1 |
Jong Sik Moon, Deok Gyu Lee, Jong Hyuk Park, Im Yeong Lee, "Authentication and ID-Based Key Management Protocol in Pervasive Environment," WIRELESS PERSONAL COMMUNICATIONS, 2009.08. (Online Pullished)
|
2 |
A. Shamir, "Identity-based cryptosystems and signature schemes," CRYPTO''84, pp. 47-53, 1984.
|
3 |
김경신, "효율적인 ID기반 강한 검증자 지정 서명 기법," 고려대학교 정보경영공학전문대학원 석사졸업논문 2010.
|
4 |
Jiang, J., He, C., and Jiang, L. G., "On the Design of Provably Secure Identity-Based Authentication and Key Exchange Protocol for Heterogeneous Wireless Access," ICCNMC, pp. 972-981, 2005.
|
5 |
이원진, 김은주, 전일수, "스마트카드를 이용한 ID기반의 사용자 인증 프로토콜," 한국컴퓨터종합학술대회, Vol. 32, No. 1, pp. 166-168, 2005.
|
6 |
Wang, H., Yao, G., and Jiang, Q., "An identity-based group key agreement protocol from pairing," The 2008 Third International Conference on Availability, Reliability, Security (ARES), pp. 532-537, 2008.
|
7 |
Wang, S., Cao, Z., Choo, K.-K. R., and Wang, L. "An improved identity-based key agreement protocol and its security proof," ISCI, 179(3), pp. 307-318, 2009.
|
8 |
M.Scott, "Cryptanalysis of an ID-based Password Authentication Scheme using Smart Cards and Fingerprints," IACR e-print archive, 2004.
|
9 |
J.P. Jeong, M. Y. Chung and H.S. Choo, "Integrated OTP-Based User Authentication Scheme Using Smart Cards in Home Networks," HICSS, pp. 294, 2008.
|
10 |
H.J. Bae, H.S. Kim, K.Y. Yoo, "ID-based key exchange protocol using smart cards," Korea Computer Congress 30(1), pp.l 491-493, 2003.
|
11 |
S.U. Lee, "ID-based Wireless LAN Authentication Technique Between Terminals," Kyungpook National University Graduate School, 2004.
|
12 |
H.S. Kim, S.W. Lee, K.Y. Yoo, "ID-based password authentication scheme using smart cards and fingerprints," ACM Operating Systems Review 37(4), pp. 32-41, 2003.
DOI
ScienceOn
|
13 |
J.K. Lee, S.R. Ryu, K.Y. Yoo, "Fingerprint-based remote user authentication scheme using smart cards," Electronics Letters 38(12), pp. 554-555, 2002.
DOI
ScienceOn
|