1 |
M. Scott, 'Cryptanalysis of an ID-based Password Authentication Scheme using Smart Cards and Fingerprints,' Cryptology ePrint Archive : Report 2004/017, http://eprint.iacr.org/2004/017, 2004
|
2 |
S. J. Wang and J. F. Chang, 'Smart card based secure authentication scheme,' Computers and Security, Vol.15, No.3, pp.231 -237, 1996
DOI
ScienceOn
|
3 |
W. H. Yang and S. P. Shieh, 'Password authentication schemes with smart cards,' Computers and Security, Vol.18, No.8, pp.727-733, 1999
DOI
ScienceOn
|
4 |
H. S. Kim, S. W. Lee, and K. Y. Yoo, 'ID-based Password Authentication Scheme using Smart Cards and Fingerprints,' ACM Operating Systems Review, pp.32-41, 2003
DOI
|
5 |
S. Tsujii and K. Kurosawa, 'ID-based cryptosystem,' ISEC89-51, pp.25-31, 1989
|
6 |
A. Shamir, 'Identity-based cryptosystems and signature schemes,' CRYPTO'84., pp.47-53, 1985
|
7 |
E. Okamoto and K. Tanaka, 'Key distribution system based on identification information,' Proc. GLOBECON'87, pp.108-111, 1987
|
8 |
S. P. Shieh, W. H. Yang, and H. M. Sun, 'An authentication protocol without trusted third party,' IEEE Commun. Lett., Vol.1, pp.87-89, 1997
DOI
ScienceOn
|
9 |
S-M. Yen, 'Cryptanalysis of an authentication and key distribution protocol,' IEEE Commun Lett., Vol.3, pp.7-8, 1999
DOI
ScienceOn
|
10 |
Diffie W. and Hellman M. E., 'New directions in cryptography,' IEEE Trans., IT-22, No.6, pp.644-654, 1976
DOI
|