-
1
-
-
84878353718
-
The quest to replace passwords: A framework for comparative evaluation of Web authentication schemes
-
J. Bonneau, C. Herley, P. Oorschot, and F. Stajano, "The quest to replace passwords: A framework for comparative evaluation of Web authentication schemes, " in Proc. IEEE Symp. Secur. Privacy, 2012, pp. 553-567.
-
(2012)
Proc. IEEE Symp. Secur. Privacy
, pp. 553-567
-
-
Bonneau, J.1
Herley, C.2
Oorschot, P.3
Stajano, F.4
-
3
-
-
71449093776
-
Efficient and secure authenticated key exchange using weak passwords
-
J. Katz, R. Ostrovsky, and M. Yung, "Efficient and secure authenticated key exchange using weak passwords, " J. ACM, vol. 57, no. 1, pp. 1-41, 2009.
-
(2009)
J. ACM
, vol.57
, Issue.1
, pp. 1-41
-
-
Katz, J.1
Ostrovsky, R.2
Yung, M.3
-
4
-
-
84945181077
-
Security of the J-PAKE password-authenticated key exchange protocol
-
M. Abdalla, F. Benhamouda, and P. MacKenzie, "Security of the J-PAKE password-authenticated key exchange protocol, " in Proc. IEEE Symp. Secur. Privacy, 2015, pp. 571-587.
-
(2015)
Proc. IEEE Symp. Secur. Privacy
, pp. 571-587
-
-
Abdalla, M.1
Benhamouda, F.2
MacKenzie, P.3
-
5
-
-
85053910515
-
-
May 2014. [Online]
-
M. Adeptus, "Hashdumps and passwords, " May 2014. [Online]. Available: http://www.adeptus-mechanicus.com/codex/hashpass/hashpass.php
-
Hashdumps and Passwords
-
-
Adeptus, M.1
-
7
-
-
84914107564
-
A study of probabilistic password models
-
J. Ma, W. Yang, M. Luo, and N. Li, "A study of probabilistic password models, " in Proc. IEEE Symp. Secur. Privacy, 2014, pp. 538-552.
-
(2014)
Proc. IEEE Symp. Secur. Privacy
, pp. 538-552
-
-
Ma, J.1
Yang, W.2
Luo, M.3
Li, N.4
-
8
-
-
84905364011
-
Password cracking HPC
-
[Online]
-
J. Gosney, "Password cracking HPC, " in Proc. Password, 2012. [Online]. Available: http://bit.ly/1y00I3O
-
(2012)
Proc. Password
-
-
Gosney, J.1
-
14
-
-
85133463240
-
The tangled Web of password reuse
-
A. Das, J. Bonneau, M. Caesar, N. Borisov, and X. Wang, "The tangled Web of password reuse, " in Proc. Netw. Distrib. Syst. Secur. Symp., 2014, pp. 1-15.
-
(2014)
Proc. Netw. Distrib. Syst. Secur. Symp.
, pp. 1-15
-
-
Das, A.1
Bonneau, J.2
Caesar, M.3
Borisov, N.4
Wang, X.5
-
15
-
-
84954138681
-
Optimal distributed password verification
-
J. Camenisch, A. Lehmann, and G. Neven, "Optimal distributed password verification, " in Proc. 22nd ACM SIGSAC Conf. Comput. Commun. Secur., 2015, pp. 182-194.
-
(2015)
Proc. 22nd ACM SIGSAC Conf. Comput. Commun. Secur.
, pp. 182-194
-
-
Camenisch, J.1
Lehmann, A.2
Neven, G.3
-
16
-
-
33751057130
-
Cognitive authentication schemes safe against spyware
-
D. Weinshall, "Cognitive authentication schemes safe against spyware, " in Proc. IEEE Symp. Secur. Privacy, 2006, pp. 295-230.
-
(2006)
Proc. IEEE Symp. Secur. Privacy
, pp. 230-295
-
-
Weinshall, D.1
-
17
-
-
84894217609
-
On limitations of designing leakage-resilient password systems: Attacks, principles and usability
-
Q. Yan, J. Han, Y. Li, and R. H. Deng, "On limitations of designing leakage-resilient password systems: Attacks, principles and usability, " in Proc. Netw. Distrib. Syst. Secur. Symp., 2012, pp. 1-16.
-
(2012)
Proc. Netw. Distrib. Syst. Secur. Symp.
, pp. 1-16
-
-
Yan, Q.1
Han, J.2
Li, Y.3
Deng, R.H.4
-
18
-
-
0026153410
-
Remote password authentication with smart cards
-
May
-
C. Chang and T. Wu, "Remote password authentication with smart cards, " IEE Comput. Digital Tech., vol. 138, no. 3, pp. 165-168, May 1991.
-
(1991)
IEE Comput. Digital Tech.
, vol.138
, Issue.3
, pp. 165-168
-
-
Chang, C.1
Wu, T.2
-
19
-
-
84910634929
-
Robust multi-factor authentication for fragile communications
-
Nov./Dec.
-
X. Huang, Y. Xiang, E. Bertino, J. Zhou, and L. Xu, "Robust multi-factor authentication for fragile communications, " IEEE Trans. Depend. Secur. Comput., vol. 11, no. 6, pp. 568-581, Nov./Dec. 2014.
-
(2014)
IEEE Trans. Depend. Secur. Comput.
, vol.11
, Issue.6
, pp. 568-581
-
-
Huang, X.1
Xiang, Y.2
Bertino, E.3
Zhou, J.4
Xu, L.5
-
20
-
-
84911059606
-
An efficient generic framework for three-factor authentication with provably secure instantiation
-
Dec.
-
J. Yu, G. Wang, Y. Mu, and W. Gao, "An efficient generic framework for three-factor authentication with provably secure instantiation, " IEEE Trans. Inf. Forensics Secur., vol. 9, no. 12, pp. 2302-2313, Dec. 2014.
-
(2014)
IEEE Trans. Inf. Forensics Secur.
, vol.9
, Issue.12
, pp. 2302-2313
-
-
Yu, J.1
Wang, G.2
Mu, Y.3
Gao, W.4
-
21
-
-
84975275069
-
Anonymous two-factor authentication in distributed systems: Certain goals are beyond attainment
-
Jul./Aug.
-
D. Wang, D. He, P. Wang, and C.-H. Chu, "Anonymous two-factor authentication in distributed systems: Certain goals are beyond attainment, " IEEE Trans. Depend. Secur. Comput., vol. 12, no. 4, pp. 428-442, Jul./Aug. 2015.
-
(2015)
IEEE Trans. Depend. Secur. Comput.
, vol.12
, Issue.4
, pp. 428-442
-
-
Wang, D.1
He, D.2
Wang, P.3
Chu, C.-H.4
-
22
-
-
52949137008
-
Two-factor mutual authentication based on smart cards and passwords
-
G. M. Yang, D. S. Wong, H. X. Wang, and X. T. Deng, "Two-factor mutual authentication based on smart cards and passwords, " J. Comput. Syst. Sci., vol. 74, no. 7, pp. 1160-1172, 2008.
-
(2008)
J. Comput. Syst. Sci.
, vol.74
, Issue.7
, pp. 1160-1172
-
-
Yang, G.M.1
Wong, D.S.2
Wang, H.X.3
Deng, X.T.4
-
23
-
-
84903203451
-
Further observations on smart-card-based password-authenticated key agreement in distributed systems
-
Jul.
-
X. Huang, X. Chen, J. Li, Y. Xiang, and L. Xu, "Further observations on smart-card-based password-authenticated key agreement in distributed systems, " IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 7, pp. 1767-1775, Jul. 2014.
-
(2014)
IEEE Trans. Parallel Distrib. Syst.
, vol.25
, Issue.7
, pp. 1767-1775
-
-
Huang, X.1
Chen, X.2
Li, J.3
Xiang, Y.4
Xu, L.5
-
24
-
-
84863921959
-
Password protected smart card and memory stick authentication against off-line dictionary attacks
-
Y. G. Wang, "Password protected smart card and memory stick authentication against off-line dictionary attacks, " in Proc. 27th IFIP TC 11 Inf. Secur. Privacy Conf. Inf. Secur. Privacy Res., 2012, pp. 489-500.
-
(2012)
Proc. 27th IFIP TC 11 Inf. Secur. Privacy Conf. Inf. Secur. Privacy Res.
, pp. 489-500
-
-
Wang, Y.G.1
-
25
-
-
84860376061
-
Dynamic ID-based remote user password authentication schemes using smart cards: A review
-
R. Madhusudhan and R. Mittal, "Dynamic ID-based remote user password authentication schemes using smart cards: A review, " J. Netw. Comput. Appl., vol. 35, no. 4, pp. 1235-1248, 2012.
-
(2012)
J. Netw. Comput. Appl.
, vol.35
, Issue.4
, pp. 1235-1248
-
-
Madhusudhan, R.1
Mittal, R.2
-
26
-
-
84863056589
-
Robust smart-cards-based user authentication scheme with user anonymity
-
S. H. Wu, Y. F. Zhu, and Q. Pu, "Robust smart-cards-based user authentication scheme with user anonymity, " Secur. Commun. Netw., vol. 5, no. 2, pp. 236-248, 2012.
-
(2012)
Secur. Commun. Netw.
, vol.5
, Issue.2
, pp. 236-248
-
-
Wu, S.H.1
Zhu, Y.F.2
Pu, Q.3
-
27
-
-
28044451335
-
Robust remote authentication scheme with smart cards
-
C. Fan, Y. Chan, and Z. Zhang, "Robust remote authentication scheme with smart cards, " Comput. Secur., vol. 24, no. 8, pp. 619-628, 2005.
-
(2005)
Comput. Secur.
, vol.24
, Issue.8
, pp. 619-628
-
-
Fan, C.1
Chan, Y.2
Zhang, Z.3
-
28
-
-
84886653936
-
Novel anonymous authentication scheme using smart cards
-
Nov.
-
J.-L. Tsai, N.-W. Lo, and T.-C. Wu, "Novel anonymous authentication scheme using smart cards, " IEEE Trans. Ind. Informat., vol. 9, no. 4, pp. 2004-2013, Nov. 2013.
-
(2013)
IEEE Trans. Ind. Informat.
, vol.9
, Issue.4
, pp. 2004-2013
-
-
Tsai, J.-L.1
Lo, N.-W.2
Wu, T.-C.3
-
29
-
-
64249125305
-
An improved smart card based password authentication scheme with provable security
-
J. Xu, W. Zhu, and D. Feng, "An improved smart card based password authentication scheme with provable security, " Comput. Standards Interfaces, vol. 31, no. 4, pp. 723-728, 2009.
-
(2009)
Comput. Standards Interfaces
, vol.31
, Issue.4
, pp. 723-728
-
-
Xu, J.1
Zhu, W.2
Feng, D.3
-
30
-
-
85150961350
-
Two-factor authentication resilient to server compromise using mix-bandwidth devices
-
M. Shirvanian, S. Jarecki, N. Saxena, and N. Nathan, "Two-factor authentication resilient to server compromise using mix-bandwidth devices, " in Proc. Netw. Distrib. Syst. Secur. Symp., 2014, pp. 1-16.
-
(2014)
Proc. Netw. Distrib. Syst. Secur. Symp.
, pp. 1-16
-
-
Shirvanian, M.1
Jarecki, S.2
Saxena, N.3
Nathan, N.4
-
31
-
-
84945490174
-
Privacy preserving smartcard-based authentication system with provable security
-
J. W. Byun, "Privacy preserving smartcard-based authentication system with provable security, " Secur. Commun. Netw., vol. 8, no. 17, pp. 3028-3044, 2015.
-
(2015)
Secur. Commun. Netw.
, vol.8
, Issue.17
, pp. 3028-3044
-
-
Byun, J.W.1
-
32
-
-
84938203681
-
Preserving privacy for free: Efficient and provably secure two-factor authentication scheme with user anonymity
-
D. Wang, N. Wang, P. Wang, and S. Qing, "Preserving privacy for free: Efficient and provably secure two-factor authentication scheme with user anonymity, " Inf. Sci., vol. 321, pp. 162-178, 2015.
-
(2015)
Inf. Sci.
, vol.321
, pp. 162-178
-
-
Wang, D.1
Wang, N.2
Wang, P.3
Qing, S.4
-
33
-
-
84878356177
-
The science of guessing: Analyzing an anonymized corpus of 70 million passwords
-
J. Bonneau, "The science of guessing: Analyzing an anonymized corpus of 70 million passwords, " in Proc. IEEE Symp. Secur. Privacy, 2012, pp. 538-552.
-
(2012)
Proc. IEEE Symp. Secur. Privacy
, pp. 538-552
-
-
Bonneau, J.1
-
35
-
-
84873466407
-
Authenticated key exchange secure against dictionary attacks
-
M. Bellare, D. Pointcheval, and P. Rogaway, "Authenticated key exchange secure against dictionary attacks, " in Proc. 19th Int. Conf. Theory Appl. Cryptographic Techn., 2000, pp. 139-155.
-
(2000)
Proc. 19th Int. Conf. Theory Appl. Cryptographic Techn.
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
36
-
-
71849087704
-
Public-key cryptography and password protocols
-
S. Halevi and H. Krawczyk, "Public-key cryptography and password protocols, " ACM Trans. Inf. Syst. Secur., vol. 2, pp. 230-268, 1999.
-
(1999)
ACM Trans. Inf. Syst. Secur.
, vol.2
, pp. 230-268
-
-
Halevi, S.1
Krawczyk, H.2
-
37
-
-
84951285097
-
Small tweaks do not help: Differential power analysis of milenage implementations in 3G/4G USIM cards
-
J. Liu, Y. Yu, and F.-X. Standaert, "Small tweaks do not help: Differential power analysis of milenage implementations in 3G/4G USIM cards, " in Proc. 20th Eur. Symp. Res. Comput. Secur., 2015, pp. 468-480.
-
(2015)
Proc. 20th Eur. Symp. Res. Comput. Secur.
, pp. 468-480
-
-
Liu, J.1
Yu, Y.2
Standaert, F.-X.3
-
39
-
-
84893081352
-
Reverse-engineering a cryptographic RFID tag
-
K. Nohl, D. Evans, S. Starbug, and H. Plötz, "Reverse-engineering a cryptographic RFID tag, " in Proc. 17th Conf. Secur. Symp., 2008, pp. 185-193.
-
(2008)
Proc. 17th Conf. Secur. Symp.
, pp. 185-193
-
-
Nohl, K.1
Evans, D.2
Starbug, S.3
Plötz, H.4
-
40
-
-
84892516382
-
Robust smart-card-based remote user password authentication scheme
-
B. Chen and W. Kuo, "Robust smart-card-based remote user password authentication scheme, " Int. J. Commun. Syst., vol. 27, no. 2, pp. 377-389, 2014.
-
(2014)
Int. J. Commun. Syst.
, vol.27
, Issue.2
, pp. 377-389
-
-
Chen, B.1
Kuo, W.2
-
41
-
-
84914669082
-
Cryptanalysis and improvement of a robust smart-card-based remote user password authentication scheme
-
S. Kumari and M. K. Khan, "Cryptanalysis and improvement of a robust smart-card-based remote user password authentication scheme, " Int. J. Commun. Syst., vol. 27, no. 12, pp. 3939-3955, 2014.
-
(2014)
Int. J. Commun. Syst.
, vol.27
, Issue.12
, pp. 3939-3955
-
-
Kumari, S.1
Khan, M.K.2
-
43
-
-
67649386419
-
Improvements of Juang et al.'s password-authenticated key agreement scheme using smart cards
-
Jun.
-
D. Sun, J. Huai, J. Sun, J. Li, and Z. Feng, "Improvements of Juang et al.'s password-authenticated key agreement scheme using smart cards, " IEEE Trans. Ind. Electron., vol. 56, no. 6, pp. 2284-2291, Jun. 2009.
-
(2009)
IEEE Trans. Ind. Electron.
, vol.56
, Issue.6
, pp. 2284-2291
-
-
Sun, D.1
Huai, J.2
Sun, J.3
Li, J.4
Feng, Z.5
-
44
-
-
84864344507
-
Secure password-based remote user authentication scheme with non-tamper resistant smart cards
-
D. Wang, C. G. Ma, and P. Wu, "Secure password-based remote user authentication scheme with non-tamper resistant smart cards, " in Proc. 26th Annu. IFIP WG 11.3 Conf. Data Appl. Secur. Privacy, 2012, pp. 114-121.
-
(2012)
Proc. 26th Annu. IFIP WG 11.3 Conf. Data Appl. Secur. Privacy
, pp. 114-121
-
-
Wang, D.1
Ma, C.G.2
Wu, P.3
-
45
-
-
80053379375
-
A robust remote user authentication scheme using smart card
-
C. T. Li and C. Lee, "A robust remote user authentication scheme using smart card, " Inf. Tech. Control, vol. 40, no. 3, pp. 236-245, 2011.
-
(2011)
Inf. Tech. Control
, vol.40
, Issue.3
, pp. 236-245
-
-
Li, C.T.1
Lee, C.2
-
46
-
-
84906774949
-
On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions
-
D. Wang and P. Wang, "On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions, " Comput. Netw., vol. 73, pp. 41-57, 2014.
-
(2014)
Comput. Netw.
, vol.73
, pp. 41-57
-
-
Wang, D.1
Wang, P.2
-
47
-
-
84979688615
-
The request for better measurement: A comparative evaluation of two-factor authentication schemes
-
D. Wang, Q. Gu, H. Cheng, and P. Wang, "The request for better measurement: A comparative evaluation of two-factor authentication schemes, " in Proc. 11th ACM Asia Conf. Comput. Commun. Secur., 2016, pp. 475-486.
-
(2016)
Proc. 11th ACM Asia Conf. Comput. Commun. Secur.
, pp. 475-486
-
-
Wang, D.1
Gu, Q.2
Cheng, H.3
Wang, P.4
-
49
-
-
33748126252
-
A password authentication scheme over insecure networks
-
I. Liao, C. Lee, and M. Hwang, "A password authentication scheme over insecure networks, " J. Comput. Syst. Sci., vol. 72, no. 4, pp. 727-740, 2006.
-
(2006)
J. Comput. Syst. Sci.
, vol.72
, Issue.4
, pp. 727-740
-
-
Liao, I.1
Lee, C.2
Hwang, M.3
-
50
-
-
18744393738
-
Security proofs for an efficient password-based key exchange
-
E. Bresson, O. Chevassut, and D. Pointcheval, "Security proofs for an efficient password-based key exchange, " in Proc. 10th ACM Conf. Comput. Commun. Secur., 2003, pp. 41-50.
-
(2003)
Proc. 10th ACM Conf. Comput. Commun. Secur.
, pp. 41-50
-
-
Bresson, E.1
Chevassut, O.2
Pointcheval, D.3
-
51
-
-
84883653668
-
An enhanced smart card based remote user password authentication scheme
-
X. Li, J. Niu, M. K. Khan, and J. Liao, "An enhanced smart card based remote user password authentication scheme, " J. Netw. Comput. Appl., vol. 36, no. 5, pp. 1365-1371, 2013.
-
(2013)
J. Netw. Comput. Appl.
, vol.36
, Issue.5
, pp. 1365-1371
-
-
Li, X.1
Niu, J.2
Khan, M.K.3
Liao, J.4
-
52
-
-
84884990326
-
A lightweight dynamic pseudonym identity based authentication and key agreement protocol without verification tables for multi-server architecture
-
K. Xue, P. Hong, and C. Ma, "A lightweight dynamic pseudonym identity based authentication and key agreement protocol without verification tables for multi-server architecture, " J. Comput. Syst. Sci., vol. 80, no. 1, pp. 195-206, 2014.
-
(2014)
J. Comput. Syst. Sci.
, vol.80
, Issue.1
, pp. 195-206
-
-
Xue, K.1
Hong, P.2
Ma, C.3
-
54
-
-
84995390356
-
Targeted online password guessing: An underestimated threat
-
D. Wang, Z. Zhang, P. Wang, J. Yan, and X. Huang, "Targeted online password guessing: An underestimated threat, " in Proc. ACM Conf. Comput. Commun. Secur., 2016, pp. 1-13, doi: 10.1145/2976749.2978339.
-
(2016)
Proc. ACM Conf. Comput. Commun. Secur.
, pp. 1-13
-
-
Wang, D.1
Zhang, Z.2
Wang, P.3
Yan, J.4
Huang, X.5
-
55
-
-
80051962268
-
Using fingerprint authentication to reduce security: An empirical study
-
H. Wimberly and L. Liebrock, "Using fingerprint authentication to reduce security: An empirical study, " in Proc. IEEE Symp. Secur. Privacy, 2011, pp. 32-46.
-
(2011)
Proc. IEEE Symp. Secur. Privacy
, pp. 32-46
-
-
Wimberly, H.1
Liebrock, L.2
-
56
-
-
84937853874
-
A secure biometrics-based multi-server authentication protocol using smart cards
-
Sep.
-
V. Odelu, A. Das, and A. Goswami, "A secure biometrics-based multi-server authentication protocol using smart cards, " IEEE Trans. Inf. Forensics Secur., vol. 10, no. 9, pp. 1953-1966, Sep. 2015.
-
(2015)
IEEE Trans. Inf. Forensics Secur.
, vol.10
, Issue.9
, pp. 1953-1966
-
-
Odelu, V.1
Das, A.2
Goswami, A.3
-
57
-
-
84988227377
-
Improvement of robust smart-card-based password authentication scheme
-
Q. Jiang, J. Ma, G. Li, and X. Li, "Improvement of robust smart-card-based password authentication scheme, " Int. J. Commun. Syst., vol. 28, no. 2, pp. 383-393, 2015.
-
(2015)
Int. J. Commun. Syst.
, vol.28
, Issue.2
, pp. 383-393
-
-
Jiang, Q.1
Ma, J.2
Li, G.3
Li, X.4
-
58
-
-
84942693700
-
Chaotic Chebyshev polynomials based remote user authentication scheme in client-server environment
-
T.-T. Truong, M.-T. Tran, A.-D. Duong, and I. Echizen, "Chaotic Chebyshev polynomials based remote user authentication scheme in client-server environment, " in Proc. 30th IFIP Int. Inf. Secur. Conf., 2015, pp. 479-494.
-
(2015)
Proc. 30th IFIP Int. Inf. Secur. Conf.
, pp. 479-494
-
-
Truong, T.-T.1
Tran, M.-T.2
Duong, A.-D.3
Echizen, I.4
-
59
-
-
84899037889
-
Design and analysis of an improved smartcard-based remote user password authentication scheme
-
S. Islam, "Design and analysis of an improved smartcard-based remote user password authentication scheme, " Int. J. Commun. Syst., vol. 29, no. 11, pp. 1708-1719, 2016.
-
(2016)
Int. J. Commun. Syst.
, vol.29
, Issue.11
, pp. 1708-1719
-
-
Islam, S.1
-
60
-
-
33750710411
-
Implementing cryptographic pairings on smartcards
-
M. Scott, N. Costigan, and W. Abdulwahab, "Implementing cryptographic pairings on smartcards, " in Proc. 8th Int. Workshop Cryptographic Hardware Embedded Syst., 2006, pp. 134-147.
-
(2006)
Proc. 8th Int. Workshop Cryptographic Hardware Embedded Syst.
, pp. 134-147
-
-
Scott, M.1
Costigan, N.2
Abdulwahab, W.3
-
61
-
-
33745201299
-
-
Shamus Softw. Ltd. [Online]
-
M. Scott, "Miracl library, " Shamus Softw. Ltd. [Online]. Available: http://www.shamus.ie/index.php?page=home
-
Miracl Library
-
-
Scott, M.1
|