Revise Search
Issue | Title | |
Vol 47, No 3 (2018) | Cryptanalysis and improvement of a Multi-Server Authenticated Key Agreement by Chen and Lee’s Scheme | Abstract PDF |
Azeem Irshad, Husnain Naqvi, Shehzad Ashraf Chaudhary, Muhammad Usman, Muhammad Shafiq, Omid Mir, Ambrina Kanwal | ||
Vol 43, No 2 (2014) | Enhanced Secure Authentication Scheme with Anonymity for Roaming in Mobility Networks | Abstract PDF |
W. -C. Kuo, H. -J. Wei, J. -C. Cheng | ||
Vol 41, No 3 (2012) | An Improved Delegation-Based Authentication Protocol for PCSs | Abstract PDF |
Cheng Chi Lee, Rui Xiang Chang, Te Yu Chen, Lung Albert Chen | ||
Vol 46, No 2 (2017) | Security Vulnerabilities and Improvements of SPAM: A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks | Abstract PDF |
Mohammad Sabzinejad Farash, Shehzad Ashraf Chaudhry, SK Hafizul Islam, Muazzam A. Khan Khattak, Aiiad Albeshri | ||
Vol 41, No 3 (2012) | A Novel Mutual Authentication Scheme for RFID conforming EPCglobal Class 1 Generation 2 Standards | Abstract PDF |
Chin Ling Chen, Yu Cheng Huang, Tzay Farn Shih | ||
Vol 43, No 4 (2014) | An Efficient Password Authentication Scheme Using Smart Card Based on Elliptic Curve Cryptography | Abstract PDF |
Y. Zhang, J. Chen, B. Huang, C. Peng | ||
Vol 42, No 2 (2013) | Secure Indefinite-Index RFID Authentication Scheme with Challenge-Response Strategy | Abstract PDF |
Wen Chung Kuo, Bae-Ling Chen, Lih-Chyau Wuu | ||
Vol 41, No 1 (2012) | A SECURE PASSWORD-BASED REMOTE USER AUTHENTICATION SCHEME WITHOUT SMART CARDS | Abstract PDF |
Bae Ling Chen, Wen Chung Kuo, Lih Chyau Wuu | ||
Vol 45, No 2 (2016) | Simultaneous and Anonymous Mobile Network Authentication Scheme Based on Chaotic Maps | Abstract PDF |
Wen Chung Kuo, Chi-Sheng Lin, Chen-Tsun Chuang, Ming-Chih Kao | ||
Vol 43, No 2 (2014) | An Enhanced and Secure Three-Party Password-based Authenticated Key Exchange Protocol without Using Server's Public-Keys and Symmetric Cryptosystems | Abstract PDF |
M. S. Farash, M. A. Attari | ||
Vol 42, No 2 (2013) | Cryptanalysis and Improvement of a Password-Based Remote User Authentication Scheme without Smart Cards | Abstract PDF |
Debiao He, Ding Wang, Shuhua Wu | ||
Vol 42, No 2 (2013) | An Improved Password-Based Remote User Authentication Protocol without Smart Cards | Abstract PDF |
Qi Jiang, Jianfeng Ma, Guangsong Li, Zhuo Ma | ||
Vol 45, No 1 (2016) | Cryptanalysis and Improvement of an Enhanced Two-Factor User Authentication Scheme in Wireless Sensor Networks | Abstract PDF |
FuShan Wei, JianFeng Ma, Qi Jiang, Jian Shen, ChuanGui Ma | ||
Vol 41, No 1 (2012) | A MORE SECURE AND EFFICIENT AUTHENTICATION SCHEME WITH ROAMING SERVICE AND USER ANONYMITY FOR MOBILE COMMUNICATIONS | Abstract PDF |
Chun-Ta Li | ||
Vol 47, No 2 (2018) | Security Enhanced and Cost-effective User Authentication Scheme for Wireless Sensor Networks | Abstract PDF |
Wenfen Liu, Gang Zhou, Jianghong Wei, Xuexian Hu, Saru Kumari | ||
Vol 46, No 2 (2017) | Anonymous and Authentication Protocol For Multi-Server | Abstract PDF |
Wen Chung Kuo, Po-Wei Shih, Yu-Chih Huang, Lih-Chyau Wuu | ||
Vol 44, No 3 (2015) | Security Weaknesses on a Delegation-Based Authentication Protocol for PCSs | Abstract PDF |
Prosanta Gope, Tzonelih Hwang | ||
Vol 44, No 2 (2015) | An Anonymous and Lightweight Authentication Scheme for Mobile Devices | Abstract PDF |
Kuo-Hui Yeh | ||
Vol 40, No 3 (2011) | A New Efficient Key Agreement Scheme for VSAT Satellite Communications Based on Elliptic Curve Cryptosystem | Abstract PDF |
Jeong-Woo Hong, Sang-Yoon Yoon, Dong-In Park, Myung-Jin Choi, Eun-Jun Yoon, Kee-Young Yoo | ||
Vol 47, No 2 (2018) | A Biometric-Based Authentication and Anonymity Scheme for Digital Rights Management System | Abstract PDF |
Cheng-Chi Lee, Chun-Ta Li, Zhi-Wei Chen, Yan-Ming Lai | ||
Vol 44, No 1 (2015) | On the Designing of EPC C1 G2 Authentication protocol using AKARI-1 and AKARI-2 PRNGs | Abstract PDF |
Nasour Bagheri, Fatemeh Baghernejhad, Masoumeh Safkhani | ||
Vol 40, No 3 (2011) | A Robust Remote User Authentication Scheme Using Smart Card | Abstract PDF |
Chun-Ta Li, Cheng-Chi Lee | ||
Vol 40, No 2 (2011) | SECURE SMART CARD BASED PASSWORD AUTHENTICATION SCHEME WITH USER ANONYMITY | Abstract PDF |
Chun-Ta Li | ||
Vol 38, No 1 (2009) | AN EXTENDED CERTIfiCATE-BASED AUTHENTICATION AND SECURITY PROTOCOL FOR MOBILE NETWORKS | Abstract PDF |
Cheng-Chi Lee, I-En Liao, Min-Shiang Hwang | ||
Vol 39, No 2 (2010) | A PARALLEL PASSWORD-AUTHENTICATED KEY EXCHANGE PROTOCOL FOR WIRELESS ENVIRONMENTS | Abstract PDF |
Jung-Wen Lo, Shu-Chen Lin, Min-Shiang Hwang | ||
1 - 25 of 25 Items |
Search tips:
- Search terms are case-insensitive
- Common words are ignored
- By default only articles containing all terms in the query are returned (i.e., AND is implied)
- Combine multiple words with OR to find articles containing either term; e.g., education OR research
- Use parentheses to create more complex queries; e.g., archive ((journal OR conference) NOT theses)
- Search for an exact phrase by putting it in quotes; e.g., "open access publishing"
- Exclude a word by prefixing it with - or NOT; e.g. online -politics or online NOT politics
- Use * in a term as a wildcard to match any sequence of characters; e.g., soci* morality would match documents containing "sociological" or "societal"
Print ISSN: 1392-124X
Online ISSN: 2335-884X