Author:
Kandar Shyamalendu,Pal Sumit,Dhara Bibhas Chandra
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Science Applications
Reference57 articles.
1. Lamport, L. (1981). Password authentication with insecure communication. Commun. ACM, 24(11), 770–772.
2. Shamir, A., et al. (1984). Identity-based cryptosystems and signature schemes. Workshop on the Theory and Application of Cryptographic Techniques (pp. 47–53). Berlin: Springer.
3. ElGamal, T. (1985). A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory, 31(4), 469–472.
4. Chang, C.-C., & Wu, T.-C. (1991). Remote password authentication with smart cards. IEE Proc. E (Comut. Digit. Tech.), 138(3), 165–168.
5. Hwang, M.-S., & Li, L.-H. (2000). A new remote user authentication scheme using smart cards. IEEE Trans. Consum. Electron., 46(1), 28–30.
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献