1 |
J. Xu, W. T Zhu, D.G. Feng, "An improved smart card based password authentication scheme with provable security," Computers Standards & Interfaces, 31, pp. 723-728, 2009.
DOI
|
2 |
P. Kocher, J. Jaffe, B. Jun, "Differential power analysis," Proceedings of Advances in Cryptology (CRYPTO 99), pp. 388-398, 1999.
|
3 |
T. S, Messerges, E. A, Dabbish, R. H. Sloan, "Examining smart-cards security under the threat of power analysis attacks," IEEE Transactions on Computers, 51(5), pp. 541-552, 2002.
DOI
|
4 |
L. Lamport, "Password authentication with insecure communication," Communication of the ACM, 24(11), pp. 770-772, 1981.
DOI
|
5 |
C. C Chang, T .C. Wu, "Remote password authentication with smart cards," IEEE Proceedings-E, 138(3), pp. 165-168, 1991.
DOI
|
6 |
M. S. Hwang, L .H. Li, "A New remote user authentication schemes using smart card," IEEE Trans. Consum. Electronics, 46(1), Feb. 2000.
|
7 |
Young-Hwa. An, "A Study on the user Authentication Scheme with Forward Secrecy", Journal of the Korea Society of Computer and Information, Vol. 16, No. 2, pp. 183-191, 2011.
과학기술학회마을
DOI
|
8 |
J .J. Shen, C. W. Cheng, and M. S Whang, "A modified remote user authentication schemes using smart card," IEEE Trans. Consum. Electron, 46(2), pp. 414-416. 2003.
|
9 |
Zuhua Shao, "Efficient deniable authentication protocol based on generalized ElGamal signature scheme," Computer Standards & Interfaces, Article in press, Dec. 2003.
|
10 |
B. Wang, Z. Q. Li, "A Forward-secure User Authentication scheme with smart cards," International Journal of Network Security, Vol. 3, No. 2, pp. 116-119. 2006.
|