A user authentication scheme not requiring secrecy in the computer
Communications of the ACM
Time Sharing Computer Systems
ACM SIGSAC Review
On some cryptographic solutions for access control in a tree hierarchy
ACM '87 Proceedings of the 1987 Fall Joint Computer Conference on Exploring technology: today and tomorrow
Human-computer cryptography: an attempt
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
Comments on the S/KEY user authentication scheme
ACM SIGOPS Operating Systems Review
Public-key cryptography and password protocols
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
Undeniable billing in mobile communication
MobiCom '98 Proceedings of the 4th annual ACM/IEEE international conference on Mobile computing and networking
On the efficient implementation of fair non-repudiation
ACM SIGCOMM Computer Communication Review
Communications of the ACM
Public-key cryptography and password protocols
ACM Transactions on Information and System Security (TISSEC)
Cryptographic solution to a problem of access control in a hierarchy
ACM Transactions on Computer Systems (TOCS)
The BiBa one-time signature and broadcast authentication protocol
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Stack and Queue Integrity on Hostile Platforms
IEEE Transactions on Software Engineering
SAWM: a tool for secure and authenticated web metering
SEKE '02 Proceedings of the 14th international conference on Software engineering and knowledge engineering
Efficient packet marking for large-scale IP traceback
Proceedings of the 9th ACM conference on Computer and communications security
Micropayments for Wireless Communications
ICISC '00 Proceedings of the Third International Conference on Information Security and Cryptology
Efficient Sealed-Bid Auction Using Hash Chain
ICISC '00 Proceedings of the Third International Conference on Information Security and Cryptology
Protecting General Flexible Itineraries of Mobile Agents
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
Design of an Authentication Protocol for Gsm Javacards
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
SAC '00 Proceedings of the 7th Annual International Workshop on Selected Areas in Cryptography
Key Revocation with Interval Cover Families
SAC '01 Revised Papers from the 8th Annual International Workshop on Selected Areas in Cryptography
Formal Verification of the Horn-Preneel Micropayment Protocol
VMCAI 2003 Proceedings of the 4th International Conference on Verification, Model Checking, and Abstract Interpretation
An Identity-Based Signature Scheme with Bounded Life-Span
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
Secure Human Identification Protocols
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Experimenting with Electronic Commerce on the PalmPilot
FC '99 Proceedings of the Third International Conference on Financial Cryptography
Secret Key Authentication with Software-Only Verification
FC '00 Proceedings of the 4th International Conference on Financial Cryptography
A Flexible User Authentication Scheme for Multi-server Internet Services
ICN '01 Proceedings of the First International Conference on Networking-Part 1
Spending Programs: A Tool for Flexible Micropayments
ISW '99 Proceedings of the Second International Workshop on Information Security
Weighted One-Way Hash Chain and Its Applications
ISW '00 Proceedings of the Third International Workshop on Information Security
A Secure Pay-per View Scheme for Web-Based Video Service
PKC '99 Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography
One-Way Cross-Trees and Their Applications
PKC '02 Proceedings of the 5th International Workshop on Practice and Theory in Public Key Cryptosystems: Public Key Cryptography
Securing on-line credit card payments without disclosing privacy information
Computer Standards & Interfaces
A Formal Framework and Evaluation Method for Network Denial of Service
CSFW '99 Proceedings of the 12th IEEE workshop on Computer Security Foundations
Reducing The Cost Of Security In Link-State Routing
SNDSS '97 Proceedings of the 1997 Symposium on Network and Distributed System Security
ACM SIGOPS Operating Systems Review
A hybrid authentication protocol for large mobile network
Journal of Systems and Software
On the security of wireless network access with enhancements
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
LEAP: efficient security mechanisms for large-scale distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Poster abstract: LEAP—efficient security mechanisms for large-scale distributed sensor networks
Proceedings of the 1st international conference on Embedded networked sensor systems
Weaknesses of Lee-Li-Hwang's hash-based password authentication scheme
ACM SIGOPS Operating Systems Review
Two simple attacks on Lin-Shen-Hwang's strong-password authentication protocol
ACM SIGOPS Operating Systems Review
A hash-based strong-password authentication scheme without using smart cards
ACM SIGOPS Operating Systems Review
Security support for in-network processing in Wireless Sensor Networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Securing mobile ad hoc networks
The handbook of ad hoc wireless networks
SeRLoc: secure range-independent localization for wireless sensor networks
Proceedings of the 3rd ACM workshop on Wireless security
Multilevel μTESLA: Broadcast authentication for distributed sensor networks
ACM Transactions on Embedded Computing Systems (TECS)
Securing quality-of-service route discovery in on-demand routing for ad hoc networks
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
Authentication and Billing Protocols for the Integration of WLAN and 3G Networks
Wireless Personal Communications: An International Journal
A simple password authentication using a polynomial
ACM SIGOPS Operating Systems Review
A secure and efficient strong-password authentication protocol
ACM SIGOPS Operating Systems Review
ACM SIGOPS Operating Systems Review
On improvements to password security
ACM SIGOPS Operating Systems Review
Security Parallels between People and Pervasive Devices
PERCOMW '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops
Two attacks on a user friendly remote authentication scheme with smart cards
ACM SIGOPS Operating Systems Review
Foundations of Security for Hash Chains in Ad Hoc Networks
Cluster Computing
Easily remembered passphrases: a better approach
ACM SIGSAC Review - Resources: part II
Protecting applications with transient authentication
Proceedings of the 1st international conference on Mobile systems, applications and services
SeRLoc: Robust localization for wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
Plutus: Scalable Secure File Sharing on Untrusted Storage
FAST '03 Proceedings of the 2nd USENIX Conference on File and Storage Technologies
Verifiable audit trails for a versioning file system
Proceedings of the 2005 ACM workshop on Storage security and survivability
Toward securing untrusted storage without public-key operations
Proceedings of the 2005 ACM workshop on Storage security and survivability
e-coupons: An Efficient, Secure and Delegable Micro-Payment System
Information Systems Frontiers
Addressing the shortcomings of one-way chains
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
An Efficient Key Revocation Protocol for Wireless Sensor Networks
WOWMOM '06 Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks
ROPE: robust position estimation in wireless sensor networks
IPSN '05 Proceedings of the 4th international symposium on Information processing in sensor networks
A password authentication scheme over insecure networks
Journal of Computer and System Sciences
Scalable and secure group rekeying in wireless sensor networks
PDCN'06 Proceedings of the 24th IASTED international conference on Parallel and distributed computing and networks
Optimizing BGP security by exploiting path stability
Proceedings of the 13th ACM conference on Computer and communications security
Equipping smart devices with public key signatures
ACM Transactions on Internet Technology (TOIT)
LEAP+: Efficient security mechanisms for large-scale distributed sensor networks
ACM Transactions on Sensor Networks (TOSN)
Improving the security of 'a flexible biometrics remote user authentication scheme'
Computer Standards & Interfaces
A Secure Strong-Password Authentication Protocol
Fundamenta Informaticae
A k-anonymous communication protocol for overlay networks
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Security enhancement of an IC-card-based remote login mechanism
Computer Networks: The International Journal of Computer and Telecommunications Networking
Efficient pebbling for list traversal synopses with application to program rollback
Theoretical Computer Science
Wireless wakeups revisited: energy management for voip over wi-fi smartphones
Proceedings of the 5th international conference on Mobile systems, applications and services
Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards
Computer Standards & Interfaces
Dos and don'ts of client authentication on the web
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Interleaved hop-by-hop authentication against false data injection attacks in sensor networks
ACM Transactions on Sensor Networks (TOSN)
Network randomization protocol: a proactive pseudo-random generator
SSYM'95 Proceedings of the 5th conference on USENIX UNIX Security Symposium - Volume 5
One time passwords in everything (OPIE): experiences with building and using stronger authentication
SSYM'95 Proceedings of the 5th conference on USENIX UNIX Security Symposium - Volume 5
Dos and don'ts of client authentication on the web
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
A privacy enhancing mechanism based on pseudonyms for identity protection in location-based services
ACSW '07 Proceedings of the fifth Australasian symposium on ACSW frontiers - Volume 68
SPP: An anti-phishing single password protocol
Computer Networks: The International Journal of Computer and Telecommunications Networking
TwoKind authentication: usable authenticators for untrustworthy environments
Proceedings of the 3rd symposium on Usable privacy and security
Pair-wise path key establishment in wireless sensor networks
Computer Communications
Flight data recorder: monitoring persistent-state interactions to improve systems management
OSDI '06 Proceedings of the 7th symposium on Operating systems design and implementation
The thinnest of clients: controlling it all via cellphone
ACM SIGMOBILE Mobile Computing and Communications Review
A new method for using hash functions to solve remote user authentication
Computers and Electrical Engineering
Information Assurance: Dependability and Security in Networked Systems
Information Assurance: Dependability and Security in Networked Systems
Defending against false-endorsement-based dos attacks in wireless sensor networks
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Secure multi-hop network programming with multiple one-way key chains
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Hash chains with diminishing ranges for sensors
International Journal of High Performance Computing and Networking
International Journal of Security and Networks
Efficient and secure password authentication schemes for low-power devices
International Journal of Sensor Networks
Slander-resistant forwarding isolation in ad hoc networks
International Journal of Mobile Network Design and Innovation
Packet forwarding with source verification
Computer Networks: The International Journal of Computer and Telecommunications Networking
Computer Networks: The International Journal of Computer and Telecommunications Networking
A secure and traceable E-DRM system based on mobile device
Expert Systems with Applications: An International Journal
A pervasive identification service for physical access control
Proceedings of the 5th international conference on Pervasive services
Simulation for intrusion-resilient, DDoS-resistant authentication system (IDAS)
Proceedings of the 2008 Spring simulation multiconference
Enhancing Security by Embedding Biometric Data in IP Header
SOFSEM '07 Proceedings of the 33rd conference on Current Trends in Theory and Practice of Computer Science
BAP: Broadcast Authentication Using Cryptographic Puzzles
ACNS '07 Proceedings of the 5th international conference on Applied Cryptography and Network Security
EuroPKI '08 Proceedings of the 5th European PKI workshop on Public Key Infrastructure: Theory and Practice
One-Time Password Access to Any Server without Changing the Server
ISC '08 Proceedings of the 11th international conference on Information Security
Can "Something You Know" Be Saved?
ISC '08 Proceedings of the 11th international conference on Information Security
Two-factor mutual authentication based on smart cards and passwords
Journal of Computer and System Sciences
An improved bilinear pairing based remote user authentication scheme
Computer Standards & Interfaces
TwoKind authentication: protecting private information in untrustworthy environments
Proceedings of the 7th ACM workshop on Privacy in the electronic society
Improving the scalability of platform attestation
Proceedings of the 3rd ACM workshop on Scalable trusted computing
Beacon certificate push revocation
Proceedings of the 2nd ACM workshop on Computer security architectures
LIDeA: a distributed lightweight intrusion detection architecture for sensor networks
Proceedings of the 4th international conference on Security and privacy in communication netowrks
PEAC: a probabilistic, efficient, and resilient authentication protocol for broadcast communications
Proceedings of the 4th international conference on Security and privacy in communication netowrks
Formal apparatus for measurement of lightweight protocols
Computer Standards & Interfaces
CROO: A Universal Infrastructure and Protocol to Detect Identity Fraud
ESORICS '08 Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security
A trust-based secure service discovery (TSSD) model for pervasive computing
Computer Communications
Energy-efficient relaxed rekeying policies for distributed key management in sensor networks
International Journal of Ad Hoc and Ubiquitous Computing
Two efficient two-factor authenticated key exchange protocols in public wireless LANs
Computers and Electrical Engineering
Prevention of Black-Hole Attack using One-Way Hash Chain Scheme in Ad-Hoc Networks
Information Networking. Towards Ubiquitous Networking and Services
NetAuth: supporting user-based network services
SS'08 Proceedings of the 17th conference on Security symposium
A middleware for location-based mobile applications with privacy protection
Proceedings of the 10th International Conference on Information Integration and Web-based Applications & Services
Cooperative Intrusion Detection in Wireless Sensor Networks
EWSN '09 Proceedings of the 6th European Conference on Wireless Sensor Networks
A more efficient and secure dynamic ID-based remote user authentication scheme
Computer Communications
Mobile services access and payment through reusable tickets
Computer Communications
A confidential and DoS-resistant multi-hop code dissemination protocol for wireless sensor networks
Proceedings of the second ACM conference on Wireless network security
More secure remote user authentication scheme
Computer Communications
Computer Standards & Interfaces
An improved smart card based password authentication scheme with provable security
Computer Standards & Interfaces
Hash-Based Key Management Schemes for MPEG4-FGS
ISPEC '09 Proceedings of the 5th International Conference on Information Security Practice and Experience
ALPHA: an adaptive and lightweight protocol for hop-by-hop authentication
CoNEXT '08 Proceedings of the 2008 ACM CoNEXT Conference
A secure credit-based cooperation stimulating mechanism for MANETs using hash chains
Future Generation Computer Systems
Distributed architectures for electronic cash schemes: a survey
International Journal of Parallel, Emergent and Distributed Systems
Efficient Anonymous Electronic Metering Scheme
Proceedings of the 2006 conference on Advances in Intelligent IT: Active Media Technology 2006
An efficient One-Time Password authentication scheme using a smart card
International Journal of Security and Networks
Overview of satellite communication networks security: introduction of EAP
International Journal of Security and Networks
HOTP-Based User Authentication Scheme in Home Networks
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
A keyless facility access control system with wireless enabled personal devices
The Fourth International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness & Workshops
An efficient k-anonymous localization technique for assistive environments
Proceedings of the 2nd International Conference on PErvasive Technologies Related to Assistive Environments
ICCSA '09 Proceedings of the International Conference on Computational Science and Its Applications: Part II
Smart Card Based AKE Protocol Using Biometric Information in Pervasive Computing Environments
ICCSA '09 Proceedings of the International Conference on Computational Science and Its Applications: Part II
Privacy-Aware Location Database Service for Granular Queries
WISTP '09 Proceedings of the 3rd IFIP WG 11.2 International Workshop on Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks
AWGN based seed for random noise generator in ParseKey+
Proceedings of the 2nd international conference on Security of information and networks
Security constructs for regulatory-compliant storage
Communications of the ACM - Amir Pnueli: Ahead of His Time
An efficient biometrics-based remote user authentication scheme using smart cards
Journal of Network and Computer Applications
A nonce-based mutual authentication system with smart card
WSEAS Transactions on Computers
Proceedings of the 5th ACM symposium on QoS and security for wireless and mobile networks
SSL/TLS session-aware user authentication - Or how to effectively thwart the man-in-the-middle
Computer Communications
Efficient remote user authentication scheme using smart card
Computer Networks: The International Journal of Computer and Telecommunications Networking
TIMAR: an efficient key management scheme for ubiquitous health care environments
Proceedings of the 5th International ICST Mobile Multimedia Communications Conference
Enhanced delegation-based authentication protocol for PCSs
IEEE Transactions on Wireless Communications
DoS-resistant ID-based password authentication scheme using smart cards
Journal of Systems and Software
Key management for lightweight ad-hoc routing authentication
ISWPC'09 Proceedings of the 4th international conference on Wireless pervasive computing
A dual re-authentication scheme for fast handoff in IEEE 802.11 wireless mesh networks
WCNC'09 Proceedings of the 2009 IEEE conference on Wireless Communications & Networking Conference
Anonymous Transactions in Computer Networks
SSS '09 Proceedings of the 11th International Symposium on Stabilization, Safety, and Security of Distributed Systems
Cryptanalysis and improvement on remote user mutual authentication scheme with smart cards
ICACT'09 Proceedings of the 11th international conference on Advanced Communication Technology - Volume 2
ICACT'09 Proceedings of the 11th international conference on Advanced Communication Technology - Volume 2
Cryptanalysis of a remote user authentication scheme using smart cards
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
An improvement of Hsiang-Shih's authentication scheme using smart cards
Proceedings of the International Conference and Workshop on Emerging Trends in Technology
New Remote Mutual Authentication Scheme using Smart Cards
Transactions on Data Privacy
Vehicular telematics over heterogeneous wireless networks: A survey
Computer Communications
An energy efficient security protocol for IEEE 802.11 WLANs
Pervasive and Mobile Computing
A novel key agreement scheme in a multiple server environment
WISA'06 Proceedings of the 7th international conference on Information security applications: PartI
NETWORKING'07 Proceedings of the 6th international IFIP-TC6 conference on Ad Hoc and sensor networks, wireless networks, next generation internet
R-LEAP+: randomizing LEAP+ key distribution to resist replay and jamming attacks
Proceedings of the 2010 ACM Symposium on Applied Computing
Securing a path-coupled NAT/firewall signaling protocol
IPOM'07 Proceedings of the 7th IEEE international conference on IP operations and management
Cryptanalysis and the improvement of Kim et al.'s password authentication schemes
ICISS'07 Proceedings of the 3rd international conference on Information systems security
A simple and efficient key exchange scheme against the smart card loss problem
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
Detecting node compromise in hybrid wireless sensor networks using attestation techniques
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
Vulnerabilities in a remote agent authentication scheme using smart cards
KES-AMSTA'08 Proceedings of the 2nd KES International conference on Agent and multi-agent systems: technologies and applications
A graphical PIN authentication mechanism with applications to smart cards and low-cost devices
WISTP'08 Proceedings of the 2nd IFIP WG 11.2 international conference on Information security theory and practices: smart devices, convergence and next generation networks
Authentication and key agreement method for home networks using a smart card
ICCSA'07 Proceedings of the 2007 international conference on Computational science and its applications - Volume Part I
MAAC: message authentication acceleration protocol for vehicular ad hoc networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
On the security of metering scheme
Computers & Mathematics with Applications
A digital signature with multiple subliminal channels and its applications
Computers & Mathematics with Applications
Advanced smart card based password authentication protocol
Computer Standards & Interfaces
End-host authentication and authorization for middleboxes based on a cryptographic namespace
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Authentication in 802.11 LANs using a covert side channel
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Universal authentication protocols for anonymous wireless communications
IEEE Transactions on Wireless Communications
Information-theoretically secret key generation for fading wireless channels
IEEE Transactions on Information Forensics and Security
Group device pairing based secure sensor association and key management for body area networks
INFOCOM'10 Proceedings of the 29th conference on Information communications
Hierarchies of keys in secure multicast communications
Journal of Computer Security
USENIXATC'10 Proceedings of the 2010 USENIX conference on USENIX annual technical conference
Two robust remote user authentication protocols using smart cards
Journal of Systems and Software
Computationally efficient searchable symmetric encryption
SDM'10 Proceedings of the 7th VLDB conference on Secure data management
Journal of Network and Computer Applications
A message recognition protocol based on standard assumptions
ACNS'10 Proceedings of the 8th international conference on Applied cryptography and network security
Secure neighborhood routing protocol
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
sSCADA: securing SCADA infrastructure communications
International Journal of Communication Networks and Distributed Systems
A multi-user steganographic file system on untrusted shared storage
Proceedings of the 26th Annual Computer Security Applications Conference
Security enhancement on an improvement on two remote user authentication schemes using smart cards
Future Generation Computer Systems
Robust authentication and key agreement scheme preserving the privacy of secret key
Computer Communications
Robust one-time password authentication scheme using smart card for home network environment
Computer Communications
A Fair and Secure Cluster Formation Process for Ad Hoc Networks
Wireless Personal Communications: An International Journal
Weaknesses of a dynamic ID-based remote user authentication scheme
International Journal of Electronic Security and Digital Forensics
Password based remote authentication scheme using ECC for smart card
Proceedings of the 2011 International Conference on Communication, Computing & Security
Plutus: scalable secure file sharing on untrusted storage
FAST'03 Proceedings of the 2nd USENIX conference on File and storage technologies
A smart card based authentication protocol for strong passwords
ACOS'06 Proceedings of the 5th WSEAS international conference on Applied computer science
A novel and low-computation e-cash transfer system against blackmail for mobile communications
International Journal of Mobile Communications
A co-commitment based secure data collection scheme for tiered wireless sensor networks
Journal of Systems Architecture: the EUROMICRO Journal
Mobile Networks and Applications
Secured routing over MANET with power management
ACAI '11 Proceedings of the International Conference on Advances in Computing and Artificial Intelligence
Hash chain links resynchronization methods in video streaming security: performance comparison
Journal of Mobile Multimedia
Security analysis and complexity comparison of some recent lightweight RFID protocols
CISIS'11 Proceedings of the 4th international conference on Computational intelligence in security for information systems
Anonygator: privacy and integrity preserving data aggregation
Proceedings of the ACM/IFIP/USENIX 11th International Conference on Middleware
AUTHHOTP- HOTP based authentication scheme over home network environment
ICCSA'11 Proceedings of the 2011 international conference on Computational science and its applications - Volume Part III
Secure hash-based password authentication protocol using smartcards
ICCSA'11 Proceedings of the 2011 international conference on Computational science and Its applications - Volume Part V
A robust remote user authentication scheme against smart card security breach
DBSec'11 Proceedings of the 25th annual IFIP WG 11.3 conference on Data and applications security and privacy
BBox: a distributed secure log architecture
EuroPKI'10 Proceedings of the 7th European conference on Public key infrastructures, services and applications
Implementing disposable credit card numbers by mobile phones
Electronic Commerce Research
A lightweight mutual authentication mechanism for network mobility in IEEE 802.16e wireless networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
LARK: A Lightweight Authenticated ReKeying Scheme for Clustered Wireless Sensor Networks
ACM Transactions on Embedded Computing Systems (TECS)
Timestamp based authentication protocol for smart card using ECC
WISM'11 Proceedings of the 2011 international conference on Web information systems and mining - Volume Part I
Tunneled TLS for multi-factor authentication
Proceedings of the 11th annual ACM workshop on Digital rights management
Improvement of Li-Hwang's biometrics-based remote user authentication scheme using smart cards
WSEAS TRANSACTIONS on COMMUNICATIONS
An improved timestamp-based remote user authentication scheme
Computers and Electrical Engineering
Security for multipath TCP: a constructive approach
International Journal of Internet Protocol Technology
Self-Updating hash chains and their implementations
WISE'06 Proceedings of the 7th international conference on Web Information Systems
Further improvement of manik et al.'s remote user authentication scheme using smart cards
ISPA'06 Proceedings of the 2006 international conference on Frontiers of High Performance Computing and Networking
IPBio: embedding biometric data in IP header for per-packet authentication
ISPA'06 Proceedings of the 2006 international conference on Frontiers of High Performance Computing and Networking
Efficient password-based authentication and key exchange scheme preserving user privacy
WASA'06 Proceedings of the First international conference on Wireless Algorithms, Systems, and Applications
Formal analysis and systematic construction of two-factor authentication scheme (short paper)
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
Cryptanalysis of timestamp-based password authentication schemes using smart cards
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
Authentication mechanism using one-time password for 802.11 wireless LAN
CSR'06 Proceedings of the First international computer science conference on Theory and Applications
An efficient authentication and simplified certificate status management for personal area networks
APNOMS'06 Proceedings of the 9th Asia-Pacific international conference on Network Operations and Management: management of Convergence Networks and Services
A secure user authentication protocol based on one-time-password for home network
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and its Applications - Volume Part I
A novel remote user authentication scheme through dynamic login identity
IWDC'04 Proceedings of the 6th international conference on Distributed Computing
An efficient solution to the ARP cache poisoning problem
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
Immediate data authentication for multicast in resource constrained network
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
An improved lu-cao's remote user authentication scheme using smart card
EuroPKI 2006 Proceedings of the Third European conference on Public Key Infrastructure: theory and Practice
Enhanced forward-secure user authentication scheme with smart cards
EuroPKI 2006 Proceedings of the Third European conference on Public Key Infrastructure: theory and Practice
Authenticating hard decision sensing reports in cognitive radio networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Remote authentication with forward security
ATC'06 Proceedings of the Third international conference on Autonomic and Trusted Computing
Efficient and secure password authentication schemes for low-power devices
MSN'05 Proceedings of the First international conference on Mobile Ad-hoc and Sensor Networks
New authentication scheme based on a one-way hash function and diffie-hellman key exchange
CANS'05 Proceedings of the 4th international conference on Cryptology and Network Security
An improvement on strong-password authentication protocols
ICESS'05 Proceedings of the Second international conference on Embedded Software and Systems
Secure fingerprint-based remote user authentication scheme using smartcards
WINE'05 Proceedings of the First international conference on Internet and Network Economics
An improved fingerprint-based remote user authentication scheme using smart cards
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part II
Resource requirement analysis for a predictive-hashing based multicast authentication protocol
EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
Journal of Network and Computer Applications
Investigating authentication mechanisms for wireless mobile network
UIC'06 Proceedings of the Third international conference on Ubiquitous Intelligence and Computing
Secure dynamic identity-based remote user authentication scheme
ICDCIT'10 Proceedings of the 6th international conference on Distributed Computing and Internet Technology
An efficient and practical fingerprint-based remote user authentication scheme with smart cards
ISPEC'06 Proceedings of the Second international conference on Information Security Practice and Experience
Two efficient and secure authentication schemes using smart cards
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part V
Security enhancement for password authentication schemes with smart cards
TrustBus'05 Proceedings of the Second international conference on Trust, Privacy, and Security in Digital Business
Efficient user authentication and key agreement in ubiquitous computing
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part IV
One-Time verifier-based encrypted key exchange
PKC'05 Proceedings of the 8th international conference on Theory and Practice in Public Key Cryptography
Efficient constructions for one-way hash chains
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
Improving the efficiency of anonymous routing for MANETs
Computer Communications
A new efficient fingerprint-based remote user authentication scheme for multimedia systems
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part III
UGSP: secure key establishment protocol for ad-hoc networks
ICDCIT'04 Proceedings of the First international conference on Distributed Computing and Internet Technology
Authentication based on singular cellular automata
ACRI'06 Proceedings of the 7th international conference on Cellular Automata for Research and Industry
Improving the dynamic ID-Based remote mutual authentication scheme
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part I
Security enhancement of a remote user authentication scheme using smart cards
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part I
An improved dynamic ID-based remote user authentication with key agreement scheme
Computers and Electrical Engineering
Non-group cellular automata based one time password authentication scheme in wireless networks
MADNES'05 Proceedings of the First international conference on Secure Mobile Ad-hoc Networks and Sensors
BGN authentication and its extension to convey message commitments
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part III
Efficient remote user authentication and key establishment for multi-server environment
ICDCIT'06 Proceedings of the Third international conference on Distributed Computing and Internet Technology
Re-visited: denial of service resilient access control for wireless sensor networks
ESAS'06 Proceedings of the Third European conference on Security and Privacy in Ad-Hoc and Sensor Networks
An energy-efficient symmetric cryptography based authentication scheme for wireless sensor networks
WISTP'10 Proceedings of the 4th IFIP WG 11.2 international conference on Information Security Theory and Practices: security and Privacy of Pervasive Systems and Smart Devices
A key derivation scheme for hierarchical access control to JPEG 2000 coded images
PSIVT'11 Proceedings of the 5th Pacific Rim conference on Advances in Image and Video Technology - Volume Part II
On broadcast encryption with random key pre-distribution schemes
ICISS'05 Proceedings of the First international conference on Information Systems Security
Improvements to mitchell's remote user authentication protocol
ICISC'05 Proceedings of the 8th international conference on Information Security and Cryptology
A Password-Based User Authentication Scheme for the Integrated EPR Information System
Journal of Medical Systems
Preventing the cluster formation attack against the hierarchical OLSR protocol
FPS'11 Proceedings of the 4th Canada-France MITACS conference on Foundations and Practice of Security
Review: Dynamic ID-based remote user password authentication schemes using smart cards: A review
Journal of Network and Computer Applications
Mobile one-time passwords: two-factor authentication using mobile phones
Security and Communication Networks
Anonymous transactions in computer networks
ACM Transactions on Autonomous and Adaptive Systems (TAAS)
Research: Remote login authentication scheme based on a geometric approach
Computer Communications
Research: Remote scheme for password authentication based on theory of quadratic residues
Computer Communications
Enforcing dynamic spectrum access with spectrum permits
Proceedings of the thirteenth ACM international symposium on Mobile Ad Hoc Networking and Computing
Efficient password authenticated key agreement using bilinear pairings
Mathematical and Computer Modelling: An International Journal
An efficient and complete remote user authentication scheme using smart cards
Mathematical and Computer Modelling: An International Journal
An efficient multi-receipt mechanism for uncoercible anonymous electronic voting
Mathematical and Computer Modelling: An International Journal
A simple remote user authentication scheme
Mathematical and Computer Modelling: An International Journal
An 802.11 MAC layer covert channel
Wireless Communications & Mobile Computing
Securing digital signatures for non-repudiation
Computer Communications
Research note: Cryptanalysis of a remote login authentication scheme
Computer Communications
The design and the security concept of a collaborative whiteboard
Computer Communications
Robust smart-cards-based user authentication scheme with user anonymity
Security and Communication Networks
Security-Effective fast authentication mechanism for network mobility in proxy mobile IPv6 networks
ICCSA'12 Proceedings of the 12th international conference on Computational Science and Its Applications - Volume Part IV
A robust e-commerce service: Light-weight secure mail-order mechanism
Electronic Commerce Research and Applications
Capillary machine-to-machine communications: the road ahead
ADHOC-NOW'12 Proceedings of the 11th international conference on Ad-hoc, Mobile, and Wireless Networks
Security vulnerabilities of user authentication scheme using smart card
DBSec'12 Proceedings of the 26th Annual IFIP WG 11.3 conference on Data and Applications Security and Privacy
Hash chains at the basis of a secure reactive routing protocol
INTRUST'11 Proceedings of the Third international conference on Trusted Systems
ICCSA'12 Proceedings of the 12th international conference on Computational Science and Its Applications - Volume Part III
A Secure Strong-Password Authentication Protocol
Fundamenta Informaticae
Secure and privacy-preserving, timed vehicular communications
International Journal of Ad Hoc and Ubiquitous Computing
An improved anonymous authentication and key exchange scheme
Proceedings of the CUBE International Information Technology Conference
An Efficient Authentication Scheme for Telecare Medicine Information Systems
Journal of Medical Systems
An Improved Authentication Scheme for Telecare Medicine Information Systems
Journal of Medical Systems
Journal of Medical Systems
KALwEN: a new practical and interoperable key management scheme for body sensor networks
Security and Communication Networks
On the analysis and design of a family tree of smart card based user authentication schemes
UIC'07 Proceedings of the 4th international conference on Ubiquitous Intelligence and Computing
Security and Communication Networks
Reducing the computational cost of certification path validation in mobile payment
EuroPKI'07 Proceedings of the 4th European conference on Public Key Infrastructure: theory and practice
Novel remote user authentication scheme using bilinear pairings
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
A secret-key exponential key agreement protocol with smart cards
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
An enhanced biometrics-based remote user authentication scheme using mobile devices
International Journal of Computational Intelligence Studies
Journal of Computer and System Sciences
Integrated OTP-based user authentication and access control scheme in home networks
APNOMS'07 Proceedings of the 10th Asia-Pacific conference on Network Operations and Management Symposium: managing next generation networks and services
A password authentication scheme against smart card security breach
ICICA'12 Proceedings of the Third international conference on Information Computing and Applications
On the security of an improved password authentication scheme based on ECC
ICICA'12 Proceedings of the Third international conference on Information Computing and Applications
Security analysis of a secure and practical dynamic identity-based remote user authentication scheme
WISM'12 Proceedings of the 2012 international conference on Web Information Systems and Mining
Encrypted remote user authentication scheme by using smart card
WISM'12 Proceedings of the 2012 international conference on Web Information Systems and Mining
A Smart Card Based Efficient and Secured Multi-Server Authentication Scheme
Wireless Personal Communications: An International Journal
Modified efficient and secure dynamic ID-Based user authentication scheme
ICT-EurAsia'13 Proceedings of the 2013 international conference on Information and Communication Technology
Security Flaws in a Smart Card Based Authentication Scheme for Multi-server Environment
Wireless Personal Communications: An International Journal
An enhanced anonymous authentication and key exchange scheme using smartcard
ICISC'12 Proceedings of the 15th international conference on Information Security and Cryptology
Verifiable auctions for online ad exchanges
Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM
Secure scheme against data dropping
Proceedings of the 16th Communications & Networking Symposium
Hash chains to secure proactive protocols
Proceedings of the 16th Communications & Networking Symposium
Proceedings of the 6th International Conference on Rehabilitation Engineering & Assistive Technology
Efficient targeted key subset retrieval in fractal hash sequences
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Authenticated key agreement in wireless networks with automated key management
Proceedings of the 6th International Conference on Security of Information and Networks
An enhanced remote user authentication scheme using smart card
Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication
A Biometric Authentication Scheme for Telecare Medicine Information Systems with Nonce
Journal of Medical Systems
A Secure Biometrics-based Authentication Scheme for Telecare Medicine Information Systems
Journal of Medical Systems
Expert Systems with Applications: An International Journal
The Journal of Supercomputing
Pervasive and Mobile Computing
PayStar: A denomination flexible micropayment scheme
Information Sciences: an International Journal
International Journal of Information and Communication Technology
On the security of an authentication scheme for multi-server architecture
International Journal of Electronic Security and Digital Forensics
Robust Smart Card Authentication Scheme for Multi-server Architecture
Wireless Personal Communications: An International Journal
BECSI: Bandwidth efficient certificate status information distribution mechanism for VANETs
Mobile Information Systems
Enhanced Dynamic Authentication Scheme (EDAS)
Information Systems Frontiers
Hi-index | 48.24 |
A method of user password authentication is described which is secure even if an intruder can read the system's data, and can tamper with or eavesdrop on the communication between the user and the system. The method assumes a secure one-way encryption function and can be implemented with a microcomputer in the user's terminal.