All Stories

  1. An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment
  2. A lightweight anonymous authentication scheme for consumer roaming in ubiquitous networks with provable security
  3. An enhanced privacy preserving remote user authentication scheme with provable security
  4. Cryptanalysis and Improvement of an Improved Two Factor Authentication Protocol for Telecare Medical Information Systems
  5. A provably secure and efficient two-party password-based explicit authenticated key exchange protocol resistance to password guessing attacks
  6. Cryptanalysis and improvement of a robust smart card secured authentication scheme on SIP using elliptic curve cryptography
  7. Cryptanalysis and improvement of a three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps
  8. Cryptanalysis and improvement of ‘an improved authentication with key agreement scheme on elliptic curve cryptosystem for global mobility networks’
  9. Security analysis and enhancements of an improved authentication for session initiation protocol with provable security
  10. An improved password-based authentication scheme for session initiation protocol using smart cards without verification table
  11. An anonymous and untraceable password-based authentication scheme for session initiation protocol using smart cards
  12. A provably secure and efficient authentication scheme for access control in mobile pay-TV systems
  13. An efficient client–client password-based authentication scheme with provable security
  14. Cryptanalysis and improvement of an efficient mutual authentication RFID scheme based on elliptic curve cryptography
  15. A secure and efficient identity-based authenticated key exchange protocol for mobile client–server networks
  16. Cryptanalysis and improvement of a chaotic map-based key agreement protocol using Chebyshev sequence membership testing
  17. An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps
  18. An Enhanced Authenticated Key Agreement for Session Initiation Protocol
  19. A new efficient authenticated multiple-key exchange protocol from bilinear pairings
  20. An ID-based key agreement protocol based on ECC among users of separate networks
  21. A Certificate less Multiple-key Agreement Protocol without Hash Functions Based on Bilinear Pairings
  22. Vulnerability of two multiple-key agreement protocols
  23. A Novel Secure Bilinear Pairing Based Remote User Authentication Scheme with Smart Card