題名 | 作者 | 日期 |
A Key Authentication Scheme for Non-repudiation | Hwang, Min-Shiang; Li, Li-Mua; Lee, Cheng-Chi | 2006-11-13T02:58:57Z |
A modified user-friendly remote authentication scheme with smart cards | Chen, Yi-Hwa; Jan, Jinn-Ke | 2006-10-16T05:33:59Z |
A Privacy and Delegation Enhanced User Authentication Protocol for Portable Communication Systems | Wang, Ren-Chiun Jr; Juang, Wen-Shenq Jr; Lei, Chin-Laung Jr | 2011-05-23T20:40:41Z |
A Wireless-based Authentication and Anonymous Channels for GSM System | Hwang, Ren-Junn; Li, Jing-Feng; Hsiao, Yu-Kai | 2008-11-07T08:57:17Z |
Comments on A Remote User Authentication Scheme Using Smart Cards with Forward Secrecy | Chen, Yi-Hwa; Jan, Jinn-Ke | 2006-10-16T05:38:28Z |
Cryptanalysis and improvement of an improved Identity-Based key exchange protocol | Tseng, Yu-Mim; Jan, Jinn-Ke; Wang, Ching-Hung | 2006-10-16T04:00:56Z |
Cryptanalysis of an Enhanced Authentication Key Exchange Protocol | Yang, Fuw-Yi; Jan, Jinn-Ke | 2006-10-16T05:38:08Z |
Cryptanalysis of Authenticated Key Agreement Protocols | Yeh, Her-Tyan; Sun, Hung-Min; Hwang, Tzonelih | 2006-10-17T03:55:56Z |
Cryptanalysis of Hsiang-Shih’s Secure Dynamic ID Based Remote User Authentication Scheme | Kuo, Wen-Chung; Chu, Yu-Shuan; Chen, Bae-Ling | 2011-03-31T21:48:12Z |
Enhanced Authentication Key Agreement Protocol | Hwang, Ren-Junn; Shiau, Sheng-Hua; Lin, Kai-Jun | 2006-10-16T03:23:02Z |
Mutually Identity Authentications in GSM-based Anonymous Communications | Wang, Shiuh-Jeng; Tsai, Yuh-Ren; Chou, Lei-Sheng; Lin, I-Shan | 2008-11-11T07:38:18Z |
New Efficient Password Authenticated Key Exchange Protocol for Imbalanced Wireless Networks | Hsu, Chien-Lung; Lin, Wen-Te; Chou, Yen-Chun | 2008-11-11T07:29:34Z |
Security Analysis of a Tripartite Authenticated Key Agreement Protocol Based on Weil Pairing | Horng, Gwoboa; Liu, Chao-Liang; Liu, Hsin-Yu | 2006-10-16T05:38:51Z |
Security Enhancement for Robust Password Authenticated Key Agreement Using Smart Cards | Juang, Wen-Shenq; Chen, Sian-Teng | 2007-01-29T08:34:09Z |
The Implementation of Data Security Base on Wireless Networks | Yeh, Sheng-Cheng | 2006-10-17T07:01:07Z |
Weaknesses of a Flexible Remote User Authentication Scheme Using Smart Cards | Ku, Wei-Chi; Chen, Wei-Chi; Chuang, Hsiu-Mei | 2006-10-13T01:10:34Z |