1 |
M. L. Das, A. Saxena and V. P. Gulathi, "A dynamic ID-based remote user authentication scheme," IEEE Trans. on Consumer Electronics, Vol.50, no. 2, 2004.
|
2 |
H. Y. Chien and C. H. Chen, "A remote authentication scheme preserving user anonymity," IEEE AINA'05, Vol. 2, 2005.
|
3 |
L. Hu, Y. Yang, X. Niu, "Improved remote user authentication scheme preserving anonymity," Fifth Annual Conference on Communication Networks and Services Research(CNSR), 2007.
|
4 |
C. S. Bindu, P. C. S. Reddy, B. Satyanarayana, "Improved remote user authentication scheme preserving anonymity," International Journal of Computer Science and Network Security (IJCSNS), Vol. 8, no. 3, 2008.
|
5 |
I. E. Liao, C. C. Lee, M. S. Hwang, "Security enhancement for a dynamic ID-based remote user authentication scheme," IEEE Proceedings of the international conference on Next Generation Web Services Practices (NWeSP''05), 2005.
|
6 |
Z. Chai, Z. Cao, R. Lu, "Efficient password-based authentication and key exchange scheme preserving user privacy," WASA'06, LNCS 4138, 2006.
|
7 |
김세일, 천지영, 이동훈, "추적이 가능한 스마트카드 사용자 인증 기법," 한국정보보호학회논문지, 제18권 제5호, 2008.
과학기술학회마을
|
8 |
이성운, 권혁진, 류은경, 하금숙, "스마트카드 기반의 추적 가능한 사용자 인증 기법에 대한 안전성 개선," 보안공학연구논문지, 제7권 제2호, 2010
|
9 |
W. B. Horng, C. P. Lee, J. W. Peng, "A Secure Remote Authentication Scheme Preserving User Anonymity with Non-Tamper Resistant Smart Cards," WSEAS Transactions on Information Science and Applications, issue 5, Vol. 7, 2010.
|
10 |
E. Brier, C. Clavier, F. Oliver, Correlation power analysis with a leakage model, Lecture Notes in Computer Science, Vol. 1, no. 2, 2004.
|
11 |
조종원, 한동국, "마스킹-셔플링 부채널 대응법을 해독하는 실용적인 편중전력분석," 전자공학회논문지, 제49권 9호, 2012.
과학기술학회마을
DOI
ScienceOn
|
12 |
권혁진, 이성운, "추적 가능한 Non-Tamper Resistant 스마트카드 인증 기법," 한국정보기술융합학회 동계학술대회, 2012.
|