References
- W. H. Yang, and S. P. Shieh, "Password Authentication with Smart Card", Computers and Security, Vol. 18, No. 8, pp. 727-733, 1999. https://doi.org/10.1016/S0167-4048(99)80136-9
- J. J. Shen, C. W. Lin, and M. S. Hwang, "Security Enhancement for Timestamp-based Password Authentication Scheme Using Smart Cards", Computers and Security, Vol. 22, No. 7, pp. 591-595, 2003. https://doi.org/10.1016/S0167-4048(03)00709-0
- S. T. Wu, and B. C. Chieu, "A User Friendly Remote Authentication Scheme with Smart Cards", Computers and Security, Vol. 22, No. 6, pp. 629-631, 2003.
- M. L. Das, A. Sxena, and V. P. Gulathi, "A Dynamic ID-based Remote User Authentication Scheme", IEEE Transactions on Consumer Electronics, Vol. 50, No. 2, pp. 629-631, 2004. https://doi.org/10.1109/TCE.2004.1309441
- H. Y. Chien, and C. H. Chen, "A Remote Password Authentication Preserving User Anonymity", Proceedings of 19th International Conference on Advanced Information Networking and Applications (AINA '05), 2005.
- E. J. Yoon, E. K. Ryu, and K. Y. Yoo, "Attack on the Shen et al.'s Timestamp-based Password Authentication Scheme Using Smart Cards", IEICE Transactions on Fundamentals E88-A (1), pp. 319-321, 2005. https://doi.org/10.1093/ietfec/E88-A.1.319
- C. W. Lin, C. S. Tsai, and M. S. Hwang, "A New Strong-Password Authentication Scheme Using One-Way Hash Functions", Journal of Computer and Systems Sciences International, Vol. 45, No. 4, pp. 623-626, 2006. https://doi.org/10.1134/S1064230706040137
- C. S. Bindu, P. C. Reddy, and B. Satyanarayana, "Improved Remote User Authentication Scheme Preserving User Anonymity", International Journal of Computer Science and Network Security, Vol. 8, No. 3, pp. 62-66, 2008.
- C. C. Chang, and C. Y. Lee, "A Friendly Password Mutual Authentication Scheme for Remote Login Network System", International Journal of Multimedia and Ubiquitous Engineering, Vol. 3, No. 1, pp. 59-63, 2008.
- J. Y. Liu, A. M. Zhou, and M. X. Gao, "A New Authentication Scheme based on Nonce and Smart Cards", Computer Communication, Vol. 31, pp. 2205-2209, 2008. https://doi.org/10.1016/j.comcom.2008.02.002
- M. Choi, T. Kim, S. Yeo, and E. Cho, "A Study on the Network Security Level Management", Journal of Korean Institute of Information Technology, Vol. 7, No. 1, pp. 214-219, 2009.
- H Lee, and Y. Park, "A Design and Implementation of User Authentication System using Biometric Information", Journal of Korea Academia-Industrial cooperation Society, Vol. 11, No. 9, pp. 3548-3557, 2010. https://doi.org/10.5762/KAIS.2010.11.9.3548
- P. Kocher, J. Jaffe, and B. Jun, "Differential Power Analysis", Proceedings of Advances in Cryptology, pp. 388-397, 1999.
- T. S. Messerges, E. A. Dabbish, and R.H. Sloan, "Examining Smart-Card Security under the Threat of Power Analysis Attacks", IEEE Transactions on Computers, Vol. 51, No. 5, pp. 541-552, 2002. https://doi.org/10.1109/TC.2002.1004593
Cited by
- Integration of Application Program for Dementia Diagnosis using Biometric Sensor and Oxygen Chamber vol.14, pp.11, 2013, https://doi.org/10.5762/KAIS.2013.14.11.5847
- A Design of Protocol Based on Smartcard for Financial Information to Protect in E-payment System vol.14, pp.11, 2013, https://doi.org/10.5762/KAIS.2013.14.11.5872
- A Study of Authentication Method for Id-Based Encryption Using In M2M Environment vol.14, pp.4, 2013, https://doi.org/10.5762/KAIS.2013.14.4.1926