|
Reference
[1] PURDY, George B. A high security log-in procedure. Communications of the ACM, 1974, 17.8: 442-445. [2] LAMPORT, Leslie. Password authentication with insecure communication. Communications of the ACM, 1981, 24.11: 770-772. [3] EVANS JR, Arthur; KANTROWITZ, William; WEISS, Edwin. A user authentication scheme not requiring secrecy in the computer. Communications of the ACM, 1974, 17.8: 437-442. [4] WILKES, Maurice Vincent. Time-sharing computer systems. 1972. [5] HARN, Lein; HUANG, D.; LAIH, C. S. Password authentication using public-key cryptography. Computers & Mathematics with Applications, 1989, 18.12: 1001-1017. [6] HWANG, Tai-Yang. Password authentication using public-key encryption. In: Proc. of international Carnahan Conference on Security Technology. 1983. p. 35-38. [7] LENNON, R.; MATYAS, S.; MEYER, C. Cryptographic authentication of time-invariant quantities. IEEE Transactions on Communications, 1981, 29.6: 773-777. [8] EREN, Halit. Wireless sensors and instruments: networks, design, and applications. CRC Press, 2005. [9] HUURDEMAN, Anton A. The worldwide history of telecommunications. John Wiley & Sons, 2003. [10] SAUTER, Martin. From GSM to LTE: an introduction to mobile networks and mobile broadband. John Wiley & Sons, 2010. [11] RABIN, Michael O. How to Exchange Secrets with Oblivious Transfer. 1981. [12] EVEN, Shimon; GOLDREICH, Oded; LEMPEL, Abraham. A randomized protocol for signing contracts. Communications of the ACM, 1985, 28.6: 637-647. [13] CHANDRA, Sourabh, et al. A study and analysis on symmetric cryptography. In: Science Engineering and Management Research (ICSEMR), 2014 International Conference on. IEEE, 2014. p. 1-8. [14] BENNETT, Charles H., et al. Practical quantum oblivious transfer. In: Annual International Cryptology Conference. Springer, Berlin, Heidelberg, 1991. p. 351-366. [15] CRÉPEAU, Claude. Quantum oblivious transfer. Journal of Modern Optics, 1994, 41.12: 2445-2454. [16] CRÉPEAU, Claude; KILIAN, Joe. Achieving oblivious transfer using weakened security assumptions. In: Foundations of Computer Science, 1988., 29th Annual Symposium on. IEEE, 1988. p. 42-52. [17] CRÉPEAU, Claude. Efficient cryptographic protocols based on noisy channels. In: International Conference on the Theory and Applications of Cryptographic Techniques. Springer, Berlin, Heidelberg, 1997. p. 306-317. [18] CACHIN, Christian; CRÉPEAU, Claude; MARCIL, Julien. Oblivious transfer with a memory-bounded receiver. In: Foundations of Computer Science, 1998. Proceedings. 39th Annual Symposium on. IEEE, 1998. p. 493-502. [19] CHANG, C. C. Computer cryptography and information security. Sung-Kang, Taipei, 1989. [20] JOBUSCH, David L.; OLDEHOEFT, Arthur E. A survey of password mechanisms: Weaknesses and potential improvements. part 1. Computers & Security, 1989, 8.7: 587-604. [21] JOBUSCH, David L.; OLDEHOEFT, Arthur E. A survey of password mechanisms: Weaknesses and potential improvements. Part 2. Computers & Security, 1989, 8.8: 675-689. [22] DIFFIE, Whitfield; HELLMAN, Martin. New directions in cryptography. IEEE transactions on Information Theory, 1976, 22.6: 644-654. [23] HWANG, Tai-Yang. Password authentication using public-key encryption. In: Proc. of international Carnahan Conference on Security Technology. 1983. p. 35-38. [24] LAIH, C. S.; HARN, L.; HUANG, D. Password authentication using quadratic residues. In: Proc. 1988 Int. Computer Symp. 1988. p. 1484-1489. [25] LIAW, Horng-Twu. Password authentications using triangles and straight lines. Computers & Mathematics with Applications, 1995, 30.9: 63-71. [26] Chang, Chin-Chen, and H. T. Liaw. "Sharing a polynomial for password authentication." J. Comput 1.4 (1989): 11-17. [27] LIN, Chu-Hsing, et al. Password authentication using Newton''s interpolating polynomials. Information Systems, 1991, 16.1: 97-102. [28] KUMAR, K. Phani, et al. Mutual authentication and key agreement for GSM. In: Mobile Business, 2006. ICMB''06. International Conference on. IEEE, 2006. p. 25-25. [29] BROOKSON, Charles. GSM (and PCN) Security and Encryption. Papers on mobile security,< http://www. brookson. com/gsm/gsmdoc. pdf>(10 June 2014), 1994. [30] GSM Security, http://www.gsm-security.net/. [31] HARN, L.; LIN, H. Y. Noninteractive oblivious transfer. Electronics Letters, 1990, 26.10: 635-636. [32] RESCORLA, Eric. Diffie-hellman key agreement method. 1999. [33] TSENG, Wei-Cheng, et al. A Study on Oblivious Transfer Protocols. 2000, 1-55. [34] CHEN, Li-Ting, and TU, Shih-Hsiung. GSM無線通訊認證協定之改進機制. 2018全國資訊安全會議暨資安產業技術研討會, 2018, 1-3. [35] CHEN, Li-Ting, and TU, Shih-Hsiung. 改良型通行碼應用架構. 2018全國資訊安全會議暨資安產業技術研討會, 2018, 1-3.
|