-
1
-
-
84879448131
-
Security analysis and improvement of a privacy authentication scheme for telecare medical information systems
-
Wu F, Xu L. Security analysis and improvement of a privacy authentication scheme for telecare medical information systems. Journal of Medical Systems 2013; 37(4). Article ID: 9958.
-
(2013)
Journal of Medical Systems
, vol.37
, Issue.4
-
-
Wu, F.1
Xu, L.2
-
2
-
-
84878597719
-
A novel smart card and dynamic id based remote user authentication scheme for multi-server environments
-
Li X, Ma J, Wang W, Xiong Y, Zhang J. A novel smart card and dynamic id based remote user authentication scheme for multi-server environments. Mathematical and Computer Modelling 2013; 58(1): 85–95.
-
(2013)
Mathematical and Computer Modelling
, vol.58
, Issue.1
, pp. 85-95
-
-
Li, X.1
Ma, J.2
Wang, W.3
Xiong, Y.4
Zhang, J.5
-
3
-
-
84883653668
-
An enhanced smart card based remote user password authentication scheme
-
Li X, Niu J, Khan MK, Liao J. An enhanced smart card based remote user password authentication scheme. Journal of Network and Computer Applications 2013; 36(5): 1365–1371.
-
(2013)
Journal of Network and Computer Applications
, vol.36
, Issue.5
, pp. 1365-1371
-
-
Li, X.1
Niu, J.2
Khan, M.K.3
Liao, J.4
-
4
-
-
84903610217
-
An efficient ticket based authentication protocol with unlinkability for wireless access networks
-
Jiang Q, Ma J, Li G, Yang L. An efficient ticket based authentication protocol with unlinkability for wireless access networks. Wireless Personal Communications 2014; 77(2): 1489–1506.
-
(2014)
Wireless Personal Communications
, vol.77
, Issue.2
, pp. 1489-1506
-
-
Jiang, Q.1
Ma, J.2
Li, G.3
Yang, L.4
-
5
-
-
84939576175
-
An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks
-
Jiang Q, Ma J, Lu X, Tian Y. An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks. Peer-to-Peer Networking and Applications 2015; 8(6): 1070–1081.
-
(2015)
Peer-to-Peer Networking and Applications
, vol.8
, Issue.6
, pp. 1070-1081
-
-
Jiang, Q.1
Ma, J.2
Lu, X.3
Tian, Y.4
-
6
-
-
84919348312
-
An improved and provable remote user authentication scheme based on elliptic curve cryptosystem with user anonymity
-
Xu L, Wu F. An improved and provable remote user authentication scheme based on elliptic curve cryptosystem with user anonymity. Security and Communication Networks 2015; 8(2): 245–260.
-
(2015)
Security and Communication Networks
, vol.8
, Issue.2
, pp. 245-260
-
-
Xu, L.1
Wu, F.2
-
7
-
-
84942364844
-
A novel and provably secure biometrics-based three-factor remote authentication scheme for mobile client cserver networks
-
Wu F, Xu L, Kumari S, Li X. A novel and provably secure biometrics-based three-factor remote authentication scheme for mobile client cserver networks. Computers & Electrical Engineering 2015; 45: 274–285.
-
(2015)
Computers & Electrical Engineering
, vol.45
, pp. 274-285
-
-
Wu, F.1
Xu, L.2
Kumari, S.3
Li, X.4
-
8
-
-
84963958402
-
Cryptanalysis and improvement of a user authentication scheme preserving uniqueness and anonymity for connected health care
-
Xu L, Wu F. Cryptanalysis and improvement of a user authentication scheme preserving uniqueness and anonymity for connected health care. Journal of Medical Systems 2015; 39(2): 1–9.
-
(2015)
Journal of Medical Systems
, vol.39
, Issue.2
, pp. 1-9
-
-
Xu, L.1
Wu, F.2
-
9
-
-
84938819964
-
An improved and anonymous two-factor authentication protocol for health-care applications with wireless medical sensor networks
-
Wu F, Xu L, Kumari S, Li X. An improved and anonymous two-factor authentication protocol for health-care applications with wireless medical sensor networks. Multimedia Systems 2015. DOI: 10.1007/s00530-015-0476-3.
-
(2015)
Multimedia Systems
-
-
Wu, F.1
Xu, L.2
Kumari, S.3
Li, X.4
-
10
-
-
84940853317
-
A new and secure authentication scheme for wireless sensor networks with formal proof
-
Wu F, Xu L, Kumari S, Li X. A new and secure authentication scheme for wireless sensor networks with formal proof. Peer-to-Peer Networking and Applications 2015. DOI: 10.1007/s12083-015-0404-5.
-
(2015)
Peer-to-Peer Networking and Applications
-
-
Wu, F.1
Xu, L.2
Kumari, S.3
Li, X.4
-
11
-
-
84928106743
-
Mutual verifiable provable data auditing in public cloud storage
-
Ren Y, Shen J, Wang J, Han J, Lee S. Mutual verifiable provable data auditing in public cloud storage. Journal of Internet Technology 2015; 16(2): 317–323.
-
(2015)
Journal of Internet Technology
, vol.16
, Issue.2
, pp. 317-323
-
-
Ren, Y.1
Shen, J.2
Wang, J.3
Han, J.4
Lee, S.5
-
12
-
-
85010842165
-
A privacy-preserving and provable user authentication scheme for wireless sensor networks based on internet of things security
-
Wu F, Xu L, Kumari S, Li X. A privacy-preserving and provable user authentication scheme for wireless sensor networks based on internet of things security. Journal of Ambient Intelligence and Humanized Computing 2016. DOI: 10.1007/s12652-016-0345-8.
-
(2016)
Journal of Ambient Intelligence and Humanized Computing
-
-
Wu, F.1
Xu, L.2
Kumari, S.3
Li, X.4
-
13
-
-
84954436216
-
A privacy preserving three-factor authentication protocol for e-health clouds
-
Jiang Q, Khan MK, Lu X, Ma J, He D. A privacy preserving three-factor authentication protocol for e-health clouds. The Journal of Supercomputing 2016. DOI: 10.1007/s11227-015-1610-x.
-
(2016)
The Journal of Supercomputing
-
-
Jiang, Q.1
Khan, M.K.2
Lu, X.3
Ma, J.4
He, D.5
-
14
-
-
84958124876
-
Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy
-
Jiang Q, Wei F, Fu S, Ma J, Li G, Alelaiwi A. Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy. Nonlinear Dynamics 2016; 83(4): 2085–2101.
-
(2016)
Nonlinear Dynamics
, vol.83
, Issue.4
, pp. 2085-2101
-
-
Jiang, Q.1
Wei, F.2
Fu, S.3
Ma, J.4
Li, G.5
Alelaiwi, A.6
-
15
-
-
84916883747
-
A variable threshold-value authentication architecture for wireless mesh networks
-
Guo P, Wang J, Geng XueHua, Kim ChangSeob, Kim Jeong-Uk. A variable threshold-value authentication architecture for wireless mesh networks. Journal of Internet Technology 2014; 15(6): 929–935.
-
(2014)
Journal of Internet Technology
, vol.15
, Issue.6
, pp. 929-935
-
-
Guo, P.1
Wang, J.2
Geng, X.3
Kim, C.4
Kim, J.-U.5
-
16
-
-
84923216048
-
An improved and provable self-certified digital signature scheme with message recovery
-
Wu F, Xu L. An improved and provable self-certified digital signature scheme with message recovery. International Journal of Communication Systems 2015; 28(2): 344–357.
-
(2015)
International Journal of Communication Systems
, vol.28
, Issue.2
, pp. 344-357
-
-
Wu, F.1
Xu, L.2
-
17
-
-
1942487780
-
A new authentication scheme with anonymity for wireless environments
-
Zhu J, Ma J. A new authentication scheme with anonymity for wireless environments. IEEE Transactions on Consumer Electronics 2004; 50(1): 231–235.
-
(2004)
IEEE Transactions on Consumer Electronics
, vol.50
, Issue.1
, pp. 231-235
-
-
Zhu, J.1
Ma, J.2
-
18
-
-
33750133438
-
Security enhancement on a new authentication scheme with anonymity for wireless environments
-
Lee CC, Hwang MS, Liao IE. Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE Transactions on Industrial Electronics 2006; 53(5): 1683–1687.
-
(2006)
IEEE Transactions on Industrial Electronics
, vol.53
, Issue.5
, pp. 1683-1687
-
-
Lee, C.C.1
Hwang, M.S.2
Liao, I.E.3
-
19
-
-
54949140749
-
A secure authentication scheme with anonymity for wireless communications
-
Wu CC, Lee WB, Tsaur WJ. A secure authentication scheme with anonymity for wireless communications. IEEE Communications Letters 2008; 12(10): 722–723.
-
(2008)
IEEE Communications Letters
, vol.12
, Issue.10
, pp. 722-723
-
-
Wu, C.C.1
Lee, W.B.2
Tsaur, W.J.3
-
20
-
-
59649101587
-
Enhanced authentication scheme with anonymity for roaming service in global mobility networks
-
Chang CC, Lee CY, Chiu YC. Enhanced authentication scheme with anonymity for roaming service in global mobility networks. Computer Communications 2009; 32(4): 611–618.
-
(2009)
Computer Communications
, vol.32
, Issue.4
, pp. 611-618
-
-
Chang, C.C.1
Lee, C.Y.2
Chiu, Y.C.3
-
21
-
-
68349157387
-
Weaknesses in an anonymous authentication scheme for roaming service in global mobility networks
-
Youn TY, Park YH, Lim J. Weaknesses in an anonymous authentication scheme for roaming service in global mobility networks. IEEE Communications Letters 2009; 13(7): 471–473.
-
(2009)
IEEE Communications Letters
, vol.13
, Issue.7
, pp. 471-473
-
-
Youn, T.Y.1
Park, Y.H.2
Lim, J.3
-
22
-
-
78751648745
-
A strong user authentication scheme with smart cards for wireless communications
-
He D, Ma M, Zhang Y, Chen C, Bu J. A strong user authentication scheme with smart cards for wireless communications. Computer Communications 2011; 34(3): 367–374.
-
(2011)
Computer Communications
, vol.34
, Issue.3
, pp. 367-374
-
-
He, D.1
Ma, M.2
Zhang, Y.3
Chen, C.4
Bu, J.5
-
23
-
-
82755161699
-
Enhanced secure anonymous authentication scheme for roaming service in global mobility networks
-
Mun H, Han K, Lee YS, Yeun CY, Choi HH. Enhanced secure anonymous authentication scheme for roaming service in global mobility networks. Mathematical and Computer Modelling 2012; 55(1): 214–222.
-
(2012)
Mathematical and Computer Modelling
, vol.55
, Issue.1
, pp. 214-222
-
-
Mun, H.1
Han, K.2
Lee, Y.S.3
Yeun, C.Y.4
Choi, H.H.5
-
24
-
-
84893853289
-
Secure and efficient anonymous authentication scheme in global mobility networks
-
Kim JS, Kwak J. Secure and efficient anonymous authentication scheme in global mobility networks. Journal of Applied Mathematics 2013; 2013. Article ID: 302582.
-
(2013)
Journal of Applied Mathematics
, vol.2013
-
-
Kim, J.S.1
Kwak, J.2
-
25
-
-
84878975055
-
An enhanced authentication scheme with privacy preservation for roaming service in global mobility networks
-
Jiang Q, Ma J, Li G, Yang L. An enhanced authentication scheme with privacy preservation for roaming service in global mobility networks. Wireless Personal Communications 2013; 68(4): 1477–1491.
-
(2013)
Wireless Personal Communications
, vol.68
, Issue.4
, pp. 1477-1491
-
-
Jiang, Q.1
Ma, J.2
Li, G.3
Yang, L.4
-
26
-
-
84931577706
-
An efficient secure authentication scheme with user anonymity for roaming user in ubiquitous networks
-
Shin S, Yeh H, Kim K. An efficient secure authentication scheme with user anonymity for roaming user in ubiquitous networks. Peer-to-peer Networking and Applications 2015; 8(4): 674–683.
-
(2015)
Peer-to-peer Networking and Applications
, vol.8
, Issue.4
, pp. 674-683
-
-
Shin, S.1
Yeh, H.2
Kim, K.3
-
27
-
-
84890555385
-
A secure and effective anonymous user authentication scheme for roaming service in global mobility networks
-
Wen F, Susilo W, Yang G. A secure and effective anonymous user authentication scheme for roaming service in global mobility networks. Wireless Personal Communications 2013; 73(3): 993–1004.
-
(2013)
Wireless Personal Communications
, vol.73
, Issue.3
, pp. 993-1004
-
-
Wen, F.1
Susilo, W.2
Yang, G.3
-
28
-
-
85010422698
-
A lightweight anonymous authentication scheme for consumer roaming in ubiquitous networks with provable security
-
Farash MS, Chaudhry SA, Heydari M, Sadough S, Mohammad S, Kumari S, Khan MK. A lightweight anonymous authentication scheme for consumer roaming in ubiquitous networks with provable security. International Journal of Communication Systems 2015. DOI: 10.1002/dac.3019.
-
(2015)
International Journal of Communication Systems
-
-
Farash, M.S.1
Chaudhry, S.A.2
Heydari, M.3
Sadough, S.4
Mohammad, S.5
Kumari, S.6
Khan, M.K.7
-
29
-
-
84944168470
-
A privacy preserving authentication scheme for roaming services in global mobility networks
-
Zhang G, Fan D, Zhang Y, Li X, Liu X. A privacy preserving authentication scheme for roaming services in global mobility networks. Security and Communicaton Networks 2015; 8: 2850–2859.
-
(2015)
Security and Communicaton Networks
, vol.8
, pp. 2850-2859
-
-
Zhang, G.1
Fan, D.2
Zhang, Y.3
Li, X.4
Liu, X.5
-
30
-
-
85027455461
-
Lightweight and energy-efficient mutual authentication and key agreement scheme with user anonymity for secure communication in global mobility networks
-
Gope P, Hwang T. Lightweight and energy-efficient mutual authentication and key agreement scheme with user anonymity for secure communication in global mobility networks. IEEE Systems Journal 2015. DOI: 10.1109/JSYST.2015.2416396.
-
(2015)
IEEE Systems Journal
-
-
Gope, P.1
Hwang, T.2
-
31
-
-
84954088991
-
An efficient mutual authentication and key agreement scheme preserving strong anonymity of the mobile user in global mobility networks
-
Gope P, Hwang T. An efficient mutual authentication and key agreement scheme preserving strong anonymity of the mobile user in global mobility networks. Journal of Network and Computer Applications 2016; 62: 1–8.
-
(2016)
Journal of Network and Computer Applications
, vol.62
, pp. 1-8
-
-
Gope, P.1
Hwang, T.2
-
32
-
-
84975275069
-
Anonymous two-factor authentication in distributed systems: certain goals are beyond attainment
-
Wang D, He D, Wang P, Chu CH. Anonymous two-factor authentication in distributed systems: certain goals are beyond attainment. IEEE Transactions on Dependable and Secure Computing 2015; 12(4): 428–442.
-
(2015)
IEEE Transactions on Dependable and Secure Computing
, vol.12
, Issue.4
, pp. 428-442
-
-
Wang, D.1
He, D.2
Wang, P.3
Chu, C.H.4
-
33
-
-
84939573910
-
Differential power analysis
-
In, Springer Berlin Heidelberg, Santa Barbara, California, USA
-
Kocher P, Jaffe J, Jun B. Differential power analysis. In Advances in Cryptology-CRYPTO'99. Springer Berlin Heidelberg: Santa Barbara, California, USA, 388–397; 1999.
-
(1999)
Advances in Cryptology-CRYPTO'99
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
34
-
-
0036566408
-
Examining smart-card security under the threat of power analysis attacks
-
Messerges TS, Dabbish EA, Sloan RH. Examining smart-card security under the threat of power analysis attacks. IEEE Transactions on Computers 2002; 51(5): 541–552.
-
(2002)
IEEE Transactions on Computers
, vol.51
, Issue.5
, pp. 541-552
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
-
35
-
-
79959430513
-
One for all call for one: unifying standard differential power analysis attacks
-
Mangard S, Oswald E, Standaert FX. One for all call for one: unifying standard differential power analysis attacks. IET Information Security 2011; 5(2): 100–110.
-
(2011)
IET Information Security
, vol.5
, Issue.2
, pp. 100-110
-
-
Mangard, S.1
Oswald, E.2
Standaert, F.X.3
-
36
-
-
18744393738
-
Security proofs for an efficient password-based key exchange
-
ACM New York, Washington, DC, USA
-
Bresson E, Chevassut O, Pointcheval D. Security proofs for an efficient password-based key exchange. Proceedings of the 10th ACM Conference on Computer and Communications Security, ACM New York, Washington, DC, USA, 2003; 241–250.
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communications Security
, pp. 241-250
-
-
Bresson, E.1
Chevassut, O.2
Pointcheval, D.3
|