1 |
K. C. Leung, L. M. Cheng, A. S. Fong, C. K. Chan, Cryptanalysis of a modified remote user authentication scheme using smart cards, IEEE Transactions on Consumer Electronics 49 (4) (2003), 1243-1245.
DOI
ScienceOn
|
2 |
J. J. Shen, C. W. Lin, M. S. Hwang, A modified remote user authentication scheme using smart cards, IEEE Transactions on Consumer Electronics 49 (2) (2003), 414-416.
DOI
ScienceOn
|
3 |
B. Wang, Z.-Q. Li, A forward-secure user authentication scheme with smart cards, International Journal of Network Security 3 (2) (2006), 116-119.
|
4 |
B. W. Lampson, Protection, ACM Operating Systems Review 8 (1) (1974), 18-24.
DOI
|
5 |
R. Sandhu, P. Samarati, Access control: principles and practice, IEEE Communications 32 (2) (1994), 40-48.
|
6 |
N. Y. Lee, Integrating access control with user authentication using smart cards, IEEE Transactions on Consumer Electronics, 46 (4) (2000), 943-948.
DOI
ScienceOn
|
7 |
H. Y. Chien, J. K. Jan, An integrated user authentication and access control scheme without public key cryptography, Proceedings of IEEE 37th Annual International Carnahan Conference on Security Technology (2003), 137-143.
|
8 |
Y. Chen, L. Yeh, An efficient authentication and access control scheme using smart cards, Proceedings of 11th International Conference on Parallel and Distributed Systems (2005), 78-82.
|
9 |
J. K. Jan, Y. M. Tseng, Two integrated schemes of user authentication and access control in a distributed computer network, IEE Proceedings of Computers and Digital Techniques 145 (6) (1998), 419-424.
|
10 |
X. Chengqiang, Z. Zhenli, An integrated one-timepassword and access control authentication scheme, IEEE Proceedings of 3rd International Conference on Computer Science and Information Technology (2010), 252-254.
|
11 |
J. Jeong, M. Chung, H. Choo, Integrated OTP-based user authentication and access control scheme in home networks, Lecture Notes in Computer Science 4773 (2007), 123-133.
|
12 |
L. Lamport, Password authentication with insecure communication, CACM 24 (1981), 770-772.
DOI
ScienceOn
|
13 |
X. Tian, R. Zhu, D. Wong, Improved efficient remote user authentication schemes, International Journal of Network Security 4 (2) (2007), 149-154.
|
14 |
R. R. Ahirwal, Y. K. Jain, An efficient smart card based remote user authentication scheme using hash function, Proceedings of 2012 IEEE Students' Conference on Electrical, Electronics and Computer Science (2012), 1-4.
|
15 |
M. Kumar, An enhanced remote user authentication scheme with smart card, International Journal of Network Security 10 (3) (2010), 175-184.
|
16 |
D. Wang, C. Ma, P, Wu, Secure password-based remote user authentication scheme with non-tamper resistant smart cards, Lecture Notes in Computer Science 7371 (2012), 114-121.
DOI
ScienceOn
|
17 |
C. L. Hsu, Security of Chien et al.'s remote user authentication scheme using smart cards, Computer Standards and Interfaces 26 (3) (2004), 167-169.
DOI
ScienceOn
|
18 |
S. W. Lee, H. S. Kim, K. Y. Yoo, Improvement of Chien et al.'s remote user authentication scheme using smart cards, Computer Standards and Interfaces 27 (2005), 181-183.
DOI
ScienceOn
|