1 |
S. K. Kim and M. G. Chung, "More secure remote user authentication scheme." Computer Communications, Vol. 32, No. 6, pp.1018-1021. 2009.
DOI
ScienceOn
|
2 |
J. Xu, W. T. Zhu, and D. G. Feng, "An improved smart card based password authentication scheme with provable security," Computer standards & Interface, Vol. 31, No. 4, pp. 723-728, 2009.
DOI
ScienceOn
|
3 |
R. Song, "Advanced smart card based password authentication protocol." Computer standards & Interface, Vol. 32, pp. 321-325, 2010
DOI
ScienceOn
|
4 |
C. T. Li and M. S. Hwang, "An efficient biometrics-based remote user authentication scheme using smart card." Journal of Network and Computer Applications, Vol. 33, No. 1, pp. 1-5, 2010.
DOI
ScienceOn
|
5 |
X. Li, J. W. Niu, J. Ma, W. D. Wang, "Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart card." Journal of Network and Computer Applications, 2011.
|
6 |
Lamport L. password authentication with insecure communication. communications of the ACM 1981. 24(11). p. 770-772
DOI
ScienceOn
|
7 |
Min-Shiang Hwang and L. H. Li, "A New Remote User Authentication Scheme Using Smarts Cards". IEEE Transactions on Consumer Electronics, Vol. 46, No. 1, pp.28-30, 2000.
DOI
ScienceOn
|
8 |
N. Y. Lee and Y. C. Chiu, " improved remote authentication scheme with smart card," Computer standards & Interface, Vol. 27, No. 2, pp. 177-180, 2005
DOI
ScienceOn
|