共 19 条
[1]
Chen B.L., Kuo W.C., Wuu L.C., Robust smart-card-based remote user password authentication scheme, International Journal of Communication Systems, 27, 27, pp. 377-389, (2014)
[2]
Chen C., Lightweight and provably secure user authentication with anonymity for the global mobility network, International Journal of Communication Systems, 24, 3, pp. 347-362, (2011)
[3]
Fu Z.J., Ren K., Shu J.G., Sun X.M., Huang F.X., Enabling personalized search over encrypted outsourced data with efficiency improvement, IEEE Transactions on Parallel and Distributed Systems, 27, 9, pp. 2546-3255, (2015)
[4]
Lamport L., Password authentication with insecure communication, Communications of The ACM, 24, 11, pp. 770-772, (1981)
[5]
Lee S.W., Kim H.S., Yoo K.Y., Improvement of Chien et al.'s remote user authentication scheme using smart cards, Computer Standards and Interfaces, 27, 2, pp. 181-183, (2005)
[6]
Lei M., Xiao Y., Vrbsky S.V., Li C.-C., Virtual password using random linear functions for on-line services, ATMs, and pervasive computing, Elsevier Journal of Computer Communications, 31, 18, pp. 4367-4375, (2008)
[7]
Lei M., Xiao Y., Vrbsky S.V., Li C.-C., Liu L., A virtual password scheme to protect passwords, Proc. of IEEE ICC, pp. 1536-1540, (2008)
[8]
Li F., Xin X., Hu Y., ID-based threshold proxy signcryption scheme from bilinear pairings, International Journal of Security and Networks, 3, 3, pp. 206-215, (2008)
[9]
Madhusudan R., Valiveti A., Cryptanalysis of remote user authentication scheme with key agreement, International Conference on. IEEE Computer, Communications, and Control Technology (I4CT'15), pp. 476-480, (2015)
[10]
Messerges T.S., Dabblish E.A., Sloan R.H., Examining smart-card security under the threat of power analysis attacks, IEEE Transactions on Computers, 51, 5, pp. 541-552, (2002)