1 |
H.M. Qiu, Y.X. Yang, and Z.M. Hu, A new mutual user authentication scheme using smart card, Application Research of Computers, No. 12, pp. 103-105, 2005
|
2 |
L. Lamport, Password authentication with insecure communication, Communications of the ACM, Vol.24, No.11, pp. 770-772, 1981
DOI
ScienceOn
|
3 |
Z. Chai, Z. Cao, and R. Lu, Efficient Password- Based Authentication and Key Exchange Scheme Preserving User Privacy, WASA'06, LNCS 4138, pp. 467-477, 2006
|
4 |
W.C. Ku, C.M. Chen, and H.L. Lee, Cryptanalysis of a variant of Peyravian-Zunic's password authentication scheme, IEICE Trans. Commun., Vol. E86-B, No. 5, pp. 1682-1684, 2003
|
5 |
E.J. Yoon, K.Y. Yoo, More efficient and secure remote user authentication scheme using smart cards, IEEE ICPADS'05, Vol. 2, pp. 73-77, 2005
|
6 |
M.L. Das, A. Saxena, V.P. Gulati, A dynamic ID-based remote user authentication scheme, IEEE Transactions on Consumer Electronics, Vol. 50, No.2, pp. 629-631, 2004
DOI
ScienceOn
|
7 |
H.Y. Chien, C.H. Chen, A Remote Authentication Scheme Preserving User Anonymity, IEEE AINA'05, Vol. 2, pp. 245-248 , 2005
|
8 |
L. Hu, Y. Yang, X. Niu, Improved Remote User Authentication Scheme Preserving User Anonymity, IEEE CNSR'07, pp. 323-328, 2007
|