共 97 条
- [1] Bergamo P.(2005)Security of public-key cryptosystems based on Chebyshev polynomials IEEE Trans. Circuits Syst. I, Regul. Pap. 52 1382-1393
- [2] D’Arco P.(1989)A logic of authentication Proc. R. Soc. Lond. Ser. A, Math. Phys. Sci. 426 233-271
- [3] De Santis A.(1993)Using smart cards to authenticate remote passwords Comput. Math. Appl. 26 19-27
- [4] Kocarev L.(1976)New directions in cryptography IEEE Trans. Inf. Theory 22 644-654
- [5] Burrows M.(2009)Chaotic map based key agreement with/out clock synchronization Chaos Solitons Fractals 39 1283-1289
- [6] Abadi M.(2012)Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol Nonlinear Dyn. 69 1149-1157
- [7] Needham R.M.(2011)A strong user authentication scheme with smart cards for wireless communications Comput. Commun. 34 367-374
- [8] Chang C.-C.(2012)Note on design of improved password authentication and update scheme based on elliptic curve cryptography Math. Comput. Model. 55 1661-1664
- [9] Hwang S.-J.(2000)A new remote user authentication scheme using smart cards IEEE Trans. Consum. Electron. 46 28-30
- [10] Diffie W.(2009)A distributed active-vision network-space approach for the navigation of a car-like wheeled robot IEEE Trans. Ind. Electron. 56 846-855