DeviceVeil: Robust Authentication for Individual USB Devices Using Physical Unclonable Functions | 0 | 0.34 | 2019 |
How To Preserve User Anonymity In Password-Based Anonymous Authentication Scheme | 0 | 0.34 | 2018 |
Simple Anonymous Password-Based Authenticated Key Exchange (Sapake), Reconsidered | 2 | 0.37 | 2017 |
Security Analysis of Password-Authenticated Key Retrieval. | 1 | 0.35 | 2017 |
Cyber Physical Security For Industrial Control Systems And Iot | 7 | 0.52 | 2016 |
A security framework for MQTT. | 0 | 0.34 | 2016 |
A secure anonymous password-based authentication protocol with control of authentication numbers | 0 | 0.34 | 2016 |
On Finding Secure Domain Parameters Resistant To Cheon'S Algorithm | 0 | 0.34 | 2015 |
Hidden Credential Retrieval, Revisited | 0 | 0.34 | 2015 |
On Unlinkability Of Password-Based Anonymous Authentication | 0 | 0.34 | 2015 |
Evaluation of Physical Unclonable Functions for 28-nm Process Field-Programmable Gate Arrays. | 5 | 0.54 | 2014 |
About Validity Checks Of Augmented Pake In Ieee 1363.2 And Iso/Iec 11770-4 | 0 | 0.34 | 2014 |
Efficient Constructions of Deterministic Encryption from Hybrid Encryption and Code-Based PKE | 0 | 0.34 | 2014 |
Energy and area saving effect of Dynamic Partial Reconfiguration on a 28-nm process FPGA | 1 | 0.37 | 2013 |
Securing SSL-VPN with LR-AKE to access personal health record. | 0 | 0.34 | 2013 |
HB♭ protocol for lightweight authentication; Its information theoretic indistinguishability against MITM attack watching reader's response | 0 | 0.34 | 2012 |
Comparison of tools and simulators for control system security studies | 1 | 0.37 | 2012 |
Efficient Augmented Password-Only Authentication and Key Exchange for IKEv2 | 4 | 0.44 | 2012 |
A secure public cloud storage system. | 4 | 0.46 | 2011 |
Threshold Anonymous Password-Authenticated Key Exchange Secure Against Insider Attacks | 2 | 0.40 | 2011 |
On advanced cryptographic techniques for information security of smart grid AMI | 0 | 0.34 | 2011 |
Security Proof of AugPAKE. | 4 | 0.44 | 2010 |
Anonymous Password-Authenticated Key Exchange: New Construction And Its Extensions | 1 | 0.35 | 2010 |
How to strengthen the security of RSA-OAEP | 1 | 0.37 | 2010 |
Purpose-restricted Anonymous Mobile Communications Using Anonymous Signatures in Online Credential Systems | 2 | 0.40 | 2010 |
Privacy Enhanced RFID Using Quasi-Dyadic Fix Domain Shrinking | 5 | 0.44 | 2010 |
A note on a fatal error of optimized LFC private information retrieval scheme and its corrected results | 0 | 0.34 | 2010 |
Security Analysis Of Two Augmented Password-Authenticated Key Exchange Protocols | 1 | 0.35 | 2010 |
An Rsa-Based Leakage-Resilient Authenticated Key Exchange Protocol Secure Against Replacement Attacks, And Its Extensions | 2 | 0.49 | 2010 |
How to distinguish on-line dictionary attacks and password mis-typing in two-factor authentication | 0 | 0.34 | 2010 |
Very-Efficient Anonymous Password-Authenticated Key Exchange and Its Extensions | 8 | 0.51 | 2009 |
Partnership in key exchange protocols | 7 | 0.50 | 2009 |
Flexible Quasi-Dyadic Code-Based Public-Key Encryption and Signature. | 2 | 0.41 | 2009 |
New security layer for overlay networks. | 0 | 0.34 | 2009 |
Lightweight broadcast authentication protocols reconsidered | 5 | 0.42 | 2009 |
Code-based public-key cryptosystems and their applications | 0 | 0.34 | 2009 |
Coding-Based Oblivious Transfer | 11 | 0.52 | 2008 |
Semantic security for the McEliece cryptosystem without random oracles | 47 | 1.63 | 2008 |
Lightweight Privacy-Preserving Authentication Protocols Secure against Active Attack in an Asymmetric Way | 4 | 0.49 | 2008 |
A Secure Construction for Threshold Anonymous Password-Authenticated Key Exchange | 5 | 0.45 | 2008 |
Protocols for purpose-restricted anonymous communications in IP-based wireless networks | 1 | 0.36 | 2008 |
Ivs To Skip For Immunizing Wep Against Fms Attack | 2 | 0.52 | 2008 |
RSA-Based Password-Authenticated Key Exchange, Revisited | 1 | 0.36 | 2008 |
Special Section on Cryptography and Information Security | 0 | 0.34 | 2008 |
A Secure Authenticated Key Exchange Protocol for Credential Services | 2 | 0.53 | 2008 |
IVs to Skip for Immunizing WEP against FMS Attack. | 0 | 0.34 | 2008 |
A security framework for personal networks | 0 | 0.34 | 2008 |
A New Security Architecture For Personal Networks And Its Performance Evaluation | 0 | 0.34 | 2008 |
An Efficient and Leakage-Resilient RSA-Based Authenticated Key Exchange Protocol with Tight Security Reduction*A preliminary version appeared in [33]. Some mistakes about security proof are corrected in this paper. | 0 | 0.34 | 2007 |
An Efficient And Leakage-Resilient Rsa-Based Authenticated Key Exchange Protocol With Tight Security Reduction | 2 | 0.37 | 2007 |