An anonymous mobile user authentication protocol using self-certified public keys based on multi-server architectures
暂无分享,去创建一个
[1] Jia-Lun Tsai,et al. Efficient multi-server authentication scheme based on one-way hash function without verification table , 2008, Comput. Secur..
[2] Chun Chen,et al. A strong user authentication scheme with smart cards for wireless communications , 2011, Comput. Commun..
[3] Hung-Min Sun,et al. An efficient remote use authentication scheme using smart cards , 2000, IEEE Trans. Consumer Electron..
[4] Woei-Jiunn Tsaur,et al. A Flexible User Authentication Scheme for Multi-server Internet Services , 2001, ICN.
[5] Shuenn-Shyang Wang,et al. A secure dynamic ID based remote user authentication scheme for multi-server environment , 2009, Comput. Stand. Interfaces.
[6] Victor S. Miller,et al. The Weil Pairing, and Its Efficient Calculation , 2004, Journal of Cryptology.
[7] Kuldip Singh,et al. A secure dynamic identity based authentication protocol for multi-server architecture , 2011, J. Netw. Comput. Appl..
[8] Tzonelih Hwang,et al. Reparable key distribution protocols for Internet environments , 1995, IEEE Trans. Commun..
[9] Min-Shiang Hwang,et al. A remote password authentication scheme for multiserver architecture using neural networks , 2001, IEEE Trans. Neural Networks.
[10] Wei-Chi Ku,et al. Impersonation Attack on a Dynamic ID-Based Remote User Authentication Scheme Using Smart Cards , 2005, IEICE Trans. Commun..
[11] Robert H. Deng,et al. New efficient user identification and key distribution scheme providing enhanced security , 2004, Comput. Secur..
[12] Taher El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.
[13] Jian Ma,et al. An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards , 2012, J. Netw. Comput. Appl..
[14] Chin-Chen Chang,et al. Some Forgery Attacks on a Remote User Authentication Scheme Using Smart Cards , 2003, Informatica.
[15] Hung-Min Sun,et al. An Efficient Remote User Authentication Scheme Using Smart Cards , 2000 .
[16] Min-Shiang Hwang,et al. A new remote user authentication scheme using smart cards , 2000, IEEE Trans. Consumer Electron..
[17] Chih-Ming Hsiao,et al. A novel multi-server remote user authentication scheme using self-certified public keys for mobile clients , 2013, Future Gener. Comput. Syst..
[18] Xinmiao Zhang,et al. Wireless Security and Cryptography: Specifications and Implementations , 2007 .
[19] Wen-Shenq Juang,et al. Efficient multi-server password authenticated key agreement using smart cards , 2004, IEEE Transactions on Consumer Electronics.
[20] Michael Scott,et al. Implementing Cryptographic Pairings on Smartcards , 2006, CHES.
[21] Chin-Chen Chang,et al. An efficient and secure multi-server password authentication scheme using smart cards , 2004, 2004 International Conference on Cyberworlds.
[22] Min-Shiang Hwang,et al. A new remote user authentication scheme for multi-server architecture , 2003, Future Gener. Comput. Syst..
[23] Cheng-Chi Lee,et al. A simple remote user authentication scheme , 2002 .
[24] Patrick Horster,et al. Self-certified keys — Concepts and Applications , 1997 .
[25] Wei-Kuan Shih,et al. Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment , 2009, Comput. Stand. Interfaces.
[26] Min-Shiang Hwang,et al. A modified remote user authentication scheme using smart cards , 2003, IEEE Trans. Consumer Electron..
[27] Amit K. Awasthi,et al. An enhanced remote user authentication scheme using smart cards , 2004, IEEE Transactions on Consumer Electronics.
[28] Ashutosh Saxena,et al. A dynamic ID-based remote user authentication scheme , 2004, IEEE Transactions on Consumer Electronics.
[29] Wei-Bin Lee,et al. An enhanced user authentication scheme for multi-server Internet services , 2005, Appl. Math. Comput..
[30] Nicolas Sklavos. On the Hardware Implementation Cost of Crypto-Processors Architectures , 2010, Inf. Secur. J. A Glob. Perspect..
[31] Marc Girault,et al. Self-Certified Public Keys , 1991, EUROCRYPT.
[32] Leslie Lamport,et al. Password authentication with insecure communication , 1981, CACM.
[33] Chien-Lung Hsu,et al. Efficient user identification scheme with key distribution preserving anonymity for distributed computer networks , 2004, Comput. Secur..