1 |
M. Kim and C. K. Koc, "Asimple attackon a recently introduced hash-based strong-password authentication scheme," International Journal of Network Security, vol. 1, no. 2, pp. 77-80, 2005.
|
2 |
A. K. Das, "Analysis and improvement on an efficient biometric based remote user authentication scheme using smart cards," IET Information Security, vol. 5, no. 3, pp. 145-151, 2011.
DOI
|
3 |
C. T. Li, "An enhanced remote user authentication scheme providing mutual authentication and key agreement with Smart Cards," in Proceedings of the 5th International IEEE Computer Society Conference on Information Assurance and Security, pp. 517-520, Xi'an, China, 2009.
|
4 |
L. Jiping, D. Yaoming, X. Zenggang, and L, Shouyin, "An improved biometric-based user authentication scheme for C/S system," International Journal of Distributed Sensor Networks, 2014.
|
5 |
Younsung Choi, et al. "Cryptanalysis of Improved Biometric-Based User Authentication Scheme for C/S System", International Journal of Information and Education Technology, vol. 5, no.7, 2015
|
6 |
N.Y. Lee and Y.C. Chiu, "Improved remote authentication scheme with smart card," Computer Standards and Interfaces, pp. 177-180, 2005.
|
7 |
P. Kocher, J. Jaffe, B. Jun, "Differential power analysis," in Proc. The 19th Annual International Cryptology Conference on Advances in Cryptology, 1999, pp. 388-397.
|
8 |
Seung-Cheol Lim, " A Real-Time Intrusin Detection based on Monitoring in Network Security", Journal of the institute of Inernet, Broadcasting and Comm, vol. 13, issue 3, pp.9-15, Jun. 2013.
|
9 |
J. Nam, K. K. R. Choo, M. Kim, J. Paik and D. Won, "Dictionary Attacks against Password-Based Authenticated Three- Party Key exchange protocols," KSII Transactions on Internet and Information Systems, vol. 7, no. 12, 2013, pp. 3244-3260.
DOI
|