Selective timestamp-nonce based authentication scheme

被引:0
|
作者
机构
[1] Wu, Wei-Chen
[2] Liaw, Horng-Twu
[3] Chen, Yi-Ming
来源
Wu, W.-C. (wwu@hsc.edu.tw) | 1600年 / Science and Engineering Research Support Society, 20 Virginia Court, Sandy Bay, Tasmania, Prof B.H.Kang's Office,, Australia卷 / 07期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [1] Selective Timestamp-Nonce Based Authentication Scheme
    Wu, Wei-Chen
    Liaw, Horng-Twu
    Chen, Yi-Ming
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (01): : 95 - 104
  • [2] Timestamp-based Password Authentication Scheme
    Ismail, E. S.
    Syed-Musa, S. M. S.
    PROCEEDING OF THE 25TH NATIONAL SYMPOSIUM ON MATHEMATICAL SCIENCES (SKSM25): MATHEMATICAL SCIENCES AS THE CORE OF INTELLECTUAL EXCELLENCE, 2018, 1974
  • [3] Cryptanalysis of a timestamp-based password authentication scheme
    Chan, Chi-Kwong
    Cheng, L.M.
    Computers and Security, 2001, 21 (01): : 74 - 76
  • [4] Cryptanalysis of a timestamp-based password authentication scheme
    Chan, CK
    Cheng, LM
    COMPUTERS & SECURITY, 2002, 21 (01) : 74 - 76
  • [5] Enhancement of a timestamp-based password authentication scheme
    School of Electronics and Information Engineering, Beijing University of Aeronautics and Astronautics, Beijing 100083, China
    Beijing Hangkong Hangtian Daxue Xuebao, 2007, 5 (577-579):
  • [6] A new mutual authentication scheme based on nonce and smart cards
    Liu, Jia-Yong
    Zhou, An-Min
    Gao, Min-Xu
    COMPUTER COMMUNICATIONS, 2008, 31 (10) : 2205 - 2209
  • [7] An enhancement of timestamp-based password authentication scheme
    Fan, L
    Li, JH
    Zhu, HW
    COMPUTERS & SECURITY, 2002, 21 (07) : 665 - 667
  • [8] An efficient nonce-based authentication scheme with key agreement
    Chen, YC
    Yeh, LY
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 169 (02) : 982 - 994
  • [9] Cryptanalysis of a mutual authentication scheme based on nonce and smart cards
    Sun, Da-Zhi
    Huai, Jin-Peng
    Sun, Ji-Zhou
    Li, Jian-Xin
    COMPUTER COMMUNICATIONS, 2009, 32 (06) : 1015 - 1017
  • [10] Cryptanalysis of an enhanced timestamp-based password authentication scheme
    Wang, B
    Li, JH
    Tong, ZP
    COMPUTERS & SECURITY, 2003, 22 (07) : 643 - 645