相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。Efficient anonymous authentication with key agreement protocol for wireless medical sensor networks
Omid Mir et al.
PEER-TO-PEER NETWORKING AND APPLICATIONS (2017)
An improved and provably secure privacy preserving authentication protocol for SIP
Shehzad Ashraf Chaudhry et al.
PEER-TO-PEER NETWORKING AND APPLICATIONS (2017)
An improved smart card based authentication scheme for session initiation protocol
Saru Kumari et al.
PEER-TO-PEER NETWORKING AND APPLICATIONS (2017)
A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps
Saru Kumari et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2016)
An efficient and secure authentication and key agreement scheme for session initiation protocol using ECC
Hamed Arshad et al.
MULTIMEDIA TOOLS AND APPLICATIONS (2016)
A Secure Biometrics-Based Multi-Server Authentication Protocol Using Smart Cards
Vanga Odelu et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)
Preserving privacy for free: Efficient and provably secure two-factor authentication scheme with user anonymity
Ding Wang et al.
INFORMATION SCIENCES (2015)
An Improved and Secure Biometric Authentication Scheme for Telecare Medicine Information Systems Based on Elliptic Curve Cryptography
Shehzad Ashraf Chaudhry et al.
JOURNAL OF MEDICAL SYSTEMS (2015)
On the Security of a Two-Factor Authentication and Key Agreement Scheme for Telecare Medicine Information Systems
Hamed Arshad et al.
JOURNAL OF MEDICAL SYSTEMS (2015)
Security analysis and improvement of two authentication and key agreement schemes for session initiation protocol
Hamed Arshad et al.
JOURNAL OF SUPERCOMPUTING (2015)
An efficient biometric-based privacy-preserving three-party authentication with key agreement protocol using smart cards
Vanga Odelu et al.
SECURITY AND COMMUNICATION NETWORKS (2015)
An enhanced privacy preserving remote user authentication scheme with provable security
Shehzad Ashraf Chaudhry et al.
SECURITY AND COMMUNICATION NETWORKS (2015)
A Secure Biometrics Based Authentication with Key Agreement Scheme in Telemedicine Networks for E-Health Services
Omid Mir et al.
WIRELESS PERSONAL COMMUNICATIONS (2015)
Improvement of robust smart-card-based password authentication scheme
Qi Jiang et al.
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2015)
Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks
Ding Wang et al.
AD HOC NETWORKS (2014)
An improved remote user authentication scheme with key agreement
Saru Kumari et al.
COMPUTERS & ELECTRICAL ENGINEERING (2014)
A Survey of SIP Authentication and Key Agreement Schemes
H. Hakan Kilinc et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2014)
Security flaws in two improved remote user authentication schemes using smart cards
Chun-Guang Ma et al.
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2014)
Robust smart-card-based remote user password authentication scheme
Bae-Ling Chen et al.
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2014)
Untraceable dynamic-identity-based remote user authentication scheme with verifiable password update
Ya-Fen Chang et al.
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2014)
Three-Factor Anonymous Authentication and Key Agreement Scheme for Telecare Medicine Information Systems
Hamed Arshad et al.
JOURNAL OF MEDICAL SYSTEMS (2014)
An improved timestamp-based password authentication scheme: comments, cryptanalysis, and improvement
Saru Kumari et al.
SECURITY AND COMMUNICATION NETWORKS (2014)
A new password authentication and user anonymity scheme based on elliptic curve cryptography and smart card
Chun-Ta Li
IET INFORMATION SECURITY (2013)
An improved dynamic ID-based remote user authentication with key agreement scheme
Fengtong Wen et al.
COMPUTERS & ELECTRICAL ENGINEERING (2012)
Exploiting hash functions to intensify the remote user authentication scheme
Wen-Bin Hsieh et al.
COMPUTERS & SECURITY (2012)
The science of guessing: analyzing an anonymized corpus of 70 million passwords
Joseph Bonneau
2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP) (2012)
An improved timestamp-based remote user authentication scheme
Amit K. Awasthi et al.
COMPUTERS & ELECTRICAL ENGINEERING (2011)
A more efficient and secure dynamic ID-based remote user authentication scheme
Yan-yan Wang et al.
COMPUTER COMMUNICATIONS (2009)
Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards
Xiao-Min Wang et al.
COMPUTER STANDARDS & INTERFACES (2007)
Telling humans and computers apart automatically
L von Ahn et al.
COMMUNICATIONS OF THE ACM (2004)
Further improvement of an efficient password based remote user authentication scheme using smart cards
EJ Yoon et al.
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS (2004)
Examining smart-card security under the threat of power analysis attacks
TS Messerges et al.
IEEE TRANSACTIONS ON COMPUTERS (2002)
An efficient and practical solution to remote authentication: Smart card
HY Chien et al.
COMPUTERS & SECURITY (2002)
Cryptanalysis of a remote user authentication scheme using smart cards
CK Chan et al.
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS (2000)
An efficient remote use authentication scheme using smart cards
HM Sun
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS (2000)
A new remote user authentication scheme using smart cards
MS Hwang et al.
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS (2000)