Related references
Note: Only part of the references are listed.Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment
Ding Wang et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2015)
Universally composable three-party password-authenticated key exchange with contributiveness
Xuexian Hu et al.
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2015)
A secure and efficient ECC-based user anonymity preserving single sign-on scheme for distributed computer networks
Vanga Odelu et al.
SECURITY AND COMMUNICATION NETWORKS (2015)
An effective ECC-based user access control scheme with attribute-based encryption for wireless sensor networks
Santanu Chatterjee et al.
SECURITY AND COMMUNICATION NETWORKS (2015)
Provably secure three-party authenticated key agreement protocol using smart cards
Haomin Yang et al.
COMPUTER NETWORKS (2014)
A Survey of SIP Authentication and Key Agreement Schemes
H. Hakan Kilinc et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2014)
Cloud-Based Augmentation for Mobile Devices: Motivation, Taxonomies, and Open Challenges
Saeid Abolfazli et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2014)
A Novel Serial Multimodal Biometrics Framework Based on Semisupervised Learning Techniques
Qing Zhang et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2014)
Further Observations on Smart-Card-Based Password-Authenticated Key Agreement in Distributed Systems
Xinyi Huang et al.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2014)
A secure effective key management scheme for dynamic access control in a large leaf class hierarchy
Vanga Odelu et al.
INFORMATION SCIENCES (2014)
Cryptanalysis and enhancement of a chaotic maps-based three-party password authenticated key exchange protocol
Xuexian Hu et al.
NONLINEAR DYNAMICS (2014)
A Review on Distributed Application Processing Frameworks in Smart Mobile Devices for Mobile Cloud Computing
Muhammad Shiraz et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2013)
Privacy-Preserving Speech Processing
Manas A. Pathak et al.
IEEE SIGNAL PROCESSING MAGAZINE (2013)
Provably secure three party encrypted key exchange scheme with explicit authentication
Hao-Chuan Tsai et al.
INFORMATION SCIENCES (2013)
Finding and fixing vulnerabilities in several three-party password authenticated key exchange protocols without server public keys
Hu Xiong et al.
INFORMATION SCIENCES (2013)
An novel three-party authenticated key exchange protocol using one-time key
Chao Lv et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2013)
New identity-based three-party authenticated key agreement protocol with provable security
Hu Xiong et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2013)
Security analysis and improvements of a communication-efficient three-party password authenticated key exchange protocol
Raylin Tso
JOURNAL OF SUPERCOMPUTING (2013)
Re-attack on a three-party password-based authenticated key exchange protocol
Haiquan Liang et al.
MATHEMATICAL AND COMPUTER MODELLING (2013)
A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps
Cheng-Chi Lee et al.
NONLINEAR DYNAMICS (2013)
A communication and computation-efficient three-party authenticated key agreement protocol
Zuowen Tan
SECURITY AND COMMUNICATION NETWORKS (2013)
Secure verifier-based three-party password-authenticated key exchange
Qiong Pu et al.
PEER-TO-PEER NETWORKING AND APPLICATIONS (2013)
Enhanced Privacy ID: A Direct Anonymous Attestation Scheme with Enhanced Revocation Capabilities
Ernie Brickell et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2012)
A Framework for Analyzing Template Security and Privacy in Biometric Authentication Systems
Koen Simoens et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2012)
Provably secure three-party password-based authenticated key exchange protocol
Jianjie Zhao et al.
INFORMATION SCIENCES (2012)
Cryptanalysis of a communication-efficient three-party password authenticated key exchange protocol
Shuhua Wu et al.
INFORMATION SCIENCES (2012)
A round-optimal three-party ID-based authenticated key agreement protocol
Kyung-Ah Shim
INFORMATION SCIENCES (2012)
Computationally sound symbolic security reduction analysis of the group key exchange protocols using bilinear pairings
Zijian Zhang et al.
INFORMATION SCIENCES (2012)
Cryptanalysis and improvement of an access control in user hierarchy based on elliptic curve cryptosystem
Ashok Kumar Das et al.
INFORMATION SCIENCES (2012)
Cryptanalysis of an efficient three-party password-based key exchange scheme
Marcos A. Simplicio et al.
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2012)
Provably secure three-party password authenticated key exchange protocol in the standard model
Jun-Han Yang et al.
JOURNAL OF SYSTEMS AND SOFTWARE (2012)
Robust smart-cards-based user authentication scheme with user anonymity
Shuhua Wu et al.
SECURITY AND COMMUNICATION NETWORKS (2012)
Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards
A. K. Das
IET INFORMATION SECURITY (2011)
Provably secure one-round identity-based authenticated asymmetric group key agreement protocol
Lei Zhang et al.
INFORMATION SCIENCES (2011)
A communication-efficient three-party password authenticated key exchange protocol
Ting-Yi Chang et al.
INFORMATION SCIENCES (2011)
Efficient three-party password-based key exchange scheme
Der-Chyuan Lou et al.
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2011)
On a simple three-party password-based key exchange protocol'
Ching-Ying Lin et al.
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2011)
Cryptanalysis of a simple three-party password-based key exchange protocol
Eun-Jun Yoon et al.
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2011)
Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards
Xiong Li et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2011)
A Simple and Generic Construction of Authenticated Encryption with Associated Data
Palash Sarkar
ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY (2010)
A Hybrid Approach for Generating Secure and Discriminating Face Template
Yi C. Feng et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2010)
Soft Biometric Traits for Continuous User Authentication
Koichiro Niinuma et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2010)
Simple password-based three-party authenticated key exchange without server public keys
Tian-Fu Lee et al.
INFORMATION SCIENCES (2010)
A hybrid biometric cryptosystem for securing fingerprint minutiae templates
Abhishek Nagar et al.
PATTERN RECOGNITION LETTERS (2010)
A simple three-party password-based key exchange protocol
Hui-Feng Huang
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2009)
Cryptanalysis of simple three-party key exchange protocol
Hua Guo et al.
COMPUTERS & SECURITY (2008)
Provably secure constant round contributory group key agreement in dynamic setting
Ratna Dutta et al.
IEEE TRANSACTIONS ON INFORMATION THEORY (2008)
Three weaknesses in a simple three-party key exchange protocol
Hao-Rung Chung et al.
INFORMATION SCIENCES (2008)
Cryptanalysis of simple three-party key exchange protocol (S-3PAKE)
Raphael C. -W. Phan et al.
INFORMATION SCIENCES (2008)
Biometric template security
Anil K. Jain et al.
EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING (2008)
Simple three-party key exchange protocol
Rongxing Lu et al.
COMPUTERS & SECURITY (2007)
Some observations on the theory of cryptographic hash functions
DR Stinson
DESIGNS CODES AND CRYPTOGRAPHY (2006)
Efficient three-party key exchange using smart cards
WS Jaung
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS (2004)
The advantages of elliptic curve cryptography for wireless security
K Lauter
IEEE WIRELESS COMMUNICATIONS (2004)
Enhanced three-party encrypted key exchange without server public keys
TF Lee et al.
COMPUTERS & SECURITY (2004)
Examining smart-card security under the threat of power analysis attacks
TS Messerges et al.
IEEE TRANSACTIONS ON COMPUTERS (2002)
Three-party encrypted key exchange without server public-keys
CL Lin et al.
IEEE COMMUNICATIONS LETTERS (2001)
Enhancing security and privacy in biometrics-based authentication systems
NK Ratha et al.
IBM SYSTEMS JOURNAL (2001)
Biometric identification
A Jain et al.
COMMUNICATIONS OF THE ACM (2000)