Security Analysis of ECC Based Authentication Protocols
暂无分享,去创建一个
[1] Chien-Lung Hsu,et al. A Secure Non-interactive Deniable Authentication Protocol with Certificates Based on Elliptic Curve Cryptography , 2015, New Trends in Intelligent Information and Database Systems.
[2] Mahmoud Ahmadian-Attari,et al. A Pairing-free ID-based Key Agreement Protocol with Different PKGs , 2014, Int. J. Netw. Secur..
[3] Swapnoneel Roy,et al. On vulnerability analysis of several password authentication protocols , 2015, Innovations in Systems and Software Engineering.
[4] Ethiopia Nigussie,et al. An Elliptic Curve-based Mutual Authentication Scheme for RFID Implant Systems , 2014, ANT/SEIT.
[5] Fatma Kahri,et al. Implementation of elliptic curve digital signature algorithm (ECDSA) , 2014, 2014 Global Summit on Computer & Information Technology (GSCIT).
[6] Fan Wu,et al. An improved and provable remote user authentication scheme based on elliptic curve cryptosystem with user anonymity , 2015, Secur. Commun. Networks.
[7] Wei-Kuan Shih,et al. Robust smart card secured authentication scheme on SIP using Elliptic Curve Cryptography , 2014, Comput. Stand. Interfaces.
[8] Chin-Chen Chang,et al. A Pairing-free ID-based Key Agreement Protocol with Different PKGs , 2014 .
[9] Hilarie K. Orman,et al. The OAKLEY Key Determination Protocol , 1997, RFC.
[10] Donghoon Lee,et al. Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography , 2014, Sensors.
[11] Jing Chen,et al. Two-Factor Remote Authentication Protocol with User Anonymity Based on Elliptic Curve Cryptography , 2014, Wireless Personal Communications.
[12] Xiaojun Zhang,et al. A Secure RFID Mutual Authentication Protocol for Healthcare Environments Using Elliptic Curve Cryptography , 2015, Journal of Medical Systems.
[13] Chun-Ta Li,et al. A new password authentication and user anonymity scheme based on elliptic curve cryptography and smart card , 2013, IET Inf. Secur..