4.3 Article

A new password authentication and user anonymity scheme based on elliptic curve cryptography and smart card

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Information Systems

Cryptanalysis and improvements of an anonymous multi-receiver identity-based encryption scheme

H. Wang et al.

IET INFORMATION SECURITY (2012)

Article Computer Science, Interdisciplinary Applications

A novel user authentication and privacy preserving scheme with smart cards for wireless communications

Chun-Ta Li et al.

MATHEMATICAL AND COMPUTER MODELLING (2012)

Article Communication

A secure routing protocol with node selfishness resistance in MANETs

Chun-Ta Li et al.

INTERNATIONAL JOURNAL OF MOBILE COMMUNICATIONS (2012)

Article Computer Science, Information Systems

Robust authentication and key agreement scheme preserving the privacy of secret key

Ren-Chiun Wang et al.

COMPUTER COMMUNICATIONS (2011)

Article Computer Science, Information Systems

One for all - all for one: unifying standard differential power analysis attacks

S. Mangard et al.

IET INFORMATION SECURITY (2011)

Article Computer Science, Information Systems

Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards

A. K. Das

IET INFORMATION SECURITY (2011)

Article Computer Science, Information Systems

A lightweight anonymous routing protocol without public key en/decryptions for wireless ad hoc networks

Chun-Ta Li et al.

INFORMATION SCIENCES (2011)

Article Computer Science, Hardware & Architecture

Advanced smart card based password authentication protocol

Ronggong Song

COMPUTER STANDARDS & INTERFACES (2010)

Article Computer Science, Information Systems

Secure remote user access over insecure networks

M Peyravian et al.

COMPUTER COMMUNICATIONS (2006)

Article Computer Science, Hardware & Architecture

Security of Chien et al.'s remote user authentication scheme using smart cards

CL Hsu

COMPUTER STANDARDS & INTERFACES (2004)

Article Computer Science, Information Systems

A password authentication scheme with secure password updating

CL Lin et al.

COMPUTERS & SECURITY (2003)

Article Computer Science, Hardware & Architecture

Examining smart-card security under the threat of power analysis attacks

TS Messerges et al.

IEEE TRANSACTIONS ON COMPUTERS (2002)

Article Computer Science, Information Systems

An efficient and practical solution to remote authentication: Smart card

HY Chien et al.

COMPUTERS & SECURITY (2002)

Article Computer Science, Information Systems

Methods for protecting password transmission

M Peyravian et al.

COMPUTERS & SECURITY (2000)