참고문헌
- M. S. Hwang, L. H. Li, "A New Remote User Authentication Scheme Using Smart Cards", IEEE Transactions on Consumer Electronics 46, pp. 28-30, 2000 https://doi.org/10.1109/30.826377
- E. J. Yoon, E. K. Ryu and K. Y. Yoo, "Further Improvements of an Efficient Password based Remote User Authentication Scheme Using Smart Cards", IEEE Transactions on Consumer Electronics 50(2), pp. 612-614, 2004 https://doi.org/10.1109/TCE.2004.1309437
- M. L. Das, A. Sxena and V. P. Gulathi, "A Dynamic ID-based Remote User Authentication Scheme", IEEE Transactions on Consumer Electronics 50(2), pp. 629-631. 2004 https://doi.org/10.1109/TCE.2004.1309441
- C. W. Lin, C. S. Tsai and M. S. Hwang, "A New Strong-Password Authentication Scheme Using One-Way Hash Functions", Journal of Computer and Systems Sciences International, Vol. 45, No.4, pp. 623-626, 2006 https://doi.org/10.1134/S1064230706040137
- C. S. Bindu, P. C. S. Reddy and B. Satyanarayana, "Improved Remote User Authentication Scheme Preserving User Anonymity", International Journal of Computer Science and Network Security 8(3), pp. 62-66, 2008
- W. C. Ku, S. T. Chang and M. H. Chiang, "Further Cryptanalysis of Fingerprint-based Remote User Authentication Scheme Using Smart Cards", Electronics Letters, Vol. 41, No. 5, pp. 240-241 (2005) https://doi.org/10.1049/el:20047658
- M. K. Khan, J. Zhang, "An Efficient and Practical Fingerprint-based Remote User Authentication Scheme with Smart Cards", ISPEC 2006, LNCS 3903, pp. 260-268, 2006
- C. C. Chang, S. C. Chang and Y. W. Lai, "An Improved Biometrics-based User Authentication Scheme without Concurrency System", International Journal of Intelligent Information Processing, Vol. 1, No. 1, pp. 41-49, 2010 https://doi.org/10.4156/ijiip.vol1.issue1.5
- C. T. Li, M. S Hwang, "An Efficient Biometrics -based Remote User Authentication Scheme Using Smart Cards", Journal of Network and Computer Applications, Vol. 33, pp. 1-5, 2010 https://doi.org/10.1016/j.jnca.2009.08.001
- A. K. Das, "Analysis and Improvement on an Efficient Biometric-based Remote User Authentication Scheme Using Smart Cards", IET Information Security Vol.5, Iss. 3, pp. 145-151, 2011 https://doi.org/10.1049/iet-ifs.2010.0125
- P. Kocher, J. Jaffe and B. Jun, "Differential Power Analysis", Proceedings of Advances in Cryptology, pp. 388-397, 1999
- T. S. Messerges, E. A. Dabbish and R. H. Sloan, "Examining Smart-Card Security under the Threat of Power Analysis Attacks", IEEE Transactions on Computers 51(5), pp. 541-552, 2002 https://doi.org/10.1109/TC.2002.1004593
피인용 문헌
- Integration of Application Program for Dementia Diagnosis using Biometric Sensor and Oxygen Chamber vol.14, pp.11, 2013, https://doi.org/10.5762/KAIS.2013.14.11.5847
- A Design of Protocol Based on Smartcard for Financial Information to Protect in E-payment System vol.14, pp.11, 2013, https://doi.org/10.5762/KAIS.2013.14.11.5872
- A Study of Authentication Method for Id-Based Encryption Using In M2M Environment vol.14, pp.4, 2013, https://doi.org/10.5762/KAIS.2013.14.4.1926
- Weaknesses and Improvement of User Authentication Scheme against Smart-Card Loss Attack vol.16, pp.6, 2016, https://doi.org/10.7236/JIIBC.2016.16.6.95