Mixed Symmetric Key and Elliptic Curve Encryption Scheme Used for Password Authentication and Update Under Unstable Network Environment
暂无分享,去创建一个
[1] Eun-Jun Yoon,et al. Further improvement of an efficient password based remote user authentication scheme using smart cards , 2004, IEEE Transactions on Consumer Electronics.
[2] King-Hang Wang,et al. Comments on “An improved secure and efficient password and chaos-based two-party key agreement protocol” , 2016, Nonlinear Dynamics.
[3] Qiang Tang,et al. Extend the Concept of Public Key Encryption with Delegated Search , 2015, Comput. J..
[4] Shoulin Yin,et al. A New Provable Secure Certificateless Aggregate Signcryption Scheme , 2016, J. Inf. Hiding Multim. Signal Process..
[5] Hui Li,et al. An Effcient and Secure Biometrics-based One-Time Identity-Password Authenticated Scheme for E-coupon System towards Mobile Internet , 2015, J. Inf. Hiding Multim. Signal Process..
[6] Torsion groups of elliptic curves over quadratic fields , 2011, 1103.5906.
[7] Guomin Yang,et al. Cross-domain password-based authenticated key exchange revisited , 2013, 2013 Proceedings IEEE INFOCOM.
[8] Shinsuke Tamura,et al. A comparison between symmetric and asymmetric key encryption algorithm based decryption mixnets , 2015, 2015 International Conference on Networking Systems and Security (NSysS).
[9] Fahad Bin Muhaya,et al. Provably Secure and Anonymous Password Authentication Protocol for Roaming Service in Global Mobility Networks Using Extended Chaotic Maps , 2015, Wireless Personal Communications.
[10] Chan Yeob Yeun,et al. Advanced Secure Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks , 2016, Wireless Personal Communications.
[11] Chantal David,et al. The Frequency of Elliptic Curve Groups over Prime Finite Fields , 2014, Canadian Journal of Mathematics.
[12] Chien-Ming Chen,et al. On the Security of a Chaotic Maps-based Three-party Authenticated Key Agreement Protocol , 2016, J. Netw. Intell..
[13] Chun-Li Lin,et al. A password authentication scheme with secure password updating , 2003, Comput. Secur..
[14] Shoulin Yin,et al. A K-means Approach for Map-Reduce Model and Social Network Privacy Protection , 2016, J. Inf. Hiding Multim. Signal Process..
[15] G. P. Biswas,et al. Design of improved password authentication and update scheme based on elliptic curve cryptography , 2013, Math. Comput. Model..
[16] Sk Hafizul Islam,et al. Provably secure dynamic identity-based three-factor password authentication scheme using extended chaotic maps , 2014 .
[17] Computing the Cassels-Tate pairing on the 3-Selmer group of an elliptic curve , 2013, 1306.1410.
[18] M. Aswatha Kumar,et al. Symmetric Key Image Encryption Scheme with Key Sequences Derived from Random Sequence of Cyclic Elliptic Curve Points over GF(p) , 2014, 2014 International Conference on Contemporary Computing and Informatics (IC3I).
[19] Hoon-Jae Lee,et al. An Efficient Encryption Scheme using Elliptic Curve Cryptography (ECC) with Symmetric Algorithm for Healthcare System , 2014 .