Search - Network and Parallel Computing Access content directly

Filter your results

4 results
Keywords : Attack
Image document

Cryptanalysis of Goriparthi et al.’s Bilinear Pairing Based Remote User Authentication Scheme

Hae-Jung Kim , Eun-Jun Yoon
9th International Conference on Network and Parallel Computing (NPC), Sep 2012, Gwangju, South Korea. pp.581-588, ⟨10.1007/978-3-642-35606-3_69⟩
Conference papers hal-01551363v1
Image document

Cryptanalysis of an RFID Tag Search Protocol Preserving Privacy of Mobile Reader

Eun-Jun Yoon
9th International Conference on Network and Parallel Computing (NPC), Sep 2012, Gwangju, South Korea. pp.575-580, ⟨10.1007/978-3-642-35606-3_68⟩
Conference papers hal-01551322v1
Image document

Breaking a Robust Remote User Authentication Scheme Using Smart Cards

Ding Wang , Chun-Guang Ma , Sen-Dong Zhao , Chang-Li Zhou
9th International Conference on Network and Parallel Computing (NPC), Sep 2012, Gwangju, South Korea. pp.110-118, ⟨10.1007/978-3-642-35606-3_13⟩
Conference papers hal-01551357v1
Image document

A New Approach for Detecting SMTPFA Based on Entropy Measurement

Hsing-Chung Chen , Jai-Zong Sun , Shian-Shyong Tseng , Chien-Erh Weng
9th International Conference on Network and Parallel Computing (NPC), Sep 2012, Gwangju, South Korea. pp.349-359, ⟨10.1007/978-3-642-35606-3_41⟩
Conference papers hal-01551369v1