1. Trang chủ
  2. » Luận Văn - Báo Cáo

Phát triển các phương pháp chứng thực thông tin với thiết bị di động

129 13 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 129
Dung lượng 2,9 MB

Nội dung

Ngày đăng: 26/07/2021, 08:46

Nguồn tham khảo

Tài liệu tham khảo Loại Chi tiết
[1] L. Lamport, "Password Authentication with Insecure Communication," Communications of the ACM, vol. 3468, p. 770–772, 1981 Sách, tạp chí
Tiêu đề: Password Authentication with Insecure Communication
[2] A. Shamir, "Identity-based cryptosystems and signature schemes," in Proceedings of CRYPTO'84 on Advances in Cryptology, Springer-Verlag, New York, USA, 1984 Sách, tạp chí
Tiêu đề: Identity-based cryptosystems and signature schemes
[3] M. S. Hwang, C. C. Lee and Y. L. Tang, "A simple remote user authentication scheme," Mathematical and Computer Modelling, vol. 36, no. 1-2, p. 103–107, 2002 Sách, tạp chí
Tiêu đề: A simple remote user authentication scheme
[4] C. C. Lee, M. S. Hwang and W. P. Yang, "A flexible remote user authentication scheme using smart cards," ACM SIGOPS Operating Systems Review, vol. 36, no. 3, pp. 46-52, 2002 Sách, tạp chí
Tiêu đề: A flexible remote user authentication scheme using smart cards
[5] L. H. Li, L. C. Lin and M. S. Hwang, "A remote password authentication scheme for multiserver architecture using neural networks," IEEE Transactions on Neural Networks, vol. 12, no. 6, pp. 1498-1504, 2001 Sách, tạp chí
Tiêu đề: A remote password authentication scheme for multiserver architecture using neural networks
[6] J. J. Shen, C. W. Lin and M. S. Hwang, "A Modified Remote User Authentication Scheme Using Smart Cards," IEEE Transactions on Consumer Electronics, vol. 49, no. 2, pp. 414-416, 2003 Sách, tạp chí
Tiêu đề: A Modified Remote User Authentication Scheme Using Smart Cards
[7] M. L. Das, A. Saxena and V. P. Gulati, "A dynamic ID-based remote user authentication scheme," IEEE Transactions on Consumer Electronics, vol. 50, no. 2, pp. 629-631, 2004 Sách, tạp chí
Tiêu đề: A dynamic ID-based remote user authentication scheme
[8] I. E. Liao, C. C. Lee and M. S. Hwang, "Security enhancement for a dynamic ID-based remote user authentication scheme," in International Conference on Next Generation Web Services Practices, Seoul, Korea, 2005 Sách, tạp chí
Tiêu đề: Security enhancement for a dynamic ID-based remote user authentication scheme
[9] E. J. Yoon and K. Y. Yoo, "Improving the Dynamic ID-Based Remote Mutual Authentication Scheme," in On the Move to Meaningful Internet Systems 2006:OTM 2006 Workshops, Montpellier, France, 2006 Sách, tạp chí
Tiêu đề: Improving the Dynamic ID-Based Remote Mutual Authentication Scheme
[10] M. K. Khan, S. K. Kim and K. Alghathbara, "Cryptanalysis and security enhancement of a ‘more efficient & secure dynamic ID-based remote user authentication scheme’," Computer Communications, vol. 34, no. 3, p. 305–309, 2011 Sách, tạp chí
Tiêu đề: Cryptanalysis and security enhancement of a ‘more efficient & secure dynamic ID-based remote user authentication scheme’
[11] S. K. Sood, A. K. Sarje and K. Singh, "A secure dynamic identity based authentication protocol for multi-server architecture," Journal of Network and Computer Applications, vol. 34, no. 2, p. 609–618, 2011 Sách, tạp chí
Tiêu đề: A secure dynamic identity based authentication protocol for multi-server architecture
[12] M. K. Khan, S. Kumari and M. K. Gupta, "More efficient key-hash based fingerprint remote authentication scheme using mobile device," Computing, vol Sách, tạp chí
Tiêu đề: More efficient key-hash based fingerprint remote authentication scheme using mobile device
[13] S. Kumari, M. K. Khan and X. Li, "An improved remote user authentication scheme with key agreement," Computers and Electrical Engineering, vol. 40, no. 6, pp. 1997-2012, 2014 Sách, tạp chí
Tiêu đề: An improved remote user authentication scheme with key agreement
[14] R. L. Rivest, A. Shamir and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Communications of the ACM, vol. 21, no. 2, pp. 120-126, 1978 Sách, tạp chí
Tiêu đề: A method for obtaining digital signatures and public-key cryptosystems
[15] T. Elgamal, "A public key cryptosystem and a signature scheme based on discrete logarithms," IEEE Transactions on Information Theory, vol. 31, no. 4, pp. 469-472, 1985 Sách, tạp chí
Tiêu đề: A public key cryptosystem and a signature scheme based on discrete logarithms
[16] V. S. Miller, "Use of Elliptic Curves in Cryptography," Advances in Cryptology - CRYPTO'85 Proceedings, vol. 218, pp. 417-426, 1986 Sách, tạp chí
Tiêu đề: Use of Elliptic Curves in Cryptography
[17] N. Koblitz, "Elliptic curve cryptosystems," Mathematics of Computation, vol. 48, no. 177, pp. 203-209, 1987 Sách, tạp chí
Tiêu đề: Elliptic curve cryptosystems
[19] X. Tian, D. S. Wong and R. W. Zhu, "Analysis and improvement of an authenticated key exchange protocol for sensor networks," IEEE Communications Letters, vol. 9, no. 11, pp. 970-972, 2005 Sách, tạp chí
Tiêu đề: Analysis and improvement of an authenticated key exchange protocol for sensor networks
[20] Y. J. Choie, E. Jeong and E. Lee, "Efficient identity-based authenticated key agreement protocol from pairings," Applied Mathematics and Computation, vol.162, no. 1, pp. 179-188, 2005 Sách, tạp chí
Tiêu đề: Efficient identity-based authenticated key agreement protocol from pairings
[21] S. T. Wu, J. H. Chiu and B. C. Chieu, "ID-based remote authentication with smart cards on open distributed system from elliptic curve cryptography," in IEEE International Conference on Electronic Information Technology, Lincoln, 2005 Sách, tạp chí
Tiêu đề: ID-based remote authentication with smart cards on open distributed system from elliptic curve cryptography

TỪ KHÓA LIÊN QUAN

w