Cited by 42
A Pairing-Based User Authentication Scheme for Wireless Clients with Smart Cards

ICTC 2011
Eun-Jun Yoon, Kee-Young Yoo
Conference:  (2011), p. 547
A Lightweight Certificateless User Authentication Scheme for Mobile Environment
Alzubair Hassan, Rafik Hamza, Vittor Gift Mawutor, Akash Suresh Patil, Fagen Li
Book:  Lecture Notes in Computer Science (Machine Learning for Cyber Security) Volume 11806 (2019), p. 112
2012 Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing
Tsu-Yang Wu, Tung-Tso Tsai, Yuh-Min Tseng
Conference:  (2012), p. 49
Comments on ID-Based Client Authentication with Key Agreement Protocol on ECC for Mobile Client-Server Environment
S. K. Hafizul Islam, G. P. Biswas
Book:  Communications in Computer and Information Science (Advances in Computing and Communications) Volume 191 (2011), p. 628
2010 IEEE International Conference on Wireless Information Technology and Systems
E-J. Yoon, K-Y. Yoo
Conference:  (2010), p. 1
2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing
Majid Bayat, Mohammad Sabzinejad, Amirvala Movahed
Conference:  (2010), p. 578
2009 International Conference on Management of e-Commerce and e-Government
Zuowen Tan
Conference:  (2009), p. 435
2009 Fourth International Conference on Innovative Computing, Information and Control (ICICIC)
Te-Yu Chen, Min-Shiang Hwang, Cheng-Chi Lee, Jinn-Ke Jan
Conference:  (2009), p. 725
2020 IEEE 3rd International Conference on Electronic Information and Communication Technology (ICEICT)
Mo Jiaqing, Li Kaiming
Conference:  (2020), p. 579
A Provably Secure Certificateless User Authentication Protocol for Mobile Client-Server Environment
Alzubair Hassan, Nabeil Eltayieb, Rashad Elhabob, Fagen Li
Book:  Lecture Notes on Data Engineering and Communications Technologies (Advances in Internetworking, Data & Web Technologies) Volume 6 (2018), p. 592
An Efficient ID-Based Mutual Authentication and Key Agreement Protocol for Mobile Multi-server Environment Without a Trusted Registration Center and ESL Attack
Wei Li, Xue-lian Li, Jun-tao Gao, Hai-yu Wang
Book:  Communications in Computer and Information Science (Trusted Computing and Information Security) Volume 704 (2017), p. 348
2009 International Conference on Availability, Reliability and Security
Yuh-Min Tseng, Tsu-Yang Wu, Jui-Di Wu
Conference:  (2009), p. 935
A Secure User Authentication Protocol for Heterogeneous Mobile Environments
Alzubair Hassan, Rafik Hamza, Fagen Li, Awad Ali, Mohammed Bakri Bashir, Samar M. Alqhtani, Tawfeeg Mohmmed Tawfeeg, Adil Yousif
Journal:  IEEE Access Volume 10 (2022), p. 69757
A more secure and privacy‐aware anonymous user authentication scheme for distributed mobile cloud computing environments
Ruhul Amin, SK Hafizul Islam, G.P. Biswas, Debasis Giri, Muhammad Khurram Khan, Neeraj Kumar
Journal:  Security and Communication Networks Volume 9, Issue 17 (2016), p. 4650
A novel multi-server remote user authentication scheme using self-certified public keys for mobile clients
Yi-Pin Liao, Chih-Ming Hsiao
Journal:  Future Generation Computer Systems Volume 29, Issue 3 (2013), p. 886
A pairing-based publicly verifiable secret sharing scheme
Tsu-Yang Wu, Yuh-Min Tseng
Journal:  Journal of Systems Science and Complexity Volume 24, Issue 1 (2011), p. 186
A revocable ID-based authenticated group key exchange protocol with resistant to malicious participants
Tsu-Yang Wu, Yuh-Min Tseng, Tung-Tso Tsai
Journal:  Computer Networks Volume 56, Issue 12 (2012), p. 2994
An Anonymous User Authentication with Key Agreement Scheme without Pairings for Multiserver Architecture Using SCPKs
Peng Jiang, Qiaoyan Wen, Wenmin Li, Zhengping Jin, Hua Zhang
Journal:  The Scientific World Journal Volume 2013 (2013), p. 1
An Authentication and Key Agreement Mechanism for Multi-Domain Wireless Networks using Bilinear Pairings
Ming Luo, Qi-jun Yan, Guo-qiang Jiang, Jian-feng Xu
Journal:  Procedia Engineering Volume 29 (2012), p. 2649
An Authentication and Key Agreement Mechanism for Multi-domain Wireless Networks Using Certificateless Public-Key Cryptography
Ming Luo, Hong Zhao
Journal:  Wireless Personal Communications Volume 81, Issue 2 (2015), p. 779
An ID-based client authentication with key agreement protocol for mobile client–server environment on ECC with provable security
He Debiao, Chen Jianhua, Hu Jin
Journal:  Information Fusion Volume 13, Issue 3 (2012), p. 223
An efficient anonymous authentication protocol in multiple server communication networks (EAAM)
An Braeken, Pardeep Kumar, Madhusanka Liyanage, Ta Thi Kim Hue
Journal:  The Journal of Supercomputing Volume 74, Issue 4 (2018), p. 1695
An efficient certificateless user authentication and key exchange protocol for client-server environment
Alzubair Hassan, Nabeil Eltayieb, Rashad Elhabob, Fagen Li
Journal:  Journal of Ambient Intelligence and Humanized Computing Volume 9, Issue 6 (2018), p. 1713
An efficient dynamic ID-based remote user authentication scheme using self-certified public keys for multi-server environments
Shudong Li, Xiaobo Wu, Dawei Zhao, Aiping Li, Zhihong Tian, Xiaodong Yang, Hua Wang
Journal:  PLOS ONE Volume 13, Issue 10 (2018), p. e0202657
An efficient remote user authentication and key agreement protocol for mobile client–server environment from pairings
Debiao He
Journal:  Ad Hoc Networks Volume 10, Issue 6 (2012), p. 1009
An efficient user authentication and key exchange protocol for mobile client–server environment
Tsu-Yang Wu, Yuh-Min Tseng
Journal:  Computer Networks Volume 54, Issue 9 (2010), p. 1520
Analysis and improvement of a key exchange and authentication protocol in client-server environment
Yuting Li, Qingfeng Cheng, Xinghua Li
Journal:  Journal of Ambient Intelligence and Humanized Computing Volume 11, Issue 9 (2020), p. 3787
Design and Analysis of Bilinear Pairing Based Mutual Authentication and Key Agreement Protocol Usable in Multi-server Environment
Ruhul Amin, G. P. Biswas
Journal:  Wireless Personal Communications Volume 84, Issue 1 (2015), p. 439
DoS-resistant ID-based password authentication scheme using smart cards
Min-Shiang Hwang, Song-Kong Chong, Te-Yu Chen
Journal:  Journal of Systems and Software Volume 83, Issue 1 (2010), p. 163
Efficient searchable ID-based encryption with a designated server
Tsu-Yang Wu, Tung-Tso Tsai, Yuh-Min Tseng
Journal:  annals of telecommunications - annales des télécommunications Volume 69, Issue 7-8 (2014), p. 391
Enhanced and secured random number generation for eUASBP
Sangeetha Rajaram, Satyanarayana Vollala, N. Ramasubramanian, J. Kokila
Journal:  International Journal of System Assurance Engineering and Management Volume 13, Issue 3 (2022), p. 1135
Further analysis of pairing‐based traitor tracing schemes for broadcast encryption
Tsu‐Yang Wu, Yuh‐Min Tseng
Journal:  Security and Communication Networks Volume 6, Issue 1 (2013), p. 28
Identity-Based Encryption with Cloud Revocation Authority and Its Applications
Yuh-Min Tseng, Tung-Tso Tsai, Sen-Shan Huang, Chung-Peng Huang
Journal:  IEEE Transactions on Cloud Computing Volume 6, Issue 4 (2018), p. 1041
List-Free ID-Based Mutual Authentication and Key Agreement Protocol for Multiserver Architectures
Yuh-Min Tseng, Sen-Shan Huang, Tung-Tso Tsai, Jia-Hua Ke
Journal:  IEEE Transactions on Emerging Topics in Computing Volume 4, Issue 1 (2016), p. 102
Mutual authentication scheme for multimedia medical information systems
Deebak Bakkiam David
Journal:  Multimedia Tools and Applications Volume 76, Issue 8 (2017), p. 10741
Provably secure and efficient anonymous ID-based authentication protocol for mobile devices using bilinear pairings
Jia-Lun Tsai, Nai-Wei Lo
Journal:  Wireless Personal Communications Volume 83, Issue 2 (2015), p. 1273
Provably secure revocable ID‐based signature in the standard model
Tung‐Tso Tsai, Yuh‐Min Tseng, Tsu‐Yang Wu
Journal:  Security and Communication Networks Volume 6, Issue 10 (2013), p. 1250
Secure Biometric-Based Authentication Scheme Using Chebyshev Chaotic Map for Multi-Server Environment
Santanu Chatterjee, Sandip Roy, Ashok Kumar Das, Samiran Chattopadhyay, Neeraj Kumar, Athanasios V. Vasilakos
Journal:  IEEE Transactions on Dependable and Secure Computing Volume 15, Issue 5 (2018), p. 824
Towards generalized ID‐based user authentication for mobile multi‐server environment
Yun‐Hsin Chuang, Yuh‐Min Tseng
Journal:  International Journal of Communication Systems Volume 25, Issue 4 (2012), p. 447
Towards secure and efficient user authentication scheme using smart card for multi-server environments
Te-Yu Chen, Cheng-Chi Lee, Min-Shiang Hwang, Jinn-Ke Jan
Journal:  The Journal of Supercomputing Volume 66, Issue 2 (2013), p. 1008
User authentication scheme preserving anonymity for ubiquitous devices
Benchaa Djellali, Kheira Belarbi, Abdallah Chouarfia, Pascal Lorenz
Journal:  Security and Communication Networks Volume 8, Issue 17 (2015), p. 3131
eUASBP: enhanced user authentication scheme based on bilinear pairing
Sangeetha Rajaram, Tanmoy Maitra, Satyanarayana Vollala, N. Ramasubramanian, Ruhul Amin
Journal:  Journal of Ambient Intelligence and Humanized Computing Volume 11, Issue 7 (2020), p. 2827