-
1
-
-
84871816306
-
Secure id-based linkable and revocable-iff-linked ring signature with constant-size construction
-
Au MH, Liu JK, Susilo W, Yuen TH (2013) Secure id-based linkable and revocable-iff-linked ring signature with constant-size construction. Theor Comput Sci 469:1–14
-
(2013)
Theor Comput Sci
, vol.469
, pp. 1-14
-
-
Au, M.H.1
Liu, J.K.2
Susilo, W.3
Yuen, T.H.4
-
2
-
-
84888085041
-
Realizing fully secure unrestricted id-based ring signature in the standard model based on hibe
-
Au MH, Liu JK, Susilo W, Zhou J (2013) Realizing fully secure unrestricted id-based ring signature in the standard model based on hibe. IEEE Trans Inf Forensics Secur 8(12):1909– 1922
-
(2013)
IEEE Trans Inf Forensics Secur
, vol.8
, Issue.12
, pp. 1909-1922
-
-
Au, M.H.1
Liu, J.K.2
Susilo, W.3
Zhou, J.4
-
4
-
-
85010422698
-
A lightweight anonymous authentication scheme for consumer roaming in ubiquitous networks with provable security
-
Farash MS, Chaudhry SA, Heydari M, Sadough S, Mohammad S, Kumari S, Khan MK (2015) A lightweight anonymous authentication scheme for consumer roaming in ubiquitous networks with provable security. Int J Commun Syst. doi:10.1002/dac.3019
-
(2015)
Int J Commun Syst
-
-
Farash, M.S.1
Chaudhry, S.A.2
Heydari, M.3
Sadough, S.4
Mohammad, S.5
Kumari, S.6
Khan, M.K.7
-
5
-
-
84982135416
-
Enabling personalized search over encrypted outsourced data with efficiency improvement
-
Fu Z, Ren K, Shu J, Sun X, Huang F (2016) Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans Parallel Distrib Syst 27(9):2546– 2559
-
(2016)
IEEE Trans Parallel Distrib Syst
, vol.27
, Issue.9
, pp. 2546-2559
-
-
Fu, Z.1
Ren, K.2
Shu, J.3
Sun, X.4
Huang, F.5
-
6
-
-
84922280033
-
Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing
-
Fu Z, Sun X, Liu Q, Zhou L, Shu J (2015) Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans Commun 98(1):190–200
-
(2015)
IEICE Trans Commun
, vol.98
, Issue.1
, pp. 190-200
-
-
Fu, Z.1
Sun, X.2
Liu, Q.3
Zhou, L.4
Shu, J.5
-
7
-
-
84929958837
-
Enhanced secure mutual authentication and key agreement scheme preserving user anonymity in global mobile networks
-
Gope P, Hwang T (2015) Enhanced secure mutual authentication and key agreement scheme preserving user anonymity in global mobile networks. Wirel Pers Commun 82(4):2231–2245
-
(2015)
Wirel Pers Commun
, vol.82
, Issue.4
, pp. 2231-2245
-
-
Gope, P.1
Hwang, T.2
-
8
-
-
85027455461
-
Lightweight and energy-efficient mutual authentication and key agreement scheme with user anonymity for secure communication in global mobility networks
-
Gope P, Hwang T (2015) Lightweight and energy-efficient mutual authentication and key agreement scheme with user anonymity for secure communication in global mobility networks. IEEE Syst J. doi:10.1109/JSYST.2015.2416396
-
(2015)
IEEE Syst J
-
-
Gope, P.1
Hwang, T.2
-
9
-
-
84916883747
-
A variable threshold-value authentication architecture for wireless mesh networks
-
Guo P, Wang J, Geng XH, Kim CS, Kim J-U (2014) A variable threshold-value authentication architecture for wireless mesh networks. J Internet Technol 15(6):929–935
-
(2014)
J Internet Technol
, vol.15
, Issue.6
, pp. 929-935
-
-
Guo, P.1
Wang, J.2
Geng, X.H.3
Kim, C.S.4
Kim, J.-U.5
-
10
-
-
84855586177
-
Design and validation of an efficient authentication scheme with anonymity for roaming service in global mobility networks
-
He D, Chan S, Chen C, Bu J, Fan R (2011) Design and validation of an efficient authentication scheme with anonymity for roaming service in global mobility networks. Wirel Pers Commun 61(2):465–476
-
(2011)
Wirel Pers Commun
, vol.61
, Issue.2
, pp. 465-476
-
-
He, D.1
Chan, S.2
Chen, C.3
Bu, J.4
Fan, R.5
-
11
-
-
78751648745
-
A strong user authentication scheme with smart cards for wireless communications
-
He D, Ma M, Zhang Y, Chen C, Bu J (2011) A strong user authentication scheme with smart cards for wireless communications. Comput Commun 34(3):367–374
-
(2011)
Comput Commun
, vol.34
, Issue.3
, pp. 367-374
-
-
He, D.1
Ma, M.2
Zhang, Y.3
Chen, C.4
Bu, J.5
-
12
-
-
84895056653
-
Cryptanalysis and improvement of an anonymous authentication protocol for wireless access networks
-
He D, Zhang Y, Chen J (2014) Cryptanalysis and improvement of an anonymous authentication protocol for wireless access networks. Wirel Pers Commun 74(2):229–243
-
(2014)
Wirel Pers Commun
, vol.74
, Issue.2
, pp. 229-243
-
-
He, D.1
Zhang, Y.2
Chen, J.3
-
13
-
-
84878975055
-
An enhanced authentication scheme with privacy preservation for roaming service in global mobility networks
-
Jiang Q, Ma J, Li G, Yang L (2013) An enhanced authentication scheme with privacy preservation for roaming service in global mobility networks. Wirel Pers Commun 68(4):1477–1491
-
(2013)
Wirel Pers Commun
, vol.68
, Issue.4
, pp. 1477-1491
-
-
Jiang, Q.1
Ma, J.2
Li, G.3
Yang, L.4
-
14
-
-
84903610217
-
An efficient ticket based authentication protocol with unlinkability for wireless access networks
-
Jiang Q, Ma J, Li G, Yang L (2014) An efficient ticket based authentication protocol with unlinkability for wireless access networks. Wirel Pers Commun 77(2):1489–1506
-
(2014)
Wirel Pers Commun
, vol.77
, Issue.2
, pp. 1489-1506
-
-
Jiang, Q.1
Ma, J.2
Li, G.3
Yang, L.4
-
15
-
-
1542335451
-
Efficient password authenticated key agreement using smart cards
-
Juang W-S (2004) Efficient password authenticated key agreement using smart cards. Comput Secur 23 (2):167–173
-
(2004)
Comput Secur
, vol.23
, Issue.2
, pp. 167-173
-
-
Juang, W.-S.1
-
16
-
-
79951480285
-
Improved user authentication scheme with user anonymity for wireless communications
-
Kang M, Rhee Y-S, Choi J-Y (2011) Improved user authentication scheme with user anonymity for wireless communications. IEICE Trans Fundam Electron Commun Comput Sci 94(2): 860–864
-
(2011)
IEICE Trans Fundam Electron Commun Comput Sci
, vol.94
, Issue.2
, pp. 860-864
-
-
Kang, M.1
Rhee, Y.-S.2
Choi, J.-Y.3
-
17
-
-
84941420224
-
A secure authentication scheme with user anonymity for roaming service in global mobility networks
-
Karuppiah M, Saravanan R (2015) A secure authentication scheme with user anonymity for roaming service in global mobility networks. Wirel Pers Commun 84(3):2055–2078
-
(2015)
Wirel Pers Commun
, vol.84
, Issue.3
, pp. 2055-2078
-
-
Karuppiah, M.1
Saravanan, R.2
-
19
-
-
33750133438
-
Security enhancement on a new authentication scheme with anonymity for wireless environments
-
Lee C-C, Hwang M-S, Liao I-E (2006) Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE Trans Ind Electron 53(5):1683–1687
-
(2006)
IEEE Trans Ind Electron
, vol.53
, Issue.5
, pp. 1683-1687
-
-
Lee, C.-C.1
Hwang, M.-S.2
Liao, I.-E.3
-
20
-
-
67649184080
-
Security flaw of authentication scheme with anonymity for wireless communications
-
Lee J-S, Chang JH, Lee DH (2009) Security flaw of authentication scheme with anonymity for wireless communications. IEEE Commun Lett 13(5):292–293
-
(2009)
IEEE Commun Lett
, vol.13
, Issue.5
, pp. 292-293
-
-
Lee, J.-S.1
Chang, J.H.2
Lee, D.H.3
-
21
-
-
82755189733
-
A novel user authentication and privacy preserving scheme with smart cards for wireless communications
-
Li C-T, Lee C-C (2012) A novel user authentication and privacy preserving scheme with smart cards for wireless communications. Math Comput Model 55(1):35–44
-
(2012)
Math Comput Model
, vol.55
, Issue.1
, pp. 35-44
-
-
Li, C.-T.1
Lee, C.-C.2
-
22
-
-
84878597719
-
A novel smart card and dynamic id based remote user authentication scheme for multi-server environments
-
Li X, Ma J, Wang W, Xiong Y, Zhang J (2013) A novel smart card and dynamic id based remote user authentication scheme for multi-server environments. Math Comput Model 58(1): 85–95
-
(2013)
Math Comput Model
, vol.58
, Issue.1
, pp. 85-95
-
-
Li, X.1
Ma, J.2
Wang, W.3
Xiong, Y.4
Zhang, J.5
-
23
-
-
84883653668
-
An enhanced smart card based remote user password authentication scheme
-
Li X, Niu J, Khan MK, Liao J (2013) An enhanced smart card based remote user password authentication scheme. J Netw Comput Appl 36(5):1365–1371
-
(2013)
J Netw Comput Appl
, vol.36
, Issue.5
, pp. 1365-1371
-
-
Li, X.1
Niu, J.2
Khan, M.K.3
Liao, J.4
-
24
-
-
84908157951
-
Applying biometrics to design three-factor remote user authentication scheme with key agreement
-
Li X, Niu J, Wang Z, Chen C (2014) Applying biometrics to design three-factor remote user authentication scheme with key agreement. Secur Commun Netw 7(10):1488–1497
-
(2014)
Secur Commun Netw
, vol.7
, Issue.10
, pp. 1488-1497
-
-
Li, X.1
Niu, J.2
Wang, Z.3
Chen, C.4
-
25
-
-
84890127621
-
Improvements on an authentication scheme for vehicular sensor networks
-
Liu JK, Yuen TH, Au MH, Susilo W (2014) Improvements on an authentication scheme for vehicular sensor networks. Expert Syst Appl 41(5):2559–2564
-
(2014)
Expert Syst Appl
, vol.41
, Issue.5
, pp. 2559-2564
-
-
Liu, J.K.1
Yuen, T.H.2
Au, M.H.3
Susilo, W.4
-
26
-
-
79959430513
-
One for all-all for one: unifying standard differential power analysis attacks
-
Mangard S, Oswald E, Standaert F-X (2011) One for all-all for one: unifying standard differential power analysis attacks. IET Inf Secur 5(2):100–110
-
(2011)
IET Inf Secur
, vol.5
, Issue.2
, pp. 100-110
-
-
Mangard, S.1
Oswald, E.2
Standaert, F.-X.3
-
27
-
-
0036566408
-
Examining smart-card security under the threat of power analysis attacks
-
Messerges TS, Dabbish EA, Sloan RH (2002) Examining smart-card security under the threat of power analysis attacks. IEEE Trans Comput 51(5):541–552
-
(2002)
IEEE Trans Comput
, vol.51
, Issue.5
, pp. 541-552
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
-
28
-
-
84908209248
-
A novel user authentication scheme with anonymity for wireless communications
-
Niu J, Li X (2014) A novel user authentication scheme with anonymity for wireless communications. Secur Commun Netw 7(10):1467–1476
-
(2014)
Secur Commun Netw
, vol.7
, Issue.10
, pp. 1467-1476
-
-
Niu, J.1
Li, X.2
-
29
-
-
84928106743
-
Mutual verifiable provable data auditing in public cloud storage
-
Ren Y, Shen J, Wang J, Han J, Lee S (2015) Mutual verifiable provable data auditing in public cloud storage. J Internet Technol 16(2):317–323
-
(2015)
J Internet Technol
, vol.16
, Issue.2
, pp. 317-323
-
-
Ren, Y.1
Shen, J.2
Wang, J.3
Han, J.4
Lee, S.5
-
30
-
-
84947804555
-
Enhanced secure sensor association and key management in wireless body area networks
-
Shen J, Tan H, Moh S, Chung I, Liu Q, Sun X (2015) Enhanced secure sensor association and key management in wireless body area networks. J Commun Networks 17(5):453–462
-
(2015)
J Commun Networks
, vol.17
, Issue.5
, pp. 453-462
-
-
Shen, J.1
Tan, H.2
Moh, S.3
Chung, I.4
Liu, Q.5
Sun, X.6
-
31
-
-
84975275069
-
Anonymous two-factor authentication in distributed systems: certain goals are beyond attainment
-
Wang D, He D, Wang P, Chu C (2015) Anonymous two-factor authentication in distributed systems: certain goals are beyond attainment. IEEE Trans Dependable Secure Comput 12(4): 428–442
-
(2015)
IEEE Trans Dependable Secure Comput
, vol.12
, Issue.4
, pp. 428-442
-
-
Wang, D.1
He, D.2
Wang, P.3
Chu, C.4
-
32
-
-
84938203681
-
Preserving privacy for free: efficient and provably secure two-factor authentication scheme with user anonymity
-
Wang D, Wang N, Wang P, Qing S (2015) Preserving privacy for free: efficient and provably secure two-factor authentication scheme with user anonymity. Inf Sci 321(321):162–178
-
(2015)
Inf Sci
, vol.321
, Issue.321
, pp. 162-178
-
-
Wang, D.1
Wang, N.2
Wang, P.3
Qing, S.4
-
34
-
-
84890555385
-
A secure and effective anonymous user authentication scheme for roaming service in global mobility networks
-
Wen F, Susilo W, Yang G (2013) A secure and effective anonymous user authentication scheme for roaming service in global mobility networks. Wirel Pers Commun 73(3):993–1004
-
(2013)
Wirel Pers Commun
, vol.73
, Issue.3
, pp. 993-1004
-
-
Wen, F.1
Susilo, W.2
Yang, G.3
-
35
-
-
54949140749
-
A secure authentication scheme with anonymity for wireless communications
-
Wu C-C, Lee W-B, Tsaur W-J (2008) A secure authentication scheme with anonymity for wireless communications. IEEE Commun Lett 12(10):722–723
-
(2008)
IEEE Commun Lett
, vol.12
, Issue.10
, pp. 722-723
-
-
Wu, C.-C.1
Lee, W.-B.2
Tsaur, W.-J.3
-
36
-
-
84923216048
-
An improved and provable self-certified digital signature scheme with message recovery
-
Wu F, Xu L (2015) An improved and provable self-certified digital signature scheme with message recovery. Int J Commun Syst 28(2):344–357
-
(2015)
Int J Commun Syst
, vol.28
, Issue.2
, pp. 344-357
-
-
Wu, F.1
Xu, L.2
-
37
-
-
84978173214
-
A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks
-
Wu F, Xu L, Kumari S, Li X, Das AK, Khan MK, Karuppiah M, Baliyan R (2016) A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks. Secur Commun Netw 9(16):3527– 3542
-
(2016)
Secur Commun Netw
, vol.9
, Issue.16
, pp. 3527-3542
-
-
Wu, F.1
Xu, L.2
Kumari, S.3
Li, X.4
Das, A.K.5
Khan, M.K.6
Karuppiah, M.7
Baliyan, R.8
-
38
-
-
84962448916
-
A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data
-
Xia Z, Wang X, Sun X, Wang Q (2016) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans Parallel Distrib Syst 27(2):340–352
-
(2016)
IEEE Trans Parallel Distrib Syst
, vol.27
, Issue.2
, pp. 340-352
-
-
Xia, Z.1
Wang, X.2
Sun, X.3
Wang, Q.4
-
39
-
-
68949149518
-
Security flaws in authentication protocols with anonymity for wireless environments
-
Xu J, Feng D (2009) Security flaws in authentication protocols with anonymity for wireless environments. ETRI J 31(4): 460–462
-
(2009)
ETRI J
, vol.31
, Issue.4
, pp. 460-462
-
-
Xu, J.1
Feng, D.2
-
40
-
-
84919348312
-
An improved and provable remote user authentication scheme based on elliptic curve cryptosystem with user anonymity
-
Xu L, Wu F (2015) An improved and provable remote user authentication scheme based on elliptic curve cryptosystem with user anonymity. Secur Commun Netw 8(2):245–260
-
(2015)
Secur Commun Netw
, vol.8
, Issue.2
, pp. 245-260
-
-
Xu, L.1
Wu, F.2
-
41
-
-
79956064800
-
A user friendly authentication scheme with anonymity for wireless communications
-
Yoon E-J, Yoo K-Y, Ha K-S (2011) A user friendly authentication scheme with anonymity for wireless communications. Comput Electr Eng 37(3):356–364
-
(2011)
Comput Electr Eng
, vol.37
, Issue.3
, pp. 356-364
-
-
Yoon, E.-J.1
Yoo, K.-Y.2
Ha, K.-S.3
-
42
-
-
84944168470
-
A privacy preserving authentication scheme for roaming services in global mobility networks
-
Zhang G, Fan D, Zhang Y, Li X, Liu X (2015) A privacy preserving authentication scheme for roaming services in global mobility networks. Secur Commun Netw 8(16):2850–2859
-
(2015)
Secur Commun Netw
, vol.8
, Issue.16
, pp. 2850-2859
-
-
Zhang, G.1
Fan, D.2
Zhang, Y.3
Li, X.4
Liu, X.5
-
43
-
-
1942487780
-
A new authentication scheme with anonymity for wireless environments
-
Zhu J, Ma J (2004) A new authentication scheme with anonymity for wireless environments. IEEE Trans Consum Electron 50(1):231–235
-
(2004)
IEEE Trans Consum Electron
, vol.50
, Issue.1
, pp. 231-235
-
-
Zhu, J.1
Ma, J.2
|