A Novel Remote User Authentication Scheme from Bilinear Pairings Via Internet
暂无分享,去创建一个
[1] Wei-Chi Ku,et al. Cryptanalysis of a Multi-Server Password Authenticated Key Agreement Scheme Using Smart Cards , 2005, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[2] Yalin Chen,et al. Improvement of Manik et al.¡¦s remote user authentication scheme , 2005, IACR Cryptol. ePrint Arch..
[3] Chien-Lung Hsu. Security of Chien et al.'s remote user authentication scheme using smart cards , 2004, Comput. Stand. Interfaces.
[4] Hung-Yu Chien,et al. An Efficient and Practical Solution to Remote Authentication: Smart Card , 2002, Comput. Secur..
[5] Mukesh Singhal,et al. A distributed multi-party key agreement protocol for dynamic collaborative groups using ECC , 2006, J. Parallel Distributed Comput..
[6] Guanfei Fang,et al. Improvement of recently proposed Remote User Authentication Schemes , 2006, IACR Cryptol. ePrint Arch..
[7] Florian Hess,et al. Efficient Identity Based Signature Schemes Based on Pairings , 2002, Selected Areas in Cryptography.
[8] Kaijun Tan,et al. Remote password authentication scheme based on cross-product , 1999, Comput. Commun..
[9] Eun-Jun Yoon,et al. Robust Remote User Authentication Scheme , 2004, ICOIN.
[10] Walid I. Khedr. SRFID: A hash-based security scheme for low cost RFID systems , 2013 .
[11] Lee-Ming Cheng,et al. Cryptanalysis of a Timestamp-Based Password Authentication Scheme , 2002, Comput. Secur..
[12] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[13] Ashutosh Saxena,et al. A novel remote user authentication scheme using bilinear pairings , 2006, Comput. Secur..
[14] Leslie Lamport,et al. Password authentication with insecure communication , 1981, CACM.
[15] G. P. Biswas,et al. A more efficient and secure ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem , 2011, J. Syst. Softw..
[16] Chin-Chen Chang,et al. Remote password authentication with smart cards , 1991 .
[17] Wen-Shenq Juang,et al. Efficient password authenticated key agreement using smart cards , 2004, Comput. Secur..
[18] Kenneth G. Paterson,et al. ID-based Signatures from Pairings on Elliptic Curves , 2002, IACR Cryptol. ePrint Arch..
[19] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[20] Hung-Min Sun,et al. On the Security of Some Proxy Blind Signature Schemes , 2005, ACSW.
[21] Tzong-Chen Wu,et al. Remote login authentication scheme based on a geometric approach , 1995, Comput. Commun..
[22] Shiuh-Pyng Shieh,et al. Password authentication schemes with smart cards , 1999, Comput. Secur..
[23] Jia-Lun Tsai,et al. Convertible multi-authenticated encryption scheme with one-way hash function , 2009, Comput. Commun..
[24] Jiann-Fu Lin,et al. A new electronic traveler's check scheme based on one-way hash function , 2007, Electron. Commer. Res. Appl..
[25] Atul Negi,et al. Cryptanalysis of recently proposed Remote User Authentication Schemes , 2006, IACR Cryptol. ePrint Arch..
[26] Wang Shiuh-Jeng,et al. Refereed paper: Smart card based secure password authentication scheme , 1996 .
[27] Jianmin Wang,et al. Efficient remote mutual authentication and key agreement , 2006, Comput. Secur..