1 |
C.H. Liao, H.C. Chen, C.T. Wang, "An Exquisite Mutual Authentication Schemes with Key Agreement Using Smart Card," Informatica, vol. 33, no. 2, pp. 125-132, May. 2009.
|
2 |
W.S. Juang, "Efficient password authenticated key agreement using smart cards," Computer & Security, vol. 23, no. 2, pp. 167-173, Mar. 2004.
DOI
ScienceOn
|
3 |
S.W. Lee, H.S. Kim, K.Y. Yoo, "Comment on 'A Remote User Authentication Scheme using Smart Cards with Forward Secrecy'," In IEEE Transaction on Consumer Electronics, vol. 50, no. 2, pp. 576-577, May. 2004.
DOI
ScienceOn
|
4 |
Y.P. Liao, S.S. Wang, "A secure dynamic ID based remote user authentication scheme for multi-server environment," Computer Standards & Interface, vol. 31, no. 1, pp. 24-29, Jan. 2009.
DOI
ScienceOn
|
5 |
C. Chen, D. He, S. Chan, J. Bu, Y. Gao, R. Fan, "Lightweight and provably secure user authentication with anonymity for the global mobility network," International Journal of Communication Systems, vol. 24, no. 3, pp. 347-362, Mar. 2011.
|
6 |
S.B. Shin, H.J. Yeh, K.H. Kim, K.S. Kim, "A Remote User Authentication Scheme with Anonymity for Mobile Devices," International Journal of Advanced Robotic Systems, vol. 9, pp. 1-7, Apr. 2012.
DOI
|
7 |
D. He, S, Chan, C. Chen, J. Bu, R. Fan, "Design and validation of an efficient authentication scheme with anonymity for roaming service in global mobility networks," Wireless Personal Communications, vol. 61, no. 2, pp. 465-476, Nov. 2011.
DOI
|
8 |
J. Xu, W.T. Zhu, D.G, Feng, "An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks," Computer Communications, vol. 34, no. 3, pp. 319-325, Mar. 2011.
DOI
ScienceOn
|
9 |
Z.J. Tzeng, W.G. Tzeng, "Authentication of mobile users in third generation mobile systems," Wireless Personal Communications, vol. 16, no. 1, pp. 35-50, Jan. 2011.
|
10 |
J. Zhu, J. Ma, "A new authentication scheme with anonymity for wireless environments," IEEE Transactions on Consumer Electronics, vol. 50, no. 1, pp. 231-235, Feb. 2004.
DOI
ScienceOn
|
11 |
J.S. Moon, I.Y. Lee, "An AAA scheme using ID-based ticket with anonymity in future mobile communication," Computer Communications, vol 34, no 3, pp. 295-304, Mar. 2011.
|
12 |
J.H. Park, "An authentication protocol offering service anonymity of mobile device in ubiquitous environment," The Journal of Supercomputing, vol 62, no 1, pp. 105-117, Oct. 2012.
DOI
|
13 |
S.B. Shin, H.J. Yeh, K.S. Kim, "A Ticket based Authentication Scheme for Group Communication," In Proceedings of The 2012 International Conference on Information Security and Assurance, pp. 152-155, Apr. 2012.
|
14 |
L. Lamport, "Password authentication with insecure communication," Communications of the ACM, vol. 24, no. 11, pp. 770-772, Nov. 1981.
DOI
ScienceOn
|