A New Remote Fuzzy User Password Authentication Scheme Using Sub-tree for Cloud Computing
暂无分享,去创建一个
Sarita Gajbhiye Meshram | Chandrashekhar Meshram | Muhammad Khurram Khan | Kailash Kalare | Cheng-Chi Lee
[1] Mohammad Sabzinejad Farash. An improved password-based authentication scheme for session initiation protocol using smart cards without verification table , 2017, Int. J. Commun. Syst..
[2] Chun Chen,et al. Lightweight and provably secure user authentication with anonymity for the global mobility network , 2011, Int. J. Commun. Syst..
[3] P. Kocher,et al. Differential power analysis, advances in cryptology-CRYPTO'99 , 1999 .
[4] Martín Abadi,et al. A logic of authentication , 1990, TOCS.
[5] Chun-Ta Li,et al. An efficient online/offline ID-based short signature procedure using extended chaotic maps , 2018, Soft Computing.
[6] Han Jiang,et al. Cryptanalysis on Identity-based Authenticated Key Agreement Protocols from Pairings , 2010, J. Networks.
[7] SK Hafizul Islam,et al. Design and analysis of an improved smartcard‐based remote user password authentication scheme , 2016, Int. J. Commun. Syst..
[8] Sandeep Pratap Singh,et al. An Efficient and Secure Multi-server Smart Card based Authentication Scheme , 2014 .
[9] Chin-Chen Chang,et al. A robust and efficient dynamic identity‐based multi‐server authentication scheme using smart cards , 2016, Int. J. Commun. Syst..
[10] Robert H. Sloan,et al. Examining Smart-Card Security under the Threat of Power Analysis Attacks , 2002, IEEE Trans. Computers.
[11] Lih-Chyau Wuu,et al. Robust smart‐card‐based remote user password authentication scheme , 2014, Int. J. Commun. Syst..
[12] Ronggong Song,et al. Analysis of Smart Card-Based Remote User Authentication Schemes , 2007, Security and Management.
[13] Muhammad Khurram Khan,et al. Cryptanalysis and improvement of ‘a robust smart‐card‐based remote user password authentication scheme’ , 2014, Int. J. Commun. Syst..
[14] Cheng-Chi Lee,et al. An efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystem , 2018, Soft Comput..
[15] Cheng-Chi Lee,et al. An identity-based encryption technique using subtree for fuzzy user data sharing under cloud computing environment , 2019, Soft Comput..
[16] Colleen M. Swanson,et al. Security in Key Agreement: Two-Party Certificateless Schemes , 2008 .
[17] Muhammad Khurram Khan,et al. Cryptanalysis and security enhancement of a 'more efficient & secure dynamic ID-based remote user authentication scheme' , 2011, Comput. Commun..
[18] Cheng-Chi Lee,et al. An efficient key authentication procedure for IND-CCA2 secure Paillier-based cryptosystem , 2020, Soft Comput..
[19] Mohammad S. Obaidat,et al. An UF-IBSS-CMA Protected Online/Offline Identity-based Short Signature Technique using PDL , 2016 .
[20] Cheng-Chi Lee,et al. An IBE Technique Using Partial Discrete Logarithm , 2016 .
[21] Dengguo Feng,et al. An improved smart card based password authentication scheme with provable security , 2009, Comput. Stand. Interfaces.
[22] Mohammad S. Obaidat,et al. Chebyshev chaotic map‐based ID‐based cryptographic model using subtree and fuzzy‐entity data sharing for public key cryptography , 2018, Secur. Priv..
[23] Kuldip Singh,et al. An improvement of Xu et al.'s authentication scheme using smart cards , 2010, Bangalore Compute Conf..
[24] Ronggong Song. Advanced smart card based password authentication protocol , 2010, Comput. Stand. Interfaces.
[25] David Naccache,et al. Efficient subtree-based encryption for fuzzy-entity data sharing , 2017, Soft Computing.
[26] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[27] Xiong Li,et al. An enhanced smart card based remote user password authentication scheme , 2013, J. Netw. Comput. Appl..
[28] Hugo Krawczyk,et al. Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels , 2001, EUROCRYPT.
[29] Chunguang Ma,et al. Security flaws in two improved remote user authentication schemes using smart cards , 2014, Int. J. Commun. Syst..
[30] Yingjiu Li,et al. Cryptanalysis of Hsiang-Shih's authentication scheme for multi-server architecture , 2011, Int. J. Commun. Syst..
[31] Vanga Odelu,et al. A Robust and Effective Smart-Card-Based Remote User Authentication Mechanism Using Hash Function , 2014, TheScientificWorldJournal.
[32] Xinsong Liu,et al. Cryptanalysis of a dynamic ID-based remote user authentication with key agreement scheme , 2012, Int. J. Commun. Syst..
[33] Mo Adda,et al. Framework of confidence values during digital forensic investigation processes , 2020 .
[34] Chik How Tan,et al. Certificateless Authenticated Two-Party Key Agreement Protocols , 2006, ASIAN.
[35] IVAN GANCHEV,et al. Designing a cloud tier for the IoT platform EMULSION , 2019 .