1 |
L. Lamport, "Password Authentication with Insecure Communication," Communication of the ACM, vol. 24, pp. 770-772, 1981.
DOI
|
2 |
G. Conklin, G. Dietrich, and D. Walz, "Password-based Authentication:A System Perspective," System Sciences, vol. 50, pp. 629-631, 2004.
|
3 |
M. Abdalla, P. Fouque, and D. Pointcheval, "Passwordbased Authenticated Key Exchange in the Three-Party Setting," On Public Key Gryptography-PKC 2005, vol. 3386, pp. 65-84, 2005.
|
4 |
S. Jiang and G. Gong, "Password based Key Exchange with Mutual Authentication," Selected Areas in Cryptography, vol. 3357, pp. 267-279, 2005.
|
5 |
R. Gennaro and Y. Lindell, "A framework for passwordbased authenticated key exchange," ACM Transactions on Information and System Security (TISSEC), vol. 9, pp. 181-234, 2006.
DOI
|
6 |
J. Moon, Y. Choi, J. Jung, and D. Won, "An Improvement of Robust Biometrics-Based Authentication and Key Agreement Scheme for Multi-Server Environments Using Smart Cards," PLoS ONE, vol. 10, no. 12, pp. 1-15, 2015.
|
7 |
Y.R. Lu, L.X. Li, H.P. Peng, and Y.X. Yang, "An Enhanced Biometric-Based Authentication Scheme for Telecare Medicine Information Systems using Elliptic Curve Cryptosystem," Journal of Medical Systems, vol. 39, no. 32, pp. 1-8, 2015.
DOI
|
8 |
Y. Choi, Y. Lee, and D. Won, "Security Improvement on Biometric Based Authentication Scheme for Wireless Sensor Networks Using Fuzzy Extraction," International Journal of Distributed Sensor Networks, vol. 2016, pp. 1-16, 2016.
|
9 |
X. Li, J. Niu, J. Ma, W. Wang, and C. Liu, "Cryptanalysis and Improvement of a Biometrics-based Remote User Authentication Scheme using Smart Cards," Journal of Network and Computer Applications, vol. 34, pp. 73-79, 2011.
DOI
|
10 |
M.C. Chuang and M.C. Chen, "An Anonymous Multi-Server Authenticated Key Agreement Scheme based on Trust Computing using Smart Cards and Biometrics," Expert Systems with Applications, vol. 41, no. 4, pp. 1411-1418, 2014.
DOI
|
11 |
D. Mishra, A.K. Das, and S. Mukhopadhyay, "A Secure User Anonymity-Preserving Biometric-based Multi- Server Authenticated Key Agreement Scheme using Smart Cards," Expert Systems with Applications, vol. 41, no. 18, pp. 8129-8143, 2014.
DOI
|
12 |
K. C. Baruah, S. Banerjee, M. P. Dutta, and C. T. Bhunia, "An Improved Biometric-based Multi-Server Authentication Scheme using Smart Card," On Public Key Gryptography-PKC 2005, vol. 3386, pp. 65-84, 2005.
|
13 |
Y. Lin, K. Wang, B. Zhang, Y. Liu, and X. Li, "An Enhanced Biometric-Based Three Factors User Authentication Scheme for Multi-server Environments," International Journal of Security and Its Applications, vol. 10, no. 1, pp. 315-328, 2016.
|
14 |
Y. Dodis, L. Reyzin, and A. Smith, "Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data," Advances in Cryptology, vol. 3027, pp. 523-540, 2004.
|
15 |
A.K. Das, "A Secure and Effective Biometric‐based User Authentication Scheme for Wireless Sensor Networks using Smart Card and Fuzzy Extractor," International Journal of Communication Systems, pp. 1-25, 2015.
|
16 |
C. Kaufman, P. Hoffman, Y. Nir, P. Eronen, and T. Kivinen, "Internet key exchange protocol version 2 (IKEv2)" RFC 7236, 2014.
|
17 |
K. Xue and P. Hong, "Security Improvement on an Anonymous Key Agreement Protocol based on Chaotic Maps," Communication Nonlinear Science Numerical Simulation, vol. 17, no. 7, pp. 2969-2977, 2012.
DOI
|
18 |
C. Li and M. Hwang, "An Efficient Biometrics-based Remote User Authentication Scheme using Smart Card," Journal of Network and Computer Applications, vol. 33, pp. 1-5, 2010.
DOI
|
19 |
A.K. Das and A. Goswami, "An Enhanced Biometric Authentication Scheme for Telecare Medicine Information Systems with Nonce using Chaotic Hash Function," Journal of Medical Systems, vol. 38, no. 6, pp. 1-19, 2014.
DOI
|