References
- L. Lamport, "Password authentication with insecure communication," Communications of the ACM, Vol.24, No.11, pp.770-772, 1981. https://doi.org/10.1145/358790.358797
- N. Haller, "The S/Key one-time password system," in Proceedings of the ISOC Symposium on Network and Distributed System Security, pp.151-157, 1994
- J. Choi and H. Kim, "One-Handled The Mobile One-Time Password Scheme," The Journal of The Korean Institute of Communication Sciences, Vol.37, No.6, pp.497-501, 2012 https://doi.org/10.7840/KICS.2012.37.6C.497
- C. M. Chen and W. C. Ku, "Stolen-verifier attack on two new strong-password authentication protocol," IEICE Transactions on communications, Vol.E85-B, No.11, pp.2519-2521, 2002.
- C. C. Lee, M. S. Hwang and W. P. Yang, "A Flexible Remote User Authentication Scheme using Smart Cards," ACM Operating System Review, Vol.36, No.4, pp.23-29, 2002.
- M. L. Das, A. Saxena and V. P. Gulati, "A dynamic ID-based remote user authentication Scheme," IEEE Transactions on Consume Electronics, Vol.50, No.2, pp.629-631, 2004. https://doi.org/10.1109/TCE.2004.1309441
- H. Y. Chien and C. H. Chen, "A remote User Authentication Scheme preserving user anonymity," in Proceedings of IEEEAINA'05, Vol.2, pp.245-248, 2005.
- L. Hu, Y. Yang and X. Niu, "Improved remote User Authentication Scheme preserving user anonymity," in Proceedings of Fifth Annual Conference on Communication Network and Services Research(CNSR), pp.323-328, 2007.
- C. S. Bindu, P. C. S. Reddy and B. Satyanarayana, "Imporoved Remote User Authentication Scheme Preserving User Anonymity," IJCSNS, Vol.8, No.3, pp.62-66, 2008.
- Z. Chai, Z. Cao and R. Lu, "Efficient Password-Based Authentication and Key Exchange Scheme Preserving User Privacy," in Proceedings of WASA'06, LNCS 4138, pp.467-477, 2006.
- S. Kim, J. Y. Chun and D. H. Lee, "Anonymity User Authentication Scheme with Smart Cards preserving Traceability," Journal of the Korea Institute of Information Security and Cryptology, Vol.18, No.5, pp.31-39, 2008
- J. Choi and S. Shin, "Traceable Authentication Scheme Providing User Anonymity," Journal of The Korea Contents Association, Vol.9, No.4, pp.95-102, 2009 https://doi.org/10.5392/JKCA.2009.9.4.095
- J. Choi, S. Shin and K. Han, "Three-Party Key Exchange Protocol Providing User Anonymity based on Smartcards," Journal of the Korea Academia-Industrial cooperation Society, Vol.10 No.2, pp.388-395, 2009 https://doi.org/10.5762/KAIS.2009.10.2.388
- J. Xu, W. Zhu and D. Feng, "An improved smart card based password authentication scheme provable security," Computer Standard & Interface, Vol.31, No.4, pp.723-728, 2009. https://doi.org/10.1016/j.csi.2008.09.006
- K. Shin and J. Cho, "A Remote Authentication Protocol Design Using Smart Card to Guarantee User Anonymity," Korean Institute Of Information Technology, Vol.10, No.12, pp.77-87, 2012.