
-
52
-
-
84939576175
-
An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks
-
Jiang, Q., Ma, J., Lu, X., Tian, Y.: An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks. Peer-to-Peer Netw. Appl. 8(6), 1070–1081 (2015). doi:10.1007/s12083-014-0285-z
-
(2015)
Peer-to-Peer Netw. Appl.
, vol.8
, Issue.6
, pp. 1070-1081
-
-
Jiang, Q.1
Ma, J.2
Lu, X.3
Tian, Y.4
-
53
-
-
84895505663
-
-
Springer, Berlin
-
Arkko, J., Nikander, P., Näslund, M.: Enhancing Privacy with Shared Pseudo Random Sequences, Security Protocols. Springer, Berlin (2007)
-
(2007)
Enhancing Privacy with Shared Pseudo Random Sequences, Security Protocols
-
-
Arkko, J.1
Nikander, P.2
Näslund, M.3
-
54
-
-
0025386404
-
A logic of authentication
-
Burrows, M., Abadi, M., Needham, R.: A logic of authentication. ACM Trans. Comput. Syst. 8(1), 18–36 (1990)
-
(1990)
ACM Trans. Comput. Syst.
, vol.8
, Issue.1
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
|