-
1
-
-
84956941011
-
Cryptanalysis and improvement of a secure password authentication mechanism for seamless handover in proxy mobile ipv6 networks
-
PID: 26580963
-
Alizadeh, M., Zamani, M., Baharun, S., Manaf, A. A., Sakurai, K., Anada, H., Keshavarz, H., Chaudhry, S. A., Khan, M. K., Cryptanalysis and improvement of a secure password authentication mechanism for seamless handover in proxy mobile ipv6 networks. PloS one 10(11):e0142716, 2015.
-
(2015)
PloS one
, vol.10
, Issue.11
-
-
Alizadeh, M.1
Zamani, M.2
Baharun, S.3
Manaf, A.A.4
Sakurai, K.5
Anada, H.6
Keshavarz, H.7
Chaudhry, S.A.8
Khan, M.K.9
-
2
-
-
84988361005
-
-
Mir, O., and Nikooghadam, M.: A secure biometrics based authentication with key agreement scheme in telemedicine networks for e-health services
-
Mir, O., and Nikooghadam, M.: A secure biometrics based authentication with key agreement scheme in telemedicine networks for e-health services
-
-
-
-
3
-
-
84922001116
-
Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks
-
He, D., Kumar, N., Chen, J., Lee, C.-C., Chilamkurti, N., Yeo, S.-S., Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks. Multimed. Syst. 21(1): 49–60, 2013.
-
(2013)
Multimed. Syst.
, vol.21
, Issue.1
, pp. 49-60
-
-
He, D.1
Kumar, N.2
Chen, J.3
Lee, C.-C.4
Chilamkurti, N.5
Yeo, S.-S.6
-
4
-
-
84992456241
-
Security analysis and design of an efficient ecc-based two-factor password authentication scheme
-
Maitra, T., Obaidat, M. S., Islam, S. H., Giri, D., Amin, R.: Security analysis and design of an efficient ecc-based two-factor password authentication scheme. Security and Communication Networks (2016) n/a–n/aSec 1596 doi:10.1002/sec.1596
-
Security and Communication Networks (2016) n/a–n/aSec
-
-
Maitra, T.1
Obaidat, M.S.2
Islam, S.H.3
Giri, D.4
Amin, R.5
-
5
-
-
84906774949
-
On the anonymity of two-factor authentication schemes for wireless sensor networks: attacks, principle and solutions
-
Wang, D., and Wang, P., On the anonymity of two-factor authentication schemes for wireless sensor networks: attacks, principle and solutions. Comput. Netw. 73:41–57, 2014.
-
(2014)
Comput. Netw.
, vol.73
, pp. 41-57
-
-
Wang, D.1
Wang, P.2
-
6
-
-
84975275069
-
Anonymous two-factor authentication in distributed systems: certain goals are beyond attainment
-
COI: 1:CAS:528:DC%2BC2cXlvV2n
-
Wang, D., He, D., Wang, P., Chu, C., Anonymous two-factor authentication in distributed systems: certain goals are beyond attainment. IEEE Trans Depend Secur Comput 99:1–1, 2014. doi:10.1109/TDSC.2014.2355850.
-
(2014)
IEEE Trans Depend Secur Comput
, vol.99
, pp. 1
-
-
Wang, D.1
He, D.2
Wang, P.3
Chu, C.4
-
7
-
-
84964246143
-
Anonymous authentication for wireless body area networks with provable security
-
He, D., Zeadally, S., Kumar, N., Lee, J. H., Anonymous authentication for wireless body area networks with provable security. IEEE Syst J 99:1–12, 2016. doi:10.1109/JSYST.2016.2544805.
-
(2016)
IEEE Syst J
, vol.99
, pp. 1-12
-
-
He, D.1
Zeadally, S.2
Kumar, N.3
Lee, J.H.4
-
8
-
-
85027949488
-
Robust biometrics-based authentication scheme for multiserver environment
-
He, D., and Wang, D., Robust biometrics-based authentication scheme for multiserver environment. IEEE Syst J 9(3):816–823, 2015. doi:10.1109/JSYST.2014.2301517.
-
(2015)
IEEE Syst J
, vol.9
, Issue.3
, pp. 816-823
-
-
He, D.1
Wang, D.2
-
9
-
-
84988344651
-
A certificateless multiple-key agreement protocol based on bilinear pairings
-
Farash, M. S., Ahmadian-Attari, M., Bayat, M., A certificateless multiple-key agreement protocol based on bilinear pairings. IACR Crypt ePrint Arch 2012:393, 2012.
-
(2012)
IACR Crypt ePrint Arch
, vol.2012
, pp. 393
-
-
Farash, M.S.1
Ahmadian-Attari, M.2
Bayat, M.3
-
10
-
-
84876280558
-
A new efficient authenticated multiple-key exchange protocol from bilinear pairings
-
Farash, M. S., Attari, M. A., Atani, R. E., Jami, M., A new efficient authenticated multiple-key exchange protocol from bilinear pairings. Comput Elect Eng 39(2):530–541, 2013.
-
(2013)
Comput Elect Eng
, vol.39
, Issue.2
, pp. 530-541
-
-
Farash, M.S.1
Attari, M.A.2
Atani, R.E.3
Jami, M.4
-
11
-
-
84943159629
-
An efficient and practical smart card based anonymity preserving user authentication scheme for tmis using elliptic curve cryptography
-
Amin, R., Islam, S. H., Biswas, G., Khan, M. K., Kumar, N., An efficient and practical smart card based anonymity preserving user authentication scheme for tmis using elliptic curve cryptography. J Med Syst 39 (11):1–18, 2015.
-
(2015)
J Med Syst
, vol.39
, Issue.11
, pp. 1-18
-
-
Amin, R.1
Islam, S.H.2
Biswas, G.3
Khan, M.K.4
Kumar, N.5
-
12
-
-
84921899111
-
-
Alizadeh, M., Baharun, S., Zamani, M., Khodadadi, T., Darvishi, M., Gholizadeh, S., Ahmadi, H., Anonymity and untraceability assessment of authentication protocols in proxy mobile ipv6. Jurnal Teknologi 72(5).
-
Alizadeh, M., Baharun, S., Zamani, M., Khodadadi, T., Darvishi, M., Gholizadeh, S., Ahmadi, H., Anonymity and untraceability assessment of authentication protocols in proxy mobile ipv6. Jurnal Teknologi 72(5).
-
-
-
-
13
-
-
84988410588
-
-
He, D., Kumar, N., Chilamkurti, N.: A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks. Inf. Sci.
-
He, D., Kumar, N., Chilamkurti, N.: A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks. Inf. Sci.
-
-
-
-
14
-
-
85008375269
-
An efficient and secure authentication and key agreement scheme for session initiation protocol using ecc
-
Arshad, H., and Nikooghadam, M., An efficient and secure authentication and key agreement scheme for session initiation protocol using ecc. Multimed Tools Appl.,1–17, 2014.
-
(2014)
Multimed Tools Appl.
, pp. 1-17
-
-
Arshad, H.1
Nikooghadam, M.2
-
15
-
-
85008468625
-
One-to-many authentication for access control in mobile pay-tv systems
-
He, D., Kumar, N., Shen, H., Lee, J.-H., One-to-many authentication for access control in mobile pay-tv systems. Sci. Chin. Inf. Sci.,1–14, 2015.
-
(2015)
Sci. Chin. Inf. Sci.
, pp. 1-14
-
-
He, D.1
Kumar, N.2
Shen, H.3
Lee, J.-H.4
-
16
-
-
85043268105
-
Certificateless public auditing scheme for cloud-assisted wireless body area networks
-
He, D., Zeadally, S., Wu, L., Certificateless public auditing scheme for cloud-assisted wireless body area networks. IEEE Syst. J. 99:1–10, 2015. doi:10.1109/JSYST.2015.2428620.
-
(2015)
IEEE Syst. J.
, vol.99
, pp. 1-10
-
-
He, D.1
Zeadally, S.2
Wu, L.3
-
17
-
-
12344259813
-
Biohashing: two factor authentication featuring fingerprint data and tokenised random number
-
Jin, A. T. B., Ling, D. N. C., Goh, A., Biohashing: two factor authentication featuring fingerprint data and tokenised random number. Pattern Recog. 37(11):2245–2255, 2004.
-
(2004)
Pattern Recog.
, vol.37
, Issue.11
, pp. 2245-2255
-
-
Jin, A.T.B.1
Ling, D.N.C.2
Goh, A.3
-
18
-
-
33750533142
-
An improved biohashing for human authentication
-
Lumini, A., and Nanni, L., An improved biohashing for human authentication. Pattern Recog. 40(3): 1057–1065, 2007.
-
(2007)
Pattern Recog.
, vol.40
, Issue.3
, pp. 1057-1065
-
-
Lumini, A.1
Nanni, L.2
-
19
-
-
84904066086
-
A remote cancelable palmprint authentication protocol based on multi-directional two-dimensional palmphasor-fusion
-
Leng, L., Teoh, A. B. J., Li, M., Khan, M. K., A remote cancelable palmprint authentication protocol based on multi-directional two-dimensional palmphasor-fusion. Secur. Commun. Netw. 7(11):1860–1871, 2014.
-
(2014)
Secur. Commun. Netw.
, vol.7
, Issue.11
, pp. 1860-1871
-
-
Leng, L.1
Teoh, A.B.J.2
Li, M.3
Khan, M.K.4
-
20
-
-
84925674999
-
Alignment-free row-co-occurrence cancelable palmprint fuzzy vault
-
Leng, L., and Teoh, A. B. J., Alignment-free row-co-occurrence cancelable palmprint fuzzy vault. Pattern Recog. 48(7):2290–2303, 2015.
-
(2015)
Pattern Recog.
, vol.48
, Issue.7
, pp. 2290-2303
-
-
Leng, L.1
Teoh, A.B.J.2
-
21
-
-
51849131973
-
-
Eisenbarth, T., Kasper, T., Moradi, A., Paar, C., Salmasizadeh, M., Shalmani, M.: On the power of power analysis in the real world: A complete break of the keeloq code hopping scheme. In: Wagner, D. (Ed.) Advances in Cryptology, CRYPTO 2008, Vol. 5157 of Lecture Notes in Computer Science, pp. 203–220. Springer, Berlin (2008),
-
Eisenbarth, T., Kasper, T., Moradi, A., Paar, C., Salmasizadeh, M., Shalmani, M.: On the power of power analysis in the real world: A complete break of the keeloq code hopping scheme. In: Wagner, D. (Ed.) Advances in Cryptology, CRYPTO 2008, Vol. 5157 of Lecture Notes in Computer Science, pp. 203–220. Springer, Berlin (2008), 10.1007/978-3-540-85174-5_12
-
-
-
-
22
-
-
0020720357
-
On the security of public key protocols
-
Dolev, D., and Yao, A. C., On the security of public key protocols. IEEE Trans. Inform. Theory 29(2): 198–208, 1983. doi:10.1109/TIT.1983.1056650.
-
(1983)
IEEE Trans. Inform. Theory
, vol.29
, Issue.2
, pp. 198-208
-
-
Dolev, D.1
Yao, A.C.2
-
23
-
-
33747592366
-
Breaking a remote user authentication scheme for multi-server architecture
-
Cao, X., and Zhong, S., Breaking a remote user authentication scheme for multi-server architecture. IEEE Commun. Lett. 10(8):580–581, 2006. doi:10.1109/LCOMM.2006.1665116.
-
(2006)
IEEE Commun. Lett.
, vol.10
, Issue.8
, pp. 580-581
-
-
Cao, X.1
Zhong, S.2
-
24
-
-
0036566408
-
Examining smart-card security under the threat of power analysis attacks
-
Messerges, T. S., Dabbish, E. A., Sloan, R. H., Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Comput. 51(5):541–552, 2002.
-
(2002)
IEEE Trans. Comput.
, vol.51
, Issue.5
, pp. 541-552
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
-
25
-
-
84939573910
-
Differential power analysis
-
Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Advances in Cryptology CRYPTO 99, pp. 388–397. Springer (1999)
-
(1999)
Advances in Cryptology CRYPTO 99, pp. 388–397. Springer
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
26
-
-
84855301449
-
A new authenticated key agreement for session initiation protocol
-
Xie, Q., A new authenticated key agreement for session initiation protocol. Int. J. Commun. Syst. 25(1):47–54, 2012.
-
(2012)
Int. J. Commun. Syst.
, vol.25
, Issue.1
, pp. 47-54
-
-
Xie, Q.1
-
27
-
-
84904544082
-
Anonymous three-party password-authenticated key exchange scheme for telecare medical information systems
-
PID: 25047235
-
Xie, Q., Hu, B., Dong, N., Wong, D. S., Anonymous three-party password-authenticated key exchange scheme for telecare medical information systems. PloS one 9(7):e102747, 2014.
-
(2014)
PloS one
, vol.9
, Issue.7
-
-
Xie, Q.1
Hu, B.2
Dong, N.3
Wong, D.S.4
-
28
-
-
85041316505
-
Peer-to-Peer Netw
-
Wu, F., Xu, L., Kumari, S., Li, X., An improved and provably secure three-factor user authentication scheme for wireless sensor networks. Peer-to-Peer Netw. Appl.,1–20, 2016.
-
(2016)
Appl.
, pp. 1-20
-
-
Wu, F.1
Xu, L.2
Kumari, S.3
Li, X.4
-
29
-
-
84933564535
-
K., An enhanced privacy preserving remote user authentication scheme with provable security
-
Chaudhry, S. A., Farash, M. S., Naqvi, H., Kumari, S., Khan, M. K., An enhanced privacy preserving remote user authentication scheme with provable security. Secur. Commun. Netw., 1–13, 2015. doi:10.1002/sec.1299.
-
(2015)
Secur. Commun. Netw.
, pp. 1-13
-
-
Chaudhry, S.A.1
Farash, M.S.2
Naqvi, H.3
Kumari, S.4
Khan, M.5
-
30
-
-
84906835486
-
Advanced remote user authentication protocol for multi-server architecture based on ecc
-
Kalra, S., and Sood, S., Advanced remote user authentication protocol for multi-server architecture based on ecc. J. Inf. Secur. Appl. 18(2):98–107, 2013.
-
(2013)
J. Inf. Secur. Appl.
, vol.18
, Issue.2
, pp. 98-107
-
-
Kalra, S.1
Sood, S.2
-
31
-
-
84863921912
-
Cryptanalysis and improvement of a biometrics-based multi-server authentication with key agreement scheme
-
Kim, H., Jeon, W., Lee, K., Lee, Y., Won, D.: Cryptanalysis and improvement of a biometrics-based multi-server authentication with key agreement scheme. In: Computational Science and Its Applications–ICCSA 2012, pp. 391–406. Springer (2012)
-
(2012)
Computational Science and Its Applications–ICCSA 2012, pp. 391–406. Springer
-
-
Kim, H.1
Jeon, W.2
Lee, K.3
Lee, Y.4
Won, D.5
-
32
-
-
84872320813
-
Robust biometrics-based multi-server authentication with key agreement scheme for smart cards on elliptic curve cryptosystem
-
Yoon, E.-J., and Yoo, K.-Y., Robust biometrics-based multi-server authentication with key agreement scheme for smart cards on elliptic curve cryptosystem. J. Supercomput. 63(1):235–255, 2013.
-
(2013)
J. Supercomput.
, vol.63
, Issue.1
, pp. 235-255
-
-
Yoon, E.-J.1
Yoo, K.-Y.2
-
33
-
-
84901189762
-
A survey of sip authentication and key agreement schemes
-
Kilinc, H. H., and Yanik, T., A survey of sip authentication and key agreement schemes. IEEE Commun. Surveys Tutor. 16(2):1005–1023, 2014.
-
(2014)
IEEE Commun. Surveys Tutor.
, vol.16
, Issue.2
, pp. 1005-1023
-
-
Kilinc, H.H.1
Yanik, T.2
|