Security Analysis on Remote User Authentication Methods
暂无分享,去创建一个
[1] Leslie Lamport,et al. Password authentication with insecure communication , 1981, CACM.
[2] Eun-Jun Yoon,et al. More Efficient and Secure Remote User Authentication Scheme using Smart Cards , 2005, 11th International Conference on Parallel and Distributed Systems (ICPADS'05).
[3] K. Kobara,et al. Simple Anonymous Password-Based Authenticated Key Exchange (SAPAKE), Reconsidered , 2017, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[4] Zhenfu Cao,et al. Efficient Password-Based Authentication and Key Exchange Scheme Preserving User Privacy , 2006, WASA.
[5] Min-Shiang Hwang,et al. A new remote user authentication scheme using smart cards , 2000, IEEE Trans. Consumer Electron..
[6] Shiuh-Pyng Shieh,et al. Password authentication schemes with smart cards , 1999, Comput. Secur..
[7] Chien-Ming Chen,et al. Efficient Anonymous Password-Authenticated Key Exchange Scheme Using Smart Cards , 2017, ECC.
[8] Manoj Kumar,et al. A Secure Remote User Authentication Scheme with Smart Cards , 2008, IACR Cryptol. ePrint Arch..
[9] Joseph K. Liu,et al. Credential Wrapping: From Anonymous Password Authentication to Anonymous Biometric Authentication , 2016, AsiaCCS.
[10] Yuan Zhou,et al. Anonymous password-based key exchange with low resources consumption and better user-friendliness , 2012, Secur. Commun. Networks.
[11] Hung-Yu Chien,et al. A modified remote login authentication scheme based on geometric approach , 2001, J. Syst. Softw..