Login
Register
Home
Issues
Volume 14, Issue 2 (2003)
On the Security of Some Password Authent ...
Informatica
Information
Submit your article
For Referees
Help
ATTENTION!
Article info
Related articles
Cited by
More
Article info
Related articles
Cited by
Cited by
13
On the Security of Some Password Authentication Protocols
A novel remote user authentication scheme using bilinear pairings
Manik Lal Das, Ashutosh Saxena, Ved P. Gulati, Deepak B. Phatak
https://doi.org/10.1016/j.cose.2005.09.002
Journal
Computers & Security
Volume 25, Issue 3 (2006), p. 184
An improved bilinear pairing based remote user authentication scheme
Thulasi Goriparthi, Manik Lal Das, Ashutosh Saxena
https://doi.org/10.1016/j.csi.2007.11.016
Journal
Computer Standards & Interfaces
Volume 31, Issue 1 (2009), p. 181
Design of improved password authentication and update scheme based on elliptic curve cryptography
SK Hafizul Islam, G.P. Biswas
https://doi.org/10.1016/j.mcm.2011.07.001
Journal
Mathematical and Computer Modelling
Volume 57, Issue 11-12 (2013), p. 2703
Further Improved Remote User Authentication Scheme
Jung-Yoon KIM, Hyoung-Kee CHOI, John A. COPELAND
https://doi.org/10.1587/transfun.E94.A.1426
Journal
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Volume E94-A, Issue 6 (2011), p. 1426
Improvement of the ElGamal Based Remote Authentication Scheme Using Smart Cards
Yung-Cheng Lee, Yi-Chih Hsieh, Pei-Ju Lee, Peng-Sheng You
https://doi.org/10.1016/S1665-6423(14)71666-9
Journal
Journal of Applied Research and Technology
Volume 12, Issue 6 (2014), p. 1063
Improvement of the Peyravian–Jeffries’s user authentication protocol and password change protocol
Marko Hölbl, Tatjana Welzer, Boštjan Brumen
https://doi.org/10.1016/j.comcom.2007.12.029
Journal
Computer Communications
Volume 31, Issue 10 (2008), p. 1945
Improvements on Hsiang and Shih's Remote User Authentication Scheme Using Smart Cards
Jung-Yoon KIM, Hyoung-Kee CHOI
https://doi.org/10.1587/transinf.E95.D.2393
Journal
IEICE Transactions on Information and Systems
Volume E95.D, Issue 10 (2012), p. 2393
On the Security of the Discrete Logarithm Based Remote Authentication Scheme Using Smart Cards
Yung Cheng Lee, Pei Ju Lee
https://doi.org/10.4028/www.scientific.net/AMM.479-480.963
Journal
Applied Mechanics and Materials
Volume 479-480 (2013), p. 963
Proceedings of the 4th International Conference on Ubiquitous Information Technologies & Applications
Injoo Jang, Hyeong Seon Yoo
https://doi.org/10.1109/ICUT.2009.5405752
Conference
(2009), p. 1
Secure remote user access over insecure networks
Mohammad Peyravian, Clark Jeffries
https://doi.org/10.1016/j.comcom.2005.07.025
Journal
Computer Communications
Volume 29, Issue 5 (2006), p. 660
Security flaws of remote user access over insecure networks
Kyung-Ah Shim
https://doi.org/10.1016/j.comcom.2006.08.001
Journal
Computer Communications
Volume 30, Issue 1 (2006), p. 117
Smart-card-loss-attack and Improvement of Hsiang et al.’s Authentication Scheme
Y.C. Lee
https://doi.org/10.1016/S1665-6423(13)71567-0
Journal
Journal of Applied Research and Technology
Volume 11, Issue 4 (2013), p. 597
Various Types of Attacks and Solutions Regarding Secure Remote User Access over Insecure Networks
Eun-Jun Yoon, Kee-Young Yoo
https://doi.org/10.1007/11751540_126
Book
Lecture Notes in Computer Science (Computational Science and Its Applications - ICCSA 2006)
Volume 3980 (2006), p. 1156
Export citation
Copy and paste formatted citation
Formatted citation
Placeholder
Citation style
AMS -- Americal Mathematical Society
APA -- American Psychological Association 6th ed.
Chicago -- The Chicago Manual of Style 17th ed.
Download citation in file
Export format
BibTeX
RIS
Authors
Placeholder
Share
RSS
To top