Security Analysis of Various Authentication Schemes Based on Three Types of Digital Signature Schemes
暂无分享,去创建一个
[1] Duncan S. Wong,et al. Certificateless Public-Key Signature: Security Model and Efficient Construction , 2006, ACNS.
[2] Chun Chen,et al. Analysis and Improvement of a Secure and Efficient Handover Authentication for Wireless Networks , 2012, IEEE Communications Letters.
[3] Chun Chen,et al. Secure and Efficient Handover Authentication Based on Bilinear Pairing Functions , 2012, IEEE Transactions on Wireless Communications.
[4] David Pointcheval,et al. Simple Password-Based Encrypted Key Exchange Protocols , 2005, CT-RSA.
[5] Qiong Pu,et al. Cryptanalysis of Lu et al.'s Password-Based Authenticated Key Agreement Protocol , 2010, 2010 Second International Conference on Multimedia and Information Technology.
[6] SK Hafizul Islam,et al. Provably Secure and Lightweight Certificateless Signature Scheme for IIoT Environments , 2018, IEEE Transactions on Industrial Informatics.
[7] Patrick Horster,et al. Undetectable on-line password guessing attacks , 1995, OPSR.
[8] Emmanuel Bresson,et al. Security proofs for an efficient password-based key exchange , 2003, CCS '03.
[9] Mihir Bellare,et al. Authenticated Key Exchange Secure against Dictionary Attacks , 2000, EUROCRYPT.
[10] Steven M. Bellovin,et al. Augmented encrypted key exchange: a password-based protocol secure against dictionary attacks and password file compromise , 1993, CCS '93.
[11] David Pointcheval,et al. Interactive Diffie-Hellman Assumptions with Applications to Password-Based Authentication , 2005, Financial Cryptography.
[12] P. Vasudeva Reddy,et al. Efficient Pairing-Free Certificateless Authentication Scheme With Batch Verification for Vehicular Ad-Hoc Networks , 2018, IEEE Access.
[13] Xue Liu,et al. McCLS: Certificateless Signature Scheme for Emergency Mobile Wireless Cyber-Physical Systems , 2008, Int. J. Comput. Commun. Control.
[14] Sarvar Patel,et al. Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman , 2000, EUROCRYPT.
[15] Dan Boneh,et al. Evaluating 2-DNF Formulas on Ciphertexts , 2005, TCC.
[16] Debiao He. Weakness in an ECC-based AKA Protocol for Wireless Mobile Communications , 2011, IACR Cryptol. ePrint Arch..
[17] Peter Sweeney,et al. Simple authenticated key agreement algorithm , 1999 .
[18] Xian Wang,et al. An efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks , 2015, Inf. Sci..
[19] Zhenfu Cao,et al. An enhanced authenticated key agreement protocol for wireless mobile communication , 2007, Comput. Stand. Interfaces.
[20] Xiaotie Deng,et al. Key Replacement Attack Against a Generic Construction of Certificateless Signature , 2006, ACISP.
[21] Steven M. Bellovin,et al. Encrypted key exchange: password-based protocols secure against dictionary attacks , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.
[22] Chenhui Wang,et al. Certificateless signature scheme with security enhanced in the standard model , 2014, Inf. Process. Lett..
[23] Elisa Bertino,et al. Certificateless Cryptographic Protocols for Efficient Drone-Based Smart City Applications , 2017, IEEE Access.
[24] Klara Nahrstedt,et al. SMOCK: A Self-Contained Public Key Management Scheme for Mission-Critical Wireless Ad Hoc Networks , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom'07).
[25] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[26] Siu-Ming Yiu,et al. An improved authenticated key agreement protocol with perfect forward secrecy for wireless mobile communication , 2005, IEEE Wireless Communications and Networking Conference, 2005.
[27] Zhoujun Li,et al. A provably secure authenticated key agreement protocol for wireless communications , 2012, Comput. Electr. Eng..
[28] Yi Mu,et al. Malicious KGC attacks in certificateless cryptography , 2007, ASIACCS '07.
[29] Kyung Sup Kwak,et al. Certificateless Remote Anonymous Authentication Schemes for WirelessBody Area Networks , 2014, IEEE Transactions on Parallel and Distributed Systems.
[30] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[31] Kenneth G. Paterson,et al. Certificateless Public Key Cryptography , 2003 .