共 25 条
[1]
Chen B.L., Kuo W.C., Wuu L.C., A secure password-based remote user authentication scheme without smart cards [J], Information Technology and Control, 41, 1, pp. 53-59, (2012)
[2]
Chang C.C., Hwang S.J., Using smart cards to authenticate remote passwords [J], Computers & Mathematics with Applications, 26, 7, pp. 19-27, (1993)
[3]
Li C.T., Secure smart card based password authentication scheme with user anonymity [J], Information Technology and Control, 40, 2, pp. 157-162, (2011)
[4]
Yoon E.J., Ryu E.K., Yoo K.Y., Further improvement of an efficient password based remote user authentication scheme using smart cards [J], IEEE Transactions on Consumer Electronics, 50, 2, pp. 612-614, (2004)
[5]
Kumar M., New remote user authentication scheme using smart cards [J], IEEE Transactions on Consumer Electronics, 50, 2, pp. 597-600, (2004)
[6]
Sun H.M., An efficient remote user authentication scheme using smart cards [J], IEEE Transactions on Consumer Electronics, 46, 4, pp. 958-961, (2000)
[7]
Xu J., Zhu W.T., Feng D.G., An Improved smart card based password authentication scheme with provable security [J], Computer Standards & Interfaces, 31, 4, pp. 723-728, (2009)
[8]
Xie Q., Improvement of a security enhanced one-time two-factor authentication and key agreement scheme [J], Scientia Iranica, 19, 6, pp. 1856-1860, (2012)
[9]
Nose P., Security weaknesses of authenticated key agreement protocols [J], Information Processing Letters, 111, 14, pp. 687-696, (2011)
[10]
Kocher P., Jaffe J., Jun B., Differential power analysis [C], Proceedings of Advances in Cryptology, pp. 388-397, (1999)