A Smart Card-based Authentication Scheme Using User Identify Cryptography
暂无分享,去创建一个
[1] Hung-Min Sun,et al. An Efficient Remote User Authentication Scheme Using Smart Cards , 2000 .
[2] Wei-Chi Ku,et al. Impersonation Attack on a Dynamic ID-Based Remote User Authentication Scheme Using Smart Cards , 2005, IEICE Trans. Commun..
[3] M. Misbahuddin,et al. A Novel Dynamic ID-Based Remote User Authentication Scheme , 2006, 2006 Annual IEEE India Conference.
[4] Martín Abadi,et al. A logic of authentication , 1989, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.
[5] Min-Shiang Hwang,et al. A new remote user authentication scheme using smart cards , 2000, IEEE Trans. Consumer Electron..
[6] David L. Mills,et al. Adaptive hybrid clock discipline algorithm for the network time protocol , 1998, TNET.
[7] Eun-Jun Yoon,et al. More Efficient and Secure Remote User Authentication Scheme using Smart Cards , 2005, 11th International Conference on Parallel and Distributed Systems (ICPADS'05).
[8] Paul C. van Oorschot,et al. Authentication and authenticated key exchanges , 1992, Des. Codes Cryptogr..
[9] Cheng-Chi Lee,et al. A flexible remote user authentication scheme using smart cards , 2002, OPSR.
[10] Chi-Kwong Chan,et al. Cryptanalysis of a modified remote user authentication scheme using smart cards , 2003, IEEE Trans. Consumer Electron..
[11] Ashutosh Saxena,et al. A dynamic ID-based remote user authentication scheme , 2004, IEEE Transactions on Consumer Electronics.
[12] Cheng-Chi Lee,et al. Security enhancement for a dynamic ID-based remote user authentication scheme , 2005, International Conference on Next Generation Web Services Practices (NWeSP'05).
[13] Jianhua Chen,et al. Weaknesses of a Remote User Password Authentication Scheme Using Smart Card , 2011, Int. J. Netw. Secur..
[14] Chien-Lung Hsu. Security of Chien et al.'s remote user authentication scheme using smart cards , 2004, Comput. Stand. Interfaces.
[15] Amit K. Awasthi. Comment on A dynamic ID-based Remote User Authentication Scheme , 2004, ArXiv.
[16] Muhammad Khurram Khan,et al. Cryptanalysis and security enhancement of a 'more efficient & secure dynamic ID-based remote user authentication scheme' , 2011, Comput. Commun..
[17] Yan-yan Wang,et al. A more efficient and secure dynamic ID-based remote user authentication scheme , 2009, Comput. Commun..
[18] Zhong Chen,et al. Further Improvement of An Authentication Scheme with User Anonymity for Wireless Communications , 2012, Int. J. Netw. Secur..
[19] Muhammad Khurram Khan,et al. Improving the security of 'a flexible biometrics remote user authentication scheme' , 2007, Comput. Stand. Interfaces.
[20] Min-Shiang Hwang,et al. A modified remote user authentication scheme using smart cards , 2003, IEEE Trans. Consumer Electron..
[21] Chin-Chen Chang,et al. Some Forgery Attacks on a Remote User Authentication Scheme Using Smart Cards , 2003, Informatica.
[22] Yaqing Tu,et al. An improvement of dynamic ID-based remote user authentication scheme with smart cards , 2008, 2008 7th World Congress on Intelligent Control and Automation.
[23] Lei Jiang,et al. A Robust and Efficient Timestamp-based Remote User Authentication Scheme with Smart Card Lost Attack Resistance , 2013, Int. J. Netw. Secur..
[24] Chun-I Fan,et al. Robust remote authentication scheme with smart cards , 2005, Comput. Secur..
[25] Jian Li,et al. Improved Dynamic ID-Based Remote User Authentication Scheme Using Smart cards , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.
[26] Manoj Kumar. A New Secure Remote User Authentication Scheme with Smart Cards , 2010, Int. J. Netw. Secur..
[27] Wei-Chi Ku,et al. Further cryptanalysis of fingerprint-based remote user authentication scheme using smartcards , 2005 .
[28] Yu-Hao Chuang,et al. A novel user identification scheme with key distribution preserving user anonymity for distributed computer networks , 2009, Inf. Sci..
[29] Manoj Kumar,et al. An Enhanced Remote User Authentication Scheme with Smart Card , 2010, Int. J. Netw. Secur..
[30] David L. Mills,et al. Precision synchronization of computer network clocks , 1994, CCRV.
[31] Leslie Lamport,et al. Password authentication with insecure communication , 1981, CACM.
[32] Min Gyo Chung,et al. More secure remote user authentication scheme , 2009, Comput. Commun..
[33] Kee-Young Yoo,et al. Improved efficient remote user authentication scheme using smart cards , 2004, IEEE Transactions on Consumer Electronics.
[34] Hung-Yu Chien,et al. An Efficient and Practical Solution to Remote Authentication: Smart Card , 2002, Comput. Secur..
[35] Kee-Young Yoo,et al. Improvement of Chien et al.'s remote user authentication scheme using smart cards , 2005, Comput. Stand. Interfaces.
[36] Paul Syverson,et al. A Taxonomy of Replay Attacks , 1994 .
[37] Chin-Chen Chang,et al. A mutual authenticated key agreement scheme over insecure networks , 2007 .
[38] Francisco Rico-Novella,et al. Improvement of the dynamic ID-based remote user authentication scheme , 2010, 2010 International Conference on Information Society.