scientific article; zbMATH DE number 6538092
From MaRDI portal
Publication:3466485
zbMATH Open1338.94093MaRDI QIDQ3466485FDOQ3466485
Authors:
Publication date: 1 February 2016
Full work available at URL: http://ijpam.uniud.it/online_issue/201534/11-QuFengHuang.pdf
Title of this publication is not available (Why is that?)
Recommendations
- A secure user authentication protocol using elliptic curve cryptography
- Computational Science and Its Applications – ICCSA 2004
- scientific article; zbMATH DE number 5837685
- Mutual-authentication scheme based on hash function and elliptic curve cryptography
- An efficient nonce-based authentication scheme with key agreement
- An authenticated key exchange protocol in elliptic curve cryptography
- scientific article; zbMATH DE number 1808282
- Elliptic curve based authenticated encryption scheme and its application for electronic payment system
Cryptography (94A60) Applications to coding theory and cryptography of arithmetic geometry (14G50) Authentication, digital signatures and secret sharing (94A62)
Cited In (18)
- Elliptic curve based authenticated encryption scheme and its application for electronic payment system
- A provably secure authenticated key agreement protocol for wireless communications
- An anonymous SIP authenticated key agreement protocol based on elliptic curve cryptography
- Enhanced secure anonymous authentication scheme for roaming service in global mobility networks
- Title not available (Why is that?)
- A secure user authentication protocol using elliptic curve cryptography
- Title not available (Why is that?)
- Design of improved password authentication and update scheme based on elliptic curve cryptography
- Analysis and enhancement of a password authentication and update scheme based on elliptic curve cryptography
- Dynamic user authentication scheme based on the generalized elliptic curve signature scheme
- Provable secure and efficient digital rights management authentication scheme using smart card based on elliptic curve cryptography
- Method of constructing elliptic curve authenticated encryption scheme
- A traceable and anonymous authentication scheme based on ECC
- An authenticated key scheme over elliptic curves for topological networks
- Mutual-authentication scheme based on hash function and elliptic curve cryptography
- Cryptanalysis and improvement of an access control in user hierarchy based on elliptic curve cryptosystem
- Applied Cryptography and Network Security
- Formal security proof for a scheme on a topological network
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3466485)