An improved timestamp-based password authentication scheme: comments, cryptanalysis, and improvement
暂无分享,去创建一个
[1] Muhammad Khurram Khan,et al. Cryptanalysis of “an improved timestamp-based remote user authentication scheme” , 2012, 2012 International Conference on Quality, Reliability, Risk, Maintenance, and Safety Engineering.
[2] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[3] Min-Shiang Hwang,et al. Security enhancement for the timestamp-based password authentication scheme using smart cards , 2003, Comput. Secur..
[4] Cheng-Chi Lee,et al. Guessing Attacks on Strong-Password Authentication Protocol , 2013, Int. J. Netw. Secur..
[5] Lee-Ming Cheng,et al. Cryptanalysis of a Timestamp-Based Password Authentication Scheme , 2002, Comput. Secur..
[6] Lei Fan,et al. An enhancement of timestamp-based password authentication scheme , 2002, Comput. Secur..
[7] Manoj Kumar,et al. Cryptanalysis and security enhancement of Chen et al.’s remote user authentication scheme using smart card , 2012, Central European Journal of Computer Science.
[8] Muhammad Khurram Khan,et al. Cryptanalysis and security enhancement of a 'more efficient & secure dynamic ID-based remote user authentication scheme' , 2011, Comput. Commun..
[9] Lih-Chyau Wuu,et al. Robust smart‐card‐based remote user password authentication scheme , 2014, Int. J. Commun. Syst..
[10] Chun-Ta Li,et al. An efficient biometrics-based remote user authentication scheme using smart cards , 2010, J. Netw. Comput. Appl..
[11] R. C. Mittal,et al. An improved timestamp-based remote user authentication scheme , 2011, Comput. Electr. Eng..
[12] Ding Wang,et al. Cryptanalysis and security enhancement of a remote user authentication scheme using smart cards , 2012 .
[13] Jia-Yong Liu,et al. A new mutual authentication scheme based on nonce and smart cards , 2008, Comput. Commun..
[14] Xiong Li,et al. An enhanced smart card based remote user password authentication scheme , 2013, J. Netw. Comput. Appl..
[15] Jizhou Sun,et al. Cryptanalysis of a mutual authentication scheme based on nonce and smart cards , 2009, Comput. Commun..
[16] Dengguo Feng,et al. An improved smart card based password authentication scheme with provable security , 2009, Comput. Stand. Interfaces.
[17] Wei-Kuan Shih,et al. Security enhancement on an improvement on two remote user authentication schemes using smart cards , 2011, Future Gener. Comput. Syst..
[18] Yan-yan Wang,et al. A more efficient and secure dynamic ID-based remote user authentication scheme , 2009, Comput. Commun..
[19] Xiaomin Wang,et al. Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards , 2007, Comput. Stand. Interfaces.
[20] Younghwa An,et al. Security Analysis and Enhancements of an Effective Biometric-Based Remote User Authentication Scheme Using Smart Cards , 2012, Journal of biomedicine & biotechnology.
[21] Eun-Jun Yoon,et al. Attacks on the Shen et al.'s Timestamp-Based Password Authentication Scheme Using Smart Cards , 2005, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[22] Ronggong Song. Advanced smart card based password authentication protocol , 2010, Comput. Stand. Interfaces.
[23] Tian-Fu Lee. User authentication scheme with anonymity, unlinkability and untrackability for global mobility networks , 2013, Secur. Commun. Networks.
[24] Xiong Li,et al. Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards , 2011, J. Netw. Comput. Appl..
[25] Ashok Kumar Das,et al. Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards , 2011, IET Inf. Secur..
[26] Manoj Kumar,et al. An Improved Efficient Remote Password Authentication Scheme with Smart Card over Insecure Networks , 2011, Int. J. Netw. Secur..
[27] Yuefei Zhu,et al. Robust smart-cards-based user authentication scheme with user anonymity , 2012, Secur. Commun. Networks.
[28] Robert H. Sloan,et al. Examining Smart-Card Security under the Threat of Power Analysis Attacks , 2002, IEEE Trans. Computers.
[29] Muhammad Khurram Khan,et al. More efficient key-hash based fingerprint remote authentication scheme using mobile device , 2014, Computing.
[30] Chunguang Ma,et al. Security flaws in two improved remote user authentication schemes using smart cards , 2014, Int. J. Commun. Syst..
[31] Shiuh-Pyng Shieh,et al. Password authentication schemes with smart cards , 1999, Comput. Secur..