Tài liệu tham khảo |
Loại |
Chi tiết |
[1] L. Lamport, "Password Authentication with Insecure Communication," Communications of the ACM, vol. 3468, p. 770–772, 1981 |
Sách, tạp chí |
Tiêu đề: |
Password Authentication with Insecure Communication |
|
[2] A. Shamir, "Identity-based cryptosystems and signature schemes," in Proceedings of CRYPTO'84 on Advances in Cryptology, Springer-Verlag, New York, USA, 1984 |
Sách, tạp chí |
Tiêu đề: |
Identity-based cryptosystems and signature schemes |
|
[3] M. S. Hwang, C. C. Lee and Y. L. Tang, "A simple remote user authentication scheme," Mathematical and Computer Modelling, vol. 36, no. 1-2, p. 103–107, 2002 |
Sách, tạp chí |
Tiêu đề: |
A simple remote user authentication scheme |
|
[4] C. C. Lee, M. S. Hwang and W. P. Yang, "A flexible remote user authentication scheme using smart cards," ACM SIGOPS Operating Systems Review, vol. 36, no. 3, pp. 46-52, 2002 |
Sách, tạp chí |
Tiêu đề: |
A flexible remote user authentication scheme using smart cards |
|
[5] L. H. Li, L. C. Lin and M. S. Hwang, "A remote password authentication scheme for multiserver architecture using neural networks," IEEE Transactions on Neural Networks, vol. 12, no. 6, pp. 1498-1504, 2001 |
Sách, tạp chí |
Tiêu đề: |
A remote password authentication scheme for multiserver architecture using neural networks |
|
[6] J. J. Shen, C. W. Lin and M. S. Hwang, "A Modified Remote User Authentication Scheme Using Smart Cards," IEEE Transactions on Consumer Electronics, vol. 49, no. 2, pp. 414-416, 2003 |
Sách, tạp chí |
Tiêu đề: |
A Modified Remote User Authentication Scheme Using Smart Cards |
|
[7] M. L. Das, A. Saxena and V. P. Gulati, "A dynamic ID-based remote user authentication scheme," IEEE Transactions on Consumer Electronics, vol. 50, no. 2, pp. 629-631, 2004 |
Sách, tạp chí |
Tiêu đề: |
A dynamic ID-based remote user authentication scheme |
|
[8] I. E. Liao, C. C. Lee and M. S. Hwang, "Security enhancement for a dynamic ID-based remote user authentication scheme," in International Conference on Next Generation Web Services Practices, Seoul, Korea, 2005 |
Sách, tạp chí |
Tiêu đề: |
Security enhancement for a dynamic ID-based remote user authentication scheme |
|
[9] E. J. Yoon and K. Y. Yoo, "Improving the Dynamic ID-Based Remote Mutual Authentication Scheme," in On the Move to Meaningful Internet Systems 2006:OTM 2006 Workshops, Montpellier, France, 2006 |
Sách, tạp chí |
Tiêu đề: |
Improving the Dynamic ID-Based Remote Mutual Authentication Scheme |
|
[10] M. K. Khan, S. K. Kim and K. Alghathbara, "Cryptanalysis and security enhancement of a ‘more efficient & secure dynamic ID-based remote user authentication scheme’," Computer Communications, vol. 34, no. 3, p. 305–309, 2011 |
Sách, tạp chí |
Tiêu đề: |
Cryptanalysis and security enhancement of a ‘more efficient & secure dynamic ID-based remote user authentication scheme’ |
|
[11] S. K. Sood, A. K. Sarje and K. Singh, "A secure dynamic identity based authentication protocol for multi-server architecture," Journal of Network and Computer Applications, vol. 34, no. 2, p. 609–618, 2011 |
Sách, tạp chí |
Tiêu đề: |
A secure dynamic identity based authentication protocol for multi-server architecture |
|
[12] M. K. Khan, S. Kumari and M. K. Gupta, "More efficient key-hash based fingerprint remote authentication scheme using mobile device," Computing, vol |
Sách, tạp chí |
Tiêu đề: |
More efficient key-hash based fingerprint remote authentication scheme using mobile device |
|
[13] S. Kumari, M. K. Khan and X. Li, "An improved remote user authentication scheme with key agreement," Computers and Electrical Engineering, vol. 40, no. 6, pp. 1997-2012, 2014 |
Sách, tạp chí |
Tiêu đề: |
An improved remote user authentication scheme with key agreement |
|
[14] R. L. Rivest, A. Shamir and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Communications of the ACM, vol. 21, no. 2, pp. 120-126, 1978 |
Sách, tạp chí |
Tiêu đề: |
A method for obtaining digital signatures and public-key cryptosystems |
|
[15] T. Elgamal, "A public key cryptosystem and a signature scheme based on discrete logarithms," IEEE Transactions on Information Theory, vol. 31, no. 4, pp. 469-472, 1985 |
Sách, tạp chí |
Tiêu đề: |
A public key cryptosystem and a signature scheme based on discrete logarithms |
|
[16] V. S. Miller, "Use of Elliptic Curves in Cryptography," Advances in Cryptology - CRYPTO'85 Proceedings, vol. 218, pp. 417-426, 1986 |
Sách, tạp chí |
Tiêu đề: |
Use of Elliptic Curves in Cryptography |
|
[17] N. Koblitz, "Elliptic curve cryptosystems," Mathematics of Computation, vol. 48, no. 177, pp. 203-209, 1987 |
Sách, tạp chí |
Tiêu đề: |
Elliptic curve cryptosystems |
|
[19] X. Tian, D. S. Wong and R. W. Zhu, "Analysis and improvement of an authenticated key exchange protocol for sensor networks," IEEE Communications Letters, vol. 9, no. 11, pp. 970-972, 2005 |
Sách, tạp chí |
Tiêu đề: |
Analysis and improvement of an authenticated key exchange protocol for sensor networks |
|
[20] Y. J. Choie, E. Jeong and E. Lee, "Efficient identity-based authenticated key agreement protocol from pairings," Applied Mathematics and Computation, vol.162, no. 1, pp. 179-188, 2005 |
Sách, tạp chí |
Tiêu đề: |
Efficient identity-based authenticated key agreement protocol from pairings |
|
[21] S. T. Wu, J. H. Chiu and B. C. Chieu, "ID-based remote authentication with smart cards on open distributed system from elliptic curve cryptography," in IEEE International Conference on Electronic Information Technology, Lincoln, 2005 |
Sách, tạp chí |
Tiêu đề: |
ID-based remote authentication with smart cards on open distributed system from elliptic curve cryptography |
|