Cited by 13
On the Security of Some Password Authentication Protocols

A novel remote user authentication scheme using bilinear pairings
Manik Lal Das, Ashutosh Saxena, Ved P. Gulati, Deepak B. Phatak
Journal  Computers & Security Volume 25, Issue 3 (2006), p. 184
An improved bilinear pairing based remote user authentication scheme
Thulasi Goriparthi, Manik Lal Das, Ashutosh Saxena
Journal  Computer Standards & Interfaces Volume 31, Issue 1 (2009), p. 181
Design of improved password authentication and update scheme based on elliptic curve cryptography
SK Hafizul Islam, G.P. Biswas
Journal  Mathematical and Computer Modelling Volume 57, Issue 11-12 (2013), p. 2703
Further Improved Remote User Authentication Scheme
Jung-Yoon KIM, Hyoung-Kee CHOI, John A. COPELAND
Journal  IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences Volume E94-A, Issue 6 (2011), p. 1426
Improvement of the ElGamal Based Remote Authentication Scheme Using Smart Cards
Yung-Cheng Lee, Yi-Chih Hsieh, Pei-Ju Lee, Peng-Sheng You
Journal  Journal of Applied Research and Technology Volume 12, Issue 6 (2014), p. 1063
Improvement of the Peyravian–Jeffries’s user authentication protocol and password change protocol
Marko Hölbl, Tatjana Welzer, Boštjan Brumen
Journal  Computer Communications Volume 31, Issue 10 (2008), p. 1945
Improvements on Hsiang and Shih's Remote User Authentication Scheme Using Smart Cards
Jung-Yoon KIM, Hyoung-Kee CHOI
Journal  IEICE Transactions on Information and Systems Volume E95.D, Issue 10 (2012), p. 2393
On the Security of the Discrete Logarithm Based Remote Authentication Scheme Using Smart Cards
Yung Cheng Lee, Pei Ju Lee
Journal  Applied Mechanics and Materials Volume 479-480 (2013), p. 963
Proceedings of the 4th International Conference on Ubiquitous Information Technologies & Applications
Injoo Jang, Hyeong Seon Yoo
Conference  (2009), p. 1
Secure remote user access over insecure networks
Mohammad Peyravian, Clark Jeffries
Journal  Computer Communications Volume 29, Issue 5 (2006), p. 660
Security flaws of remote user access over insecure networks
Kyung-Ah Shim
Journal  Computer Communications Volume 30, Issue 1 (2006), p. 117
Smart-card-loss-attack and Improvement of Hsiang et al.’s Authentication Scheme
Y.C. Lee
Journal  Journal of Applied Research and Technology Volume 11, Issue 4 (2013), p. 597
Various Types of Attacks and Solutions Regarding Secure Remote User Access over Insecure Networks
Eun-Jun Yoon, Kee-Young Yoo
Book  Lecture Notes in Computer Science (Computational Science and Its Applications - ICCSA 2006) Volume 3980 (2006), p. 1156