An efficient and complete remote user authentication scheme using smart cards
暂无分享,去创建一个
[1] Hung-Min Sun,et al. An Efficient Remote User Authentication Scheme Using Smart Cards , 2000 .
[2] Leslie Lamport,et al. Password authentication with insecure communication , 1981, CACM.
[3] Stephen M. Matyas,et al. Cryptographic Authentication of Time-Invariant Quantities , 1981, IEEE Trans. Commun..
[4] Min-Shiang Hwang,et al. A new remote user authentication scheme using smart cards , 2000, IEEE Trans. Consumer Electron..
[5] 葉禾田,et al. Further Cryptanalysis of password authentication schemes with smart cards , 2003 .
[6] Shiuh-Pyng Shieh,et al. Password authentication schemes with smart cards , 1999, Comput. Secur..
[7] Taher ElGamal,et al. A public key cyryptosystem and signature scheme based on discrete logarithms , 1985 .
[8] Wei-Chi Ku,et al. Weaknesses of Yoon-Ryu-Yoo's hash-based password authentication scheme , 2005, OPSR.
[9] Wei-Chi Ku,et al. Impersonation Attack on a Dynamic ID-Based Remote User Authentication Scheme Using Smart Cards , 2005, IEICE Trans. Commun..
[10] Wang Shiuh-Jeng,et al. Refereed paper: Smart card based secure password authentication scheme , 1996 .
[11] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[12] Cheng-Chi Lee,et al. A simple remote user authentication scheme , 2002 .
[13] Lee-Ming Cheng,et al. Remarks on Wang-Chang's password authentication scheme , 2001 .
[14] Hung-Yu Chien,et al. An Efficient and Practical Solution to Remote Authentication: Smart Card , 2002, Comput. Secur..
[15] Jin-Fu Chang,et al. Smart card based secure password authentication scheme , 1996, Computers & security.
[16] Hung-Min Sun,et al. An efficient remote use authentication scheme using smart cards , 2000, IEEE Trans. Consumer Electron..
[17] Wei-Chi Ku,et al. Further cryptanalysis of fingerprint-based remote user authentication scheme using smartcards , 2005 .