Cryptanalysis and security enhancement of a robust two‐factor authentication and key agreement protocol
暂无分享,去创建一个
Duncan S. Wong | Na Dong | Bin Hu | Qi Xie | Qianna Xie | Bin Hu | Na Dong | D. Wong
[1] Robert H. Sloan,et al. Examining Smart-Card Security under the Threat of Power Analysis Attacks , 2002, IEEE Trans. Computers.
[2] Gwoboa Horng,et al. Cryptanalysis of some user identification schemes for distributed computer networks , 2014, Int. J. Commun. Syst..
[3] Debiao He,et al. Improvement on a Smart Card Based Password Authentication Scheme , 2012 .
[4] Kuldip Singh,et al. An improvement of Xu et al.'s authentication scheme using smart cards , 2010, Bangalore Compute Conf..
[5] Wen-Shenq Juang,et al. Efficient password authenticated key agreement using smart cards , 2004, Comput. Secur..
[6] Cheng-Chi Lee,et al. A Robust Remote User Authentication Scheme Using Smart Card , 2011, Inf. Technol. Control..
[7] Bruno Blanchet,et al. Models and Proofs of Protocol Security: A Progress Report , 2009, CAV.
[8] Eun-Jun Yoon,et al. Further improvement of an efficient password based remote user authentication scheme using smart cards , 2004, IEEE Transactions on Consumer Electronics.
[9] Pan Chun-lan. Improved remote authentication scheme with smart card , 2009 .
[10] Marko Hölbl,et al. Attacks and Improvement of an Efficient Remote Mutual Authentication and Key Agreement Scheme , 2010, Cryptologia.
[11] Ben Smyth,et al. ProVerif 1.85: Automatic Cryptographic Protocol Verifier, User Manual and Tutorial , 2011 .
[12] Kee-Young Yoo,et al. Improvement of Chien et al.'s remote user authentication scheme using smart cards , 2005, Comput. Stand. Interfaces.
[13] Zhihua Cai,et al. Efficient and flexible password authenticated key agreement for Voice over Internet Protocol Session Initiation Protocol using smart card , 2014, Int. J. Commun. Syst..
[14] Qi Xie. A new authenticated key agreement for session initiation protocol , 2012, Int. J. Commun. Syst..
[15] Dengguo Feng,et al. An improved smart card based password authentication scheme with provable security , 2009, Comput. Stand. Interfaces.
[16] Qi Xie,et al. Improvement of a security enhanced one-time two-factor authentication and key agreement scheme , 2012, Sci. Iran..
[17] Chunguang Ma,et al. Security flaws in two improved remote user authentication schemes using smart cards , 2014, Int. J. Commun. Syst..
[18] Chun Chen,et al. A secure and efficient password‐authenticated group key exchange protocol for mobile ad hoc networks , 2013, Int. J. Commun. Syst..
[19] Ronggong Song. Advanced smart card based password authentication protocol , 2010, Comput. Stand. Interfaces.
[20] Chunhua Su,et al. Two robust remote user authentication protocols using smart cards , 2010, J. Syst. Softw..
[21] Martín Abadi,et al. Mobile values, new names, and secure communication , 2001, POPL '01.
[22] Wei-Kuan Shih,et al. Security enhancement on an improvement on two remote user authentication schemes using smart cards , 2011, Future Gener. Comput. Syst..
[23] Yingjiu Li,et al. Cryptanalysis of Hsiang-Shih's authentication scheme for multi-server architecture , 2011, Int. J. Commun. Syst..
[24] Lih-Chyau Wuu,et al. Robust smart‐card‐based remote user password authentication scheme , 2014, Int. J. Commun. Syst..
[25] Jia-Lun Tsai,et al. New dynamic ID authentication scheme using smart cards , 2010, Int. J. Commun. Syst..