1 |
Lamport, L., "Password Authentication with Insecure Communication," Communications of the ACM, Vol. 24, No. 11, 1981, pp. 770-772.
DOI
ScienceOn
|
2 |
Bellovin, S. M. and Merritt, M., "Encrypted key exchange: password-based protocols secure against dictionary attacks," In: IEEE Symposium on research in security and privacy, IEEE Computer Society, 1992, pp. 72-84.
|
3 |
Bellare, M., Pointcheval, D. and Rogaway, P., "Authenticated key exchange secure against dictionary attacks," Advances in Cryptology- EUROCRYPT00, Lecture Notes in Computer Science, 1807, 2000, pp. 139-155.
|
4 |
Botko, V., Mackenzie, P. and Patel, S., "Provable secure password-authenticated key exchange using Diffe-Hellman," 2000, pp. 156-171.
|
5 |
Yang, G., Wong, D. S., Wong, H. and Deng, X., "Two-factor mutual authentication based on smart cards and passwords," Journal of computer and system sciences, Elsevier, Vol. 74, No. 7, 2008, pp. 1160-1172.
DOI
ScienceOn
|
6 |
Wu, S. T. and Chieu, B. C., "A note on a user friendly remote user authentication scheme with smart cards," IEICE Transactions Fundamentals, Vol. 87-A, No. 8, 2004, pp. 2180-2181.
|
7 |
Khan, M. K., "An efficient and secure remote mutual authentication scheme with smart cards," International Symposium on Biometrics and Security Technologies(ISBAST 2008), pp. 1-6.
|
8 |
Ku, W. C., Chen, C. M. and Lee, H. L., "Cryptanalysis of a variant of Peyravian-Zunic's password authentication scheme," IEICE trans. on commun., Vol. E86-B, No. 5, 2003, pp. 1682-1684.
|
9 |
Mitchell, C., "Limitations of challenge-response entity authentication," Electronics Letters, Vol. 25, No. 17, 1989, pp. 1195-1196.
DOI
ScienceOn
|
10 |
Yashinsac, A., "Dynamic analysis of security protocols," Proc. 2000 Workshop on New Security Paradigms, 2001, pp. 77-87.
|
11 |
Kocher, P., Jaffe, J. and June, B., "Differential power analysis," Proc. Advances in Cryptology (CRYPTO'99), 1999, pp. 388-397.
|
12 |
Messerges, T. S., Dabbish, E. A. and Sloan, R. H., "Examming smart card security under the threat of power analysis attacks," IEEE Transactions on Computer, Vol. 51, No. 5, 2002, pp. 541-552.
DOI
ScienceOn
|
13 |
Menezes, A. J., Oorschot, P. C. and Vanston, S. A., "Handbook of applied cryptography," CRC Press, New York, 1997.
|