Security Pitfalls of an efficient remote user authentication scheme using smart cards
暂无分享,去创建一个
[1] Chris J. Mitchell,et al. Comments on the S/KEY user authentication scheme , 1996, OPSR.
[2] Eun-Jun Yoon,et al. Further improvement of an efficient password based remote user authentication scheme using smart cards , 2004, IEEE Transactions on Consumer Electronics.
[3] Tzong-Chen Wu,et al. Remote login authentication scheme based on a geometric approach , 1995, Comput. Commun..
[4] Chien-Ming Chen,et al. Cryptanalysis of a Variant of Peyravian-Zunic's Password Authentication Scheme , 2003 .
[5] Hung-Min Sun,et al. An Efficient Remote User Authentication Scheme Using Smart Cards , 2000 .
[6] Min-Shiang Hwang,et al. A new remote user authentication scheme using smart cards , 2000, IEEE Trans. Consumer Electron..
[7] Hung-Yu Chien,et al. An Efficient and Practical Solution to Remote Authentication: Smart Card , 2002, Comput. Secur..
[8] Leslie Lamport,et al. Password authentication with insecure communication , 1981, CACM.
[9] Manoj Kumar,et al. New remote user authentication scheme using smart cards , 2004, IEEE Transactions on Consumer Electronics.
[10] Cheng-Chi Lee,et al. A flexible remote user authentication scheme using smart cards , 2002, OPSR.
[11] Cheng-Chi Lee,et al. A simple remote user authentication scheme , 2002 .
[12] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[13] Manoj Kumar,et al. Some remarks on a remote user authentication scheme using smart cards with forward secrecy , 2004, IEEE Transactions on Consumer Electronics.
[14] Tzonelih Hwang,et al. Reparable key distribution protocols for Internet environments , 1995, IEEE Trans. Commun..
[15] Min-Shiang Hwang,et al. A remote password authentication scheme for multiserver architecture using neural networks , 2001, IEEE Trans. Neural Networks.
[16] Min-Shiang Hwang,et al. A modified remote user authentication scheme using smart cards , 2003, IEEE Trans. Consumer Electron..
[17] Sung-Ming Yen,et al. Shared Authentication Token Secure Against Replay and Weak Key Attacks , 1997, Inf. Process. Lett..
[18] Wei-Chi Ku,et al. Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards , 2004, IEEE Transactions on Consumer Electronics.
[19] Chin-Chen Chang,et al. Using smart cards to authenticate remote passwords , 1993 .
[20] Lee-Ming Cheng,et al. Cryptanalysis of a remote user authentication scheme using smart cards , 2000, IEEE Trans. Consumer Electron..
[21] Chin-Chen Chang,et al. Remote password authentication with smart cards , 1991 .
[22] Cheng-Chi Lee,et al. A remote user authentication scheme using hash functions , 2002, OPSR.
[23] Robert H. Sloan,et al. Examining Smart-Card Security under the Threat of Power Analysis Attacks , 2002, IEEE Trans. Computers.