1 |
C.I. Fan, Y.C. Chan, Z.K. Zhang, "Robust remote authentication scheme with smart cards", Computers and Security 2005, Vol. 24, No.8, pp. 619-628, 2005
DOI
ScienceOn
|
2 |
M.L. Das, A. Saxena, V.P. Gulati, "A dynamic ID-based remote user authentication scheme," IEEE Transactions on Consumer Electronics, Vol. 50, No.2, pp. 629-631, 2004
DOI
ScienceOn
|
3 |
E.J. Yoon, E.K. Ryu, K.Y. Yoo, "Efficient remote user authentication scheme based on generalized ElGamal signature scheme," IEEE Transactions on Consumer Electronics, Vol. 50, No.2, pp. 568-570, 2004
DOI
ScienceOn
|
4 |
M.S. Hwang and L.H. Li, "A new remote user authentication scheme using smart cards", IEEE Transactions On Consumer Elctronics, Vol. 46, No1, pp. 28-30, 2000
DOI
ScienceOn
|
5 |
H.Y. Chien and C.H. Chen, "A Remote Authentication Scheme Preserving User Anonimity," IEEE AINA'05, Vol. 2, pp. 245- 248, 2005
|
6 |
A. Sahai and B. Waters, "Fuzzy identity based encryption", In Eurocrypt 2005, 2005
|