4.6 Article

A lightweight authentication and key agreement protocol preserving user anonymity

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Information Systems

Efficient anonymous authentication with key agreement protocol for wireless medical sensor networks

Omid Mir et al.

PEER-TO-PEER NETWORKING AND APPLICATIONS (2017)

Article Computer Science, Information Systems

An improved and provably secure privacy preserving authentication protocol for SIP

Shehzad Ashraf Chaudhry et al.

PEER-TO-PEER NETWORKING AND APPLICATIONS (2017)

Article Computer Science, Information Systems

An improved smart card based authentication scheme for session initiation protocol

Saru Kumari et al.

PEER-TO-PEER NETWORKING AND APPLICATIONS (2017)

Article Computer Science, Theory & Methods

A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps

Saru Kumari et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2016)

Article Computer Science, Information Systems

An efficient and secure authentication and key agreement scheme for session initiation protocol using ECC

Hamed Arshad et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2016)

Article Computer Science, Theory & Methods

A Secure Biometrics-Based Multi-Server Authentication Protocol Using Smart Cards

Vanga Odelu et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)

Article Computer Science, Information Systems

Preserving privacy for free: Efficient and provably secure two-factor authentication scheme with user anonymity

Ding Wang et al.

INFORMATION SCIENCES (2015)

Article Health Care Sciences & Services

An Improved and Secure Biometric Authentication Scheme for Telecare Medicine Information Systems Based on Elliptic Curve Cryptography

Shehzad Ashraf Chaudhry et al.

JOURNAL OF MEDICAL SYSTEMS (2015)

Article Health Care Sciences & Services

On the Security of a Two-Factor Authentication and Key Agreement Scheme for Telecare Medicine Information Systems

Hamed Arshad et al.

JOURNAL OF MEDICAL SYSTEMS (2015)

Article Computer Science, Hardware & Architecture

Security analysis and improvement of two authentication and key agreement schemes for session initiation protocol

Hamed Arshad et al.

JOURNAL OF SUPERCOMPUTING (2015)

Article Computer Science, Information Systems

An efficient biometric-based privacy-preserving three-party authentication with key agreement protocol using smart cards

Vanga Odelu et al.

SECURITY AND COMMUNICATION NETWORKS (2015)

Article Computer Science, Information Systems

An enhanced privacy preserving remote user authentication scheme with provable security

Shehzad Ashraf Chaudhry et al.

SECURITY AND COMMUNICATION NETWORKS (2015)

Article Engineering, Electrical & Electronic

Improvement of robust smart-card-based password authentication scheme

Qi Jiang et al.

INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2015)

Article Computer Science, Hardware & Architecture

An improved remote user authentication scheme with key agreement

Saru Kumari et al.

COMPUTERS & ELECTRICAL ENGINEERING (2014)

Article Computer Science, Information Systems

A Survey of SIP Authentication and Key Agreement Schemes

H. Hakan Kilinc et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2014)

Article Engineering, Electrical & Electronic

Security flaws in two improved remote user authentication schemes using smart cards

Chun-Guang Ma et al.

INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2014)

Article Engineering, Electrical & Electronic

Robust smart-card-based remote user password authentication scheme

Bae-Ling Chen et al.

INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2014)

Article Engineering, Electrical & Electronic

Untraceable dynamic-identity-based remote user authentication scheme with verifiable password update

Ya-Fen Chang et al.

INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2014)

Article Health Care Sciences & Services

Three-Factor Anonymous Authentication and Key Agreement Scheme for Telecare Medicine Information Systems

Hamed Arshad et al.

JOURNAL OF MEDICAL SYSTEMS (2014)

Article Computer Science, Information Systems

An improved timestamp-based password authentication scheme: comments, cryptanalysis, and improvement

Saru Kumari et al.

SECURITY AND COMMUNICATION NETWORKS (2014)

Article Computer Science, Information Systems

A new password authentication and user anonymity scheme based on elliptic curve cryptography and smart card

Chun-Ta Li

IET INFORMATION SECURITY (2013)

Article Computer Science, Hardware & Architecture

An improved dynamic ID-based remote user authentication with key agreement scheme

Fengtong Wen et al.

COMPUTERS & ELECTRICAL ENGINEERING (2012)

Article Computer Science, Information Systems

Exploiting hash functions to intensify the remote user authentication scheme

Wen-Bin Hsieh et al.

COMPUTERS & SECURITY (2012)

Proceedings Paper Computer Science, Theory & Methods

The science of guessing: analyzing an anonymized corpus of 70 million passwords

Joseph Bonneau

2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP) (2012)

Article Computer Science, Hardware & Architecture

An improved timestamp-based remote user authentication scheme

Amit K. Awasthi et al.

COMPUTERS & ELECTRICAL ENGINEERING (2011)

Article Computer Science, Information Systems

A more efficient and secure dynamic ID-based remote user authentication scheme

Yan-yan Wang et al.

COMPUTER COMMUNICATIONS (2009)

Article Computer Science, Hardware & Architecture

Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards

Xiao-Min Wang et al.

COMPUTER STANDARDS & INTERFACES (2007)

Article Computer Science, Hardware & Architecture

Telling humans and computers apart automatically

L von Ahn et al.

COMMUNICATIONS OF THE ACM (2004)

Article Engineering, Electrical & Electronic

Further improvement of an efficient password based remote user authentication scheme using smart cards

EJ Yoon et al.

IEEE TRANSACTIONS ON CONSUMER ELECTRONICS (2004)

Article Computer Science, Hardware & Architecture

Examining smart-card security under the threat of power analysis attacks

TS Messerges et al.

IEEE TRANSACTIONS ON COMPUTERS (2002)

Article Computer Science, Information Systems

An efficient and practical solution to remote authentication: Smart card

HY Chien et al.

COMPUTERS & SECURITY (2002)

Article Engineering, Electrical & Electronic

Cryptanalysis of a remote user authentication scheme using smart cards

CK Chan et al.

IEEE TRANSACTIONS ON CONSUMER ELECTRONICS (2000)

Article Engineering, Electrical & Electronic

An efficient remote use authentication scheme using smart cards

HM Sun

IEEE TRANSACTIONS ON CONSUMER ELECTRONICS (2000)

Article Engineering, Electrical & Electronic

A new remote user authentication scheme using smart cards

MS Hwang et al.

IEEE TRANSACTIONS ON CONSUMER ELECTRONICS (2000)