-
1
-
-
84902266968
-
An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps
-
Farash MS, Attari MA. An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps. Nonlinear Dynamics 2014; 77(1-2): 399–411.
-
(2014)
Nonlinear Dynamics
, vol.77
, Issue.1-2
, pp. 399-411
-
-
Farash, M.S.1
Attari, M.A.2
-
2
-
-
84902778355
-
An enhanced and secure three-party password-based authenticated key exchange protocol without using server's public-keys and symmetric cryptosystems
-
Farash MS, Attari MA. An enhanced and secure three-party password-based authenticated key exchange protocol without using server's public-keys and symmetric cryptosystems. Information Technology and Control 2014; 43(2): 143–150.
-
(2014)
Information Technology and Control
, vol.43
, Issue.2
, pp. 143-150
-
-
Farash, M.S.1
Attari, M.A.2
-
3
-
-
84928669844
-
Cryptanalysis and improvement of an improved two factor authentication protocol for telecare medical information systems
-
10.1007/s10916-015-0244-0.
-
Chaudhry SA, Naqvi H, Shon T, Sher M, Farash MS. Cryptanalysis and improvement of an improved two factor authentication protocol for telecare medical information systems. Journal of Medical Systems 2015; 39(6): 1–11. 10.1007/s10916-015-0244-0.
-
(2015)
Journal of Medical Systems
, vol.39
, Issue.6
, pp. 1-11
-
-
Chaudhry, S.A.1
Naqvi, H.2
Shon, T.3
Sher, M.4
Farash, M.S.5
-
4
-
-
84910619202
-
More secure smart card based remote user password authentication scheme with user anonymity
-
Kumari S, Khan MK. More secure smart card based remote user password authentication scheme with user anonymity. Security and Communication Networks 2013; 7(11): 2039–2053.
-
(2013)
Security and Communication Networks
, vol.7
, Issue.11
, pp. 2039-2053
-
-
Kumari, S.1
Khan, M.K.2
-
5
-
-
84958043300
-
A secure and efficient authenticated encryption for electronic payment systems using elliptic curve cryptography
-
10.1007/s10660-015-9192-5.
-
Chaudhry SA, Farash M, Naqvi H, Sher M. A secure and efficient authenticated encryption for electronic payment systems using elliptic curve cryptography. Electronic Commerce Research 2015: 1–27. 10.1007/s10660-015-9192-5.
-
(2015)
Electronic Commerce Research
, pp. 1-27
-
-
Chaudhry, S.A.1
Farash, M.2
Naqvi, H.3
Sher, M.4
-
6
-
-
79951785061
-
-
IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC), IEEE Explore, Hong Kong, China
-
Bayat M, Farash MS, Movahed A A novel secure bilinear pairing based remote user authentication scheme with smart card. IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC), IEEE Explore, Hong Kong, China, 2010; 578–582.
-
(2010)
A novel secure bilinear pairing based remote user authentication scheme with smart card
, pp. 578-582
-
-
Bayat, M.1
Farash, M.S.2
Movahed, A.3
-
7
-
-
84978805810
-
An anonymous and untraceable password-based authentication scheme for session initiation protocol using smart cards
-
10.1002/dac.2848.
-
Farash MS, Attari MA. An anonymous and untraceable password-based authentication scheme for session initiation protocol using smart cards. International Journal of Communication Systems 2014. 10.1002/dac.2848.
-
(2014)
International Journal of Communication Systems
-
-
Farash, M.S.1
Attari, M.A.2
-
8
-
-
84953364637
-
Security analysis and enhancements of an improved authentication for session initiation protocol with provable security
-
10.1007/s12083-014-0315-x.
-
Farash MS. Security analysis and enhancements of an improved authentication for session initiation protocol with provable security. Peer-to-peer Networking and Applications 2014. 10.1007/s12083-014-0315-x.
-
(2014)
Peer-to-peer Networking and Applications
-
-
Farash, M.S.1
-
9
-
-
85006172493
-
An improved password-based authentication scheme for session initiation protocol using smart cards without verification table
-
10.1002/dac.2879.
-
Farash MS, Attari MA. An improved password-based authentication scheme for session initiation protocol using smart cards without verification table. International Journal of Communication Systems 2014. 10.1002/dac.2879.
-
(2014)
International Journal of Communication Systems
-
-
Farash, M.S.1
Attari, M.A.2
-
10
-
-
84953639516
-
A provably secure and efficient authentication scheme for access control in mobile pay-TV systems
-
10.1007/s11042-014-2296-4.
-
Farash MS, Attari MA. A provably secure and efficient authentication scheme for access control in mobile pay-TV systems. Multimedia Tools and Applications 2014. 10.1007/s11042-014-2296-4.
-
(2014)
Multimedia Tools and Applications
-
-
Farash, M.S.1
Attari, M.A.2
-
11
-
-
84920868300
-
Cryptanalysis and improvement of ‘an improved authentication with key agreement scheme on elliptic curve cryptosystem for global mobility networks’
-
Farash MS. Cryptanalysis and improvement of ‘an improved authentication with key agreement scheme on elliptic curve cryptosystem for global mobility networks’. International Journal of Network Management 2014; 25(1): 31–51.
-
(2014)
International Journal of Network Management
, vol.25
, Issue.1
, pp. 31-51
-
-
Farash, M.S.1
-
12
-
-
84963686328
-
Cryptanalysis and improvement of a robust smart card secured authentication scheme on SIP using elliptic curve cryptography
-
10.1007/s11042-015-2487-8.
-
Farash MS, Kumari S, Bakhtiari M. Cryptanalysis and improvement of a robust smart card secured authentication scheme on SIP using elliptic curve cryptography. Multimedia Tools and Applications 2015. 10.1007/s11042-015-2487-8.
-
(2015)
Multimedia Tools and Applications
-
-
Farash, M.S.1
Kumari, S.2
Bakhtiari, M.3
-
14
-
-
84953636249
-
An efficient and secure authentication and key agreement scheme for session initiation protocol using ECC
-
10.1007/s11042-014-2282-x.
-
Arshad H, Nikooghadam M. An efficient and secure authentication and key agreement scheme for session initiation protocol using ECC. Multimedia Tools and Applications 2014. 10.1007/s11042-014-2282-x.
-
(2014)
Multimedia Tools and Applications
-
-
Arshad, H.1
Nikooghadam, M.2
-
15
-
-
84904860928
-
A secure authentication scheme for session initiation protocol by using ECC on the basis of the Tang and Liu scheme
-
Irshad A, Sher M, Faisal MS, Ghani A, Hassan MU, Shehzad Ashraf Ch. A secure authentication scheme for session initiation protocol by using ECC on the basis of the Tang and Liu scheme. Security and Communication Networks 2013; 7(8): 1210–1218.
-
(2013)
Security and Communication Networks
, vol.7
, Issue.8
, pp. 1210-1218
-
-
Irshad, A.1
Sher, M.2
Faisal, M.S.3
Ghani, A.4
Hassan, M.U.5
Shehzad Ashraf, C.6
-
16
-
-
84929842561
-
A single round-trip SIP authentication scheme for voice over Internet protocol using smart card
-
Irshad A, Sher M, Rehman E, Shehzad Ashraf Ch, Hassan MU, Ghani A. A single round-trip SIP authentication scheme for voice over Internet protocol using smart card. Multimedia Tools and Applications 2013; 74(11): 3967–3984.
-
(2013)
Multimedia Tools and Applications
, vol.74
, Issue.11
, pp. 3967-3984
-
-
Irshad, A.1
Sher, M.2
Rehman, E.3
Shehzad Ashraf, C.4
Hassan, M.U.5
Ghani, A.6
-
17
-
-
84863110431
-
-
ICNSC 2012, IEEE, China
-
ul Amin Noor, Asad Muhammad, Nizamuddin, ashraf Chaudhry Shehzad An authenticated key agreement with rekeying for secured body sensor networks based on hybrid cryptosystem. ICNSC 2012. IEEE, China, 2012; 118–121.
-
(2012)
An authenticated key agreement with rekeying for secured body sensor networks based on hybrid cryptosystem
, pp. 118-121
-
-
ul Amin, N.1
Asad, M.2
Nizamuddin3
ashraf Chaudhry, S.4
-
18
-
-
84902266968
-
An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps
-
Farash MS, Attari MA. An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps. Nonlinear Dynamics 2014; 77(1–2): 399–411.
-
(2014)
Nonlinear Dynamics
, vol.77
, Issue.1-2
, pp. 399-411
-
-
Farash, M.S.1
Attari, M.A.2
-
19
-
-
84902778355
-
An enhanced and secure three-party password-based authenticated key exchange protocol without using server?s public-keys and symmetric cryptosystems
-
Farash MS, Attari MA. An enhanced and secure three-party password-based authenticated key exchange protocol without using server?s public-keys and symmetric cryptosystems. Information Technology and Control 2014; 43(2): 143–150.
-
(2014)
Information Technology and Control
, vol.43
, Issue.2
, pp. 143-150
-
-
Farash, M.S.1
Attari, M.A.2
-
20
-
-
84899645425
-
Cryptanalysis and improvement of a chaotic maps-based key agreement protocol using Chebyshev sequence membership testing
-
Farash MS, Attari MA. Cryptanalysis and improvement of a chaotic maps-based key agreement protocol using Chebyshev sequence membership testing. Nonlinear Dynamics 2014; 76(2): 1203–1213.
-
(2014)
Nonlinear Dynamics
, vol.76
, Issue.2
, pp. 1203-1213
-
-
Farash, M.S.1
Attari, M.A.2
-
21
-
-
84919877261
-
An efficient client-client password-based authentication scheme with provable security
-
Farash MS, Attari MA. An efficient client-client password-based authentication scheme with provable security. The Journal of Supercomputing 2014; 70(2): 1002–1022.
-
(2014)
The Journal of Supercomputing
, vol.70
, Issue.2
, pp. 1002-1022
-
-
Farash, M.S.1
Attari, M.A.2
-
22
-
-
85028212628
-
Cryptanalysis and improvement of a three-party password based authenticated key exchange protocol with user anonymity using extended chaotic maps
-
10.1002/dac.2912.
-
Farash MS, Attari MA, Kumari S. Cryptanalysis and improvement of a three-party password based authenticated key exchange protocol with user anonymity using extended chaotic maps. International Journal of Communication Systems 2014. 10.1002/dac.2912.
-
(2014)
International Journal of Communication Systems
-
-
Farash, M.S.1
Attari, M.A.2
Kumari, S.3
-
23
-
-
84920868300
-
Cryptanalysis and improvement of ‘an improved authentication with key agreement scheme on elliptic curve cryptosystem for global mobility networks’
-
10.1002/nem.1883.
-
Farash MS. Cryptanalysis and improvement of ‘an improved authentication with key agreement scheme on elliptic curve cryptosystem for global mobility networks’. International Journal of Network Management 2014; 25(1): 31–51. 10.1002/nem.1883.
-
(2014)
International Journal of Network Management
, vol.25
, Issue.1
, pp. 31-51
-
-
Farash, M.S.1
-
24
-
-
85010364277
-
A provably secure and efficient two-party password-based explicit authenticated key exchange protocol resistance to password guessing attacks
-
10.1002/cpe.3477.
-
Farash MS, Islam SH, Obaidat MS. A provably secure and efficient two-party password-based explicit authenticated key exchange protocol resistance to password guessing attacks. Concurrency and Computation Practice & Experience 2015. 10.1002/cpe.3477.
-
(2015)
Concurrency and Computation Practice & Experience
-
-
Farash, M.S.1
Islam, S.H.2
Obaidat, M.S.3
-
25
-
-
1942487780
-
A new authentication scheme with anonymity for wireless environments
-
Zhu J, Ma J. A new authentication scheme with anonymity for wireless environments. IEEE Transactions on Consumer Electronics 2004; 50(1): 230–234.
-
(2004)
IEEE Transactions on Consumer Electronics
, vol.50
, Issue.1
, pp. 230-234
-
-
Zhu, J.1
Ma, J.2
-
26
-
-
33750133438
-
Security enhancement on a new authentication scheme with anonymity for wireless environments
-
Lee CC, Hwang MS, Liao IE. Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE Transactions on Industrial Electronics 2006; 53(5): 1683–1687.
-
(2006)
IEEE Transactions on Industrial Electronics
, vol.53
, Issue.5
, pp. 1683-1687
-
-
Lee, C.C.1
Hwang, M.S.2
Liao, I.E.3
-
27
-
-
54949140749
-
A secure authentication scheme with anonymity for wireless communications
-
Wu CC, Lee WB, Tsaur WJ. A secure authentication scheme with anonymity for wireless communications. IEEE Communications Letters 2008; 12(10): 722–723.
-
(2008)
IEEE Communications Letters
, vol.12
, Issue.10
, pp. 722-723
-
-
Wu, C.C.1
Lee, W.B.2
Tsaur, W.J.3
-
28
-
-
59649101587
-
Enhanced authentication scheme with anonymity for roaming service in global mobility networks
-
Chang CC, Lee CY, Chiu YC. Enhanced authentication scheme with anonymity for roaming service in global mobility networks. Computer Communications 2009; 32(4): 611–618.
-
(2009)
Computer Communications
, vol.32
, Issue.4
, pp. 611-618
-
-
Chang, C.C.1
Lee, C.Y.2
Chiu, Y.C.3
-
29
-
-
68349157387
-
Weaknesses in an anonymous authentication scheme for roaming service in global mobility networks
-
Youn TY, Park YH, Li MJ. Weaknesses in an anonymous authentication scheme for roaming service in global mobility networks. IEEE Communications Letters 2009; 13(7): 1118–1123.
-
(2009)
IEEE Communications Letters
, vol.13
, Issue.7
, pp. 1118-1123
-
-
Youn, T.Y.1
Park, Y.H.2
Li, M.J.3
-
30
-
-
82755161699
-
Enhanced secure anonymous authentication scheme for roaming service in global mobility networks
-
Mun H, Han K, Lee YS, Yeun CY, Choi HH. Enhanced secure anonymous authentication scheme for roaming service in global mobility networks. Mathematical and Computer Modeling 2012; 55(1–2): 214–222.
-
(2012)
Mathematical and Computer Modeling
, vol.55
, Issue.1-2
, pp. 214-222
-
-
Mun, H.1
Han, K.2
Lee, Y.S.3
Yeun, C.Y.4
Choi, H.H.5
-
31
-
-
46749099079
-
A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks
-
Li C, Hwang M, Chung Y. A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks. Computer Communication 2008; 31: 2803–2814.
-
(2008)
Computer Communication
, vol.31
, pp. 2803-2814
-
-
Li, C.1
Hwang, M.2
Chung, Y.3
-
32
-
-
82755189733
-
A novel user authentication and privacy preserving scheme with smart cards for wireless communications
-
Li CT, Lee CC. A novel user authentication and privacy preserving scheme with smart cards for wireless communications. Mathematical and Computer Modeling 2012; 55(1-2): 35–44.
-
(2012)
Mathematical and Computer Modeling
, vol.55
, Issue.1-2
, pp. 35-44
-
-
Li, C.T.1
Lee, C.C.2
-
34
-
-
79952059658
-
Lightweight and provably secure user authentication with anonymity for the global mobility network
-
Chen C, He D, Chan S, Bu J, Gao Y, Fan R. Lightweight and provably secure user authentication with anonymity for the global mobility network. International Journal of Communication Systems 2011; 24: 347–362.
-
(2011)
International Journal of Communication Systems
, vol.24
, pp. 347-362
-
-
Chen, C.1
He, D.2
Chan, S.3
Bu, J.4
Gao, Y.5
Fan, R.6
-
35
-
-
84895058980
-
Robust anonymous two-factor authentication scheme for roaming service in global mobility network
-
Xie Q, Hu B, Tan X, Bao M, Yu X. Robust anonymous two-factor authentication scheme for roaming service in global mobility network. Wireless Personal Communications 2013; 74(2): 601–614.
-
(2013)
Wireless Personal Communications
, vol.74
, Issue.2
, pp. 601-614
-
-
Xie, Q.1
Hu, B.2
Tan, X.3
Bao, M.4
Yu, X.5
-
36
-
-
84855586177
-
Design and validation of an efficient authentication scheme with anonymity for roaming service in global mobility networks
-
He D, Chan S, Chen C, Bu J. Design and validation of an efficient authentication scheme with anonymity for roaming service in global mobility networks. Wireless Personal Communications 2011; 61(2): 465–476.
-
(2011)
Wireless Personal Communications
, vol.61
, Issue.2
, pp. 465-476
-
-
He, D.1
Chan, S.2
Chen, C.3
Bu, J.4
-
37
-
-
84878975055
-
An enhanced authentication scheme with privacy preservation for roaming service in global mobility networks
-
Jiang Q, Ma J, Li G, Yang L. An enhanced authentication scheme with privacy preservation for roaming service in global mobility networks. Wireless Personal Communications 2013; 68(4): 1477–1491.
-
(2013)
Wireless Personal Communications
, vol.68
, Issue.4
, pp. 1477-1491
-
-
Jiang, Q.1
Ma, J.2
Li, G.3
Yang, L.4
-
38
-
-
84890555385
-
A secure and effective anonymous user authentication scheme for roaming service in global mobility networks
-
Wen F, Susilo W, Yang G. A secure and effective anonymous user authentication scheme for roaming service in global mobility networks. Wireless Personal Communications 2013; 73(3): 993–1004.
-
(2013)
Wireless Personal Communications
, vol.73
, Issue.3
, pp. 993-1004
-
-
Wen, F.1
Susilo, W.2
Yang, G.3
-
39
-
-
84931577706
-
An efficient secure authentication scheme with user anonymity for roaming user in ubiquitous networks
-
Shin S, Yeh H, Kim K. An efficient secure authentication scheme with user anonymity for roaming user in ubiquitous networks. Peer-to-peer Networking and Applications 2013; 8(4): 674–683.
-
(2013)
Peer-to-peer Networking and Applications
, vol.8
, Issue.4
, pp. 674-683
-
-
Shin, S.1
Yeh, H.2
Kim, K.3
|