Related references
Note: Only part of the references are listed.A provably secure and efficient two-party password-based explicit authenticated key exchange protocol resistance to password guessing attacks
Mohammad Sabzinejad Farash et al.
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE (2015)
Cryptanalysis and Improvement of an Improved Two Factor Authentication Protocol for Telecare Medical Information Systems
Shehzad Ashraf Chaudhry et al.
JOURNAL OF MEDICAL SYSTEMS (2015)
An enhanced privacy preserving remote user authentication scheme with provable security
Shehzad Ashraf Chaudhry et al.
SECURITY AND COMMUNICATION NETWORKS (2015)
Cryptanalysis and improvement of 'an improved authentication with key agreement scheme on elliptic curve cryptosystem for global mobility networks'
Mohammad Sabzinejad Farash
INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT (2015)
A single round-trip SIP authentication scheme for Voice over Internet Protocol using smart card
Azeem Irshad et al.
MULTIMEDIA TOOLS AND APPLICATIONS (2015)
An efficient secure authentication scheme with user anonymity for roaming user in ubiquitous networks
Soobok Shin et al.
PEER-TO-PEER NETWORKING AND APPLICATIONS (2015)
An Enhanced and Secure Three-party Password-based Authenticated Key Exchange Protocol without Using Server's Public-Keys and Symmetric Cryptosystems
Mohammad Sabzinejad Farash et al.
INFORMATION TECHNOLOGY AND CONTROL (2014)
An efficient client-client password-based authentication scheme with provable security
Mohammad Sabzinejad Farash et al.
JOURNAL OF SUPERCOMPUTING (2014)
Cryptanalysis and improvement of a chaotic map-based key agreement protocol using Chebyshev sequence membership testing
Mohammad Sabzinejad Farash et al.
NONLINEAR DYNAMICS (2014)
An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps
Mohammad Sabzinejad Farash et al.
NONLINEAR DYNAMICS (2014)
A secure authentication scheme for session initiation protocol by using ECC on the basis of the Tang and Liu scheme
Azeem Irshad et al.
SECURITY AND COMMUNICATION NETWORKS (2014)
More secure smart card-based remote user password authentication scheme with user anonymity
Saru Kumari et al.
SECURITY AND COMMUNICATION NETWORKS (2014)
Robust Anonymous Two-Factor Authentication Scheme for Roaming Service in Global Mobility Network
Qi Xie et al.
WIRELESS PERSONAL COMMUNICATIONS (2014)
An Enhanced Authentication Scheme with Privacy Preservation for Roaming Service in Global Mobility Networks
Qi Jiang et al.
WIRELESS PERSONAL COMMUNICATIONS (2013)
A Secure and Effective Anonymous User Authentication Scheme for Roaming Service in Global Mobility Networks
Fengtong Wen et al.
WIRELESS PERSONAL COMMUNICATIONS (2013)
A novel user authentication and privacy preserving scheme with smart cards for wireless communications
Chun-Ta Li et al.
MATHEMATICAL AND COMPUTER MODELLING (2012)
Enhanced secure anonymous authentication scheme for roaming service in global mobility networks
Hyeran Mun et al.
MATHEMATICAL AND COMPUTER MODELLING (2012)
Lightweight and provably secure user authentication with anonymity for the global mobility network
Chun Chen et al.
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2011)
A practical authentication protocol with anonymity for wireless access networks
Yen-Cheng Chen et al.
WIRELESS COMMUNICATIONS & MOBILE COMPUTING (2011)
Design and Validation of an Efficient Authentication Scheme with Anonymity for Roaming Service in Global Mobility Networks
Daojing He et al.
WIRELESS PERSONAL COMMUNICATIONS (2011)
Enhanced authentication scheme with anonymity for roaming service in global mobility networks
Chin-Chen Chang et al.
COMPUTER COMMUNICATIONS (2009)
Secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks
Chun-Ta Li et al.
COMPUTER COMMUNICATIONS (2008)
A Secure Authentication Scheme with Anonymity for Wireless Communications
Chia-Chun Wu et al.
IEEE COMMUNICATIONS LETTERS (2008)
Security enhancement on a new authentication scheme with anonymity for wireless environments
Cheng-Chi Lee et al.
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS (2006)