1 |
T.L. Chun, C.L. Cheng, "A ROBUST REMOTE USER AUTHENTICATION SCHEME USING SMART CARD", Information Technology and Control, Vol.40, No.3, pp.236-245, 2011.
|
2 |
L. Lamport, "Password authentication with insecure communication" Communications of ACM. Vol 24, Issue 12, pp.770-772, 1981.
DOI
ScienceOn
|
3 |
M.S. Hwang, L.H. Li, "A new remote user authentication scheme using smart cards" IEEE Transactions on consumer Electronics, Vol.46, No.1, pp.28-30, 2000.
DOI
ScienceOn
|
4 |
H.M. Sun, "An efficient remote use authentication scheme using smart cards", IEEE Transactions on consumer Electronics, Vol 46, No.4, pp.958-961, 2000.
DOI
ScienceOn
|
5 |
H.Y. Chien, J.K. Jan, Y.M. Tseng, "An efficient and practical solution to remote authentication: smart card", Computers & Security, Vol.21, No.4, pp.372-375, 2002.
DOI
ScienceOn
|
6 |
W.C. Ku, S.M. Chen, "Weaknesses and Improvements of an Efficient Password Based Remote User Authentication Scheme Using Smart Card", IEEE, Transaction on consumer Electronics, Vol.50, No.1, pp.201-207, 2004.
|
7 |
E.J. Yoon, E.K.. Rye, K.Y. Yoo. "Further Improvement of an Efficient Password Based Remote User Authentication Scheme Using Smart Card", IEEE Transaction on Consumer Electronics, Vol.50, No.2, pp.612-614, 2004.
DOI
ScienceOn
|
8 |
N.Y. Lee, Y.C. Chiu, "Improved remote authentication scheme with smart card", Computer Standards & Interfaces 27, pp.177-180, 2005.
DOI
ScienceOn
|
9 |
X.M Wang, W.F. Zhang, J.S. Zhang. M.K. Khan, "Cryptanalysis and improvement on two efficient remote", computer Standards & Interface 29, pp.507-512, 2007.
DOI
ScienceOn
|
10 |
T.H Chen, H.C. Hsiang, W.K. Shih, "Security enhancement on an improvement on two remote user authentication schemes using smart cards", Future Generation computer Systems 27, pp.377-380, 2011.
DOI
ScienceOn
|