-
1
-
-
0019634370
-
Password authentication with insecure communication
-
Lamport L. Password authentication with insecure communication. Communications of the ACM 1981; 24(11):770–772.
-
(1981)
Communications of the ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
3
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
ElGamal T. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory 1985; 32(1):469–472.
-
(1985)
IEEE Transactions on Information Theory
, vol.32
, Issue.1
, pp. 469-472
-
-
ElGamal, T.1
-
4
-
-
0034317895
-
Cryptanalysis of a remote user authentication scheme using smart cards
-
Chan CK, Cheng LM. Cryptanalysis of a remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics 2000; 46(4):992–993.
-
(2000)
IEEE Transactions on Consumer Electronics
, vol.46
, Issue.4
, pp. 992-993
-
-
Chan, C.K.1
Cheng, L.M.2
-
5
-
-
0344197994
-
Some forgery attacks on a remote user authentication scheme using smart cards
-
Chang CC, Hwang KF. Some forgery attacks on a remote user authentication scheme using smart cards. Informatica 2003; 14(3):289–294.
-
(2003)
Informatica
, vol.14
, Issue.3
, pp. 289-294
-
-
Chang, C.C.1
Hwang, K.F.2
-
6
-
-
0842267293
-
Security of a remote user authentication scheme using smart cards
-
Yeh HT, Sun HM, Hsieh BT. Security of a remote user authentication scheme using smart cards. IEICE Transactions on Communications 2004; E87-B(1):192–194.
-
(2004)
IEICE Transactions on Communications
, vol.E87-B
, Issue.1
, pp. 192-194
-
-
Yeh, H.T.1
Sun, H.M.2
Hsieh, B.T.3
-
7
-
-
24944502757
-
Efficient nonce-based remote user authentication scheme using smart cards
-
Lee SW, Kim HS, Yoo KY. Efficient nonce-based remote user authentication scheme using smart cards. Applied Mathematics and Computation 2005; 167(1):355–361.
-
(2005)
Applied Mathematics and Computation
, vol.167
, Issue.1
, pp. 355-361
-
-
Lee, S.W.1
Kim, H.S.2
Yoo, K.Y.3
-
8
-
-
61849096169
-
More secure remote user authentication scheme
-
Kim SK, Chung MG. More secure remote user authentication scheme. Computer Communications 2009; 32(6):1018–1021.
-
(2009)
Computer Communications
, vol.32
, Issue.6
, pp. 1018-1021
-
-
Kim, S.K.1
Chung, M.G.2
-
9
-
-
44549086640
-
A new mutual authentication scheme based on nonce and smart cards
-
Liu JY, Zhou AM, Gao MX. A new mutual authentication scheme based on nonce and smart cards. Computer Communications 2008; 31(10):2205–2209.
-
(2008)
Computer Communications
, vol.31
, Issue.10
, pp. 2205-2209
-
-
Liu, J.Y.1
Zhou, A.M.2
Gao, M.X.3
-
10
-
-
0242552286
-
Security enhancement for the timestamp based password authentication scheme using smart cards
-
Shen JJ, Lin CW, Hwang MS. Security enhancement for the timestamp based password authentication scheme using smart cards. Computers & Security 2003; 22(7):591–595.
-
(2003)
Computers & Security
, vol.22
, Issue.7
, pp. 591-595
-
-
Shen, J.J.1
Lin, C.W.2
Hwang, M.S.3
-
11
-
-
0142007144
-
A user friendly remote authentication scheme with smart cards
-
Wu ST, Chieu BC. A user friendly remote authentication scheme with smart cards. Computers & Security 2003; 22(6):547–550.
-
(2003)
Computers & Security
, vol.22
, Issue.6
, pp. 547-550
-
-
Wu, S.T.1
Chieu, B.C.2
-
12
-
-
84883653668
-
An enhanced smart card based remote user password authentication scheme
-
Li X, Niu JW, Khan MK, Liao JG. An enhanced smart card based remote user password authentication scheme. Journal of Network and Computer Applications 2013; 36(5):1365–1371.
-
(2013)
Journal of Network and Computer Applications
, vol.36
, Issue.5
, pp. 1365-1371
-
-
Li, X.1
Niu, J.W.2
Khan, M.K.3
Liao, J.G.4
-
13
-
-
84856217617
-
An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards
-
Li X, Xiong YP, Ma J, Wang WD. An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards. Journal of Network and Computer Applications 2012; 35(2):763–769.
-
(2012)
Journal of Network and Computer Applications
, vol.35
, Issue.2
, pp. 763-769
-
-
Li, X.1
Xiong, Y.P.2
Ma, J.3
Wang, W.D.4
-
14
-
-
84878597719
-
A novel smart card and dynamic ID based remote user authentication scheme for multi-server environments
-
Li X, Ma J, Wang WD, Xiong YP, Zhang JS. A novel smart card and dynamic ID based remote user authentication scheme for multi-server environments. Mathematical and Computer Modelling 2013; 58(1–2):85–95.
-
(2013)
Mathematical and Computer Modelling
, vol.58
, Issue.1-2
, pp. 85-95
-
-
Li, X.1
Ma, J.2
Wang, W.D.3
Xiong, Y.P.4
Zhang, J.S.5
-
16
-
-
0037030525
-
Fingerprint-based remote user authentication scheme using smart cards
-
Lee JK, Ryu SR, Yoo KY. Fingerprint-based remote user authentication scheme using smart cards. Electronics Letters 2002; 38(12):554–555.
-
(2002)
Electronics Letters
, vol.38
, Issue.12
, pp. 554-555
-
-
Lee, J.K.1
Ryu, S.R.2
Yoo, K.Y.3
-
17
-
-
4043139259
-
A flexible biometrics remote user authentication scheme
-
Lin CH, Lai YY. A flexible biometrics remote user authentication scheme. Computer Standards & Interfaces 2004; 27(1):19–23.
-
(2004)
Computer Standards & Interfaces
, vol.27
, Issue.1
, pp. 19-23
-
-
Lin, C.H.1
Lai, Y.Y.2
-
18
-
-
33645767442
-
Remarks on fingerprint-based remote user authentication scheme using smart cards
-
Chang CC, Lin IC. Remarks on fingerprint-based remote user authentication scheme using smart cards. ACM SIGOPS Operating Systems Review 2004; 38(4):91–96.
-
(2004)
ACM SIGOPS Operating Systems Review
, vol.38
, Issue.4
, pp. 91-96
-
-
Chang, C.C.1
Lin, I.C.2
-
19
-
-
23344449693
-
ID-based password authentication scheme using smart cards and fingerprints
-
Kim HS, Lee SW, Yoo KY. ID-based password authentication scheme using smart cards and fingerprints. ACM SIGOPS Operating Systems Review 2003; 37(4):32–41.
-
(2003)
ACM SIGOPS Operating Systems Review
, vol.37
, Issue.4
, pp. 32-41
-
-
Kim, H.S.1
Lee, S.W.2
Yoo, K.Y.3
-
20
-
-
33645758252
-
Cryptanalysis of an ID-based password authentication scheme using smart cards and fingerprints
-
Scott M. Cryptanalysis of an ID-based password authentication scheme using smart cards and fingerprints. ACM SIGOPS Operating Systems Review 2004; 38(2):73–75.
-
(2004)
ACM SIGOPS Operating Systems Review
, vol.38
, Issue.2
, pp. 73-75
-
-
Scott, M.1
-
21
-
-
33751167604
-
Improving the security of ‘a flexible biometrics remote user authentication scheme’
-
Khan MK, Zhang JS. Improving the security of ‘a flexible biometrics remote user authentication scheme’. Computer Standards & Interfaces 2007; 29(1):82–85.
-
(2007)
Computer Standards & Interfaces
, vol.29
, Issue.1
, pp. 82-85
-
-
Khan, M.K.1
Zhang, J.S.2
-
22
-
-
11244352328
-
Proceedings of the 2004 IEEE International Conference on Multimedia & Expo (ICME 2004)
-
Taipei, Taiwan
-
Lin CH, Lai YY. A fingerprint-based user authentication scheme for multimedia systems. Proceedings of the 2004 IEEE International Conference on Multimedia & Expo (ICME 2004), Taipei, Taiwan, Vol. 2, 2004; 935–938.
-
(2004)
A fingerprint-based user authentication scheme for multimedia systems
, vol.2
, pp. 935-938
-
-
Lin, C.H.1
Lai, Y.Y.2
-
23
-
-
33745306259
-
A new efficient fingerprint-based remote user authentication scheme for multimedia systems
-
In, Lecture Notes in Computer Science, Springer, Berlin Heidelberg
-
Yoon EJ, Yoo KY. A new efficient fingerprint-based remote user authentication scheme for multimedia systems. In Knowledge-based Intelligent Information and Engineering Systems. Lecture Notes in Computer Science, Vol. 3683. Springer: Berlin Heidelberg, 2005; 332–338.
-
(2005)
Knowledge-based Intelligent Information and Engineering Systems
, vol.3683
, pp. 332-338
-
-
Yoon, E.J.1
Yoo, K.Y.2
-
24
-
-
70349792182
-
An efficient biometrics-based remote user authentication scheme using smart cards
-
Li CT, Hwang MS. An efficient biometrics-based remote user authentication scheme using smart cards. Journal of Network and Computer Applications 2010; 33(1):1–5.
-
(2010)
Journal of Network and Computer Applications
, vol.33
, Issue.1
, pp. 1-5
-
-
Li, C.T.1
Hwang, M.S.2
-
25
-
-
78649335192
-
Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards
-
Li X, Niu JW, Ma J, Wang WD, Liu CL. Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards. Journal of Network and Computer Applications 2011; 34(1):73–79.
-
(2011)
Journal of Network and Computer Applications
, vol.34
, Issue.1
, pp. 73-79
-
-
Li, X.1
Niu, J.W.2
Ma, J.3
Wang, W.D.4
Liu, C.L.5
-
26
-
-
81855227196
-
Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards
-
Das AK. Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards. IET Information Security 2011; 5(3):145–151.
-
(2011)
IET Information Security
, vol.5
, Issue.3
, pp. 145-151
-
-
Das, A.K.1
-
27
-
-
84864950885
-
Security analysis and enhancements of an effective biometric-based remote user authentication scheme using smart cards
-
An YH. Security analysis and enhancements of an effective biometric-based remote user authentication scheme using smart cards. Journal of Biomedicine and Biotechnology 2012; 2012, Article ID 519723, 6 pages. doi:10.1155/2012/519723.
-
(2012)
Journal of Biomedicine and Biotechnology
, vol.2012
, pp. 6
-
-
An, Y.H.1
-
29
-
-
35048865463
-
Fuzzy extractors: how to generate strong keys from biometrics and other noisy data
-
In, LNCS, Springer Berlin Heidelberg, Interlaken, Switzerland
-
Dodis Y, Reyzin L, Smith A. Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. In Advances in Cryptology, Eurocrypt 2004. LNCS. Springer Berlin Heidelberg: Interlaken, Switzerland, Vol. 3027. 2004; 523–540.
-
(2004)
Advances in Cryptology, Eurocrypt 2004
, vol.3027
, pp. 523-540
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
30
-
-
79959689122
-
A generic framework for three-factor authentication: preserving security and privacy in distributed systems
-
Huang XY, Xiang Y, Chonka A, Zhou JY, Deng RH. A generic framework for three-factor authentication: preserving security and privacy in distributed systems. IEEE Transactions on Parallel and Distributed Systems 2011; 22(8):1390–1397.
-
(2011)
IEEE Transactions on Parallel and Distributed Systems
, vol.22
, Issue.8
, pp. 1390-1397
-
-
Huang, X.Y.1
Xiang, Y.2
Chonka, A.3
Zhou, J.Y.4
Deng, R.H.5
-
31
-
-
84878967179
-
Cryptanalysis and improvement of a password-based remote user authentication scheme without smart cards
-
He DB, Wang D, Wu SH. Cryptanalysis and improvement of a password-based remote user authentication scheme without smart cards. Information Technology and Control 2013; 42(2):170–177.
-
(2013)
Information Technology and Control
, vol.42
, Issue.2
, pp. 170-177
-
-
He, D.B.1
Wang, D.2
Wu, S.H.3
-
32
-
-
80051571433
-
An ID-based client authentication with key agreement protocol for mobile client–server environment on ECC with provable security
-
He DB, Chen JH, Hu J. An ID-based client authentication with key agreement protocol for mobile client–server environment on ECC with provable security. Information Fusion 2012; 13(3):223–230.
-
(2012)
Information Fusion
, vol.13
, Issue.3
, pp. 223-230
-
-
He, D.B.1
Chen, J.H.2
Hu, J.3
-
33
-
-
84864058187
-
A more secure authentication scheme for telecare medicine information systems
-
He DB, Chen JH, Zhang R. A more secure authentication scheme for telecare medicine information systems. Journal of Medical Systems 2012; 36(3):1989–1995.
-
(2012)
Journal of Medical Systems
, vol.36
, Issue.3
, pp. 1989-1995
-
-
He, D.B.1
Chen, J.H.2
Zhang, R.3
-
34
-
-
84867612184
-
Detecting SYN flooding attacks based on traffic prediction
-
Wang SG, Sun QB, Zou H, Yang FC. Detecting SYN flooding attacks based on traffic prediction. Security and Communication Networks 2012; 5(10):1131–1140.
-
(2012)
Security and Communication Networks
, vol.5
, Issue.10
, pp. 1131-1140
-
-
Wang, S.G.1
Sun, Q.B.2
Zou, H.3
Yang, F.C.4
-
35
-
-
0000474763
-
Differential power analysis
-
In, Springer Berlin Heidelberg, Santa Barbara, California, USA
-
Kocher P, Jaffe J, Jun B. Differential power analysis. In Advances in Cryptology, CRYPTO99. Springer Berlin Heidelberg: Santa Barbara, California, USA, Vol. 1666. 1999; 788–797.
-
(1999)
Advances in Cryptology, CRYPTO99
, vol.1666
, pp. 788-797
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
36
-
-
0036566408
-
Examining smart card security under the threat of power analysis attacks
-
Messerges TS, Dabbish EA, Sloan RH. Examining smart card security under the threat of power analysis attacks. IEEE Transactions on Computers 2002; 51(5):541–552.
-
(2002)
IEEE Transactions on Computers
, vol.51
, Issue.5
, pp. 541-552
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
|