|
[1] W. W. Adams and L. J. Goldstein, Introduction to Number Theory, Englewood Cliffs, N.J.: Prentice-Hall, 1976. [2] S. Bellovin and M. Merritt, “Encrypted key exchange: Password-based protocols secure against dictionary attacks,” Proceedings of the IEEE Symposium on Research in Security and Privacy, pp. 72-84, May 1992. [3] C. K. Chan and L. M. Cheng, “Remarks on Wang-Chang’s password authentication scheme,” IEE Electronics Letters, Vol. 37, No. 1, Jan. 2001. [4] C. C. Chang and S. J. Hwang, “Using smart cards to authenticate remote passwords,” Computers and Mathematical Applications, Vol. 26, No. 7, pp. 19-27, 1993. [5] C. C. Chang and T. C. Wu, “Remote password authentication with smart cards,” IEE Proceeding-E, Vol. 138, No. 3, pp. 165-168, 1991. [6] A. Jr Evans, W. Kantrowitz and E. Weiss, “A user authentication system not requiring secrecy in the computer,” Communications of the ACM, Vol. 17, pp. 437-442, 1974. [7] G. Horng and C. S. Yang, “Key authentication scheme for cryptosystems based on discrete logarithm,” Computer Communications 19, 848-850, 1996. [8] M. S. Hwang, “A remote password authentication scheme based on the digital signature method,” International journal of Computer Mathematics, Vol. 70, pp. 657-666, 1999. [9] M. S. Hwang, “Cryptanalysis of a remote login authentication scheme,” Computer Communication, Vol. 22, No. 8, pp. 742-744, 1999. [10] M. S. Hwang and L. H. Li, “A new remote user authentication scheme using smart cards,’’ IEEE Transactions on Consumer Electronics, Vol. 46, No. 1, pp. 28-30, Feb. 2000. [11] T. Hwang, Y. Chan and C. S. Laih, “Non-interactive password authentications without password tables,” IEEE Region 10 Conference on Computer and Communication Systems, IEEE Computer Society, 1990, pp. 429-431. [12] D. Jablon, “Strong password-only authenticated key exchange,” ACM Computer Communications Review, Vol. 20, No. 5, pp. 5-26, October 1996. [13] A. Kehne, J. Schonwalder and H. Langendorfer, “A nonce-based protocol for multiple authentication,” ACM Operating Systems Review, Vol. 26, No. 4, pp. 84-89, Oct. 1992. [14] J. Kohl and C. Neuman, “The Kerberos network authentication service (V5),” Internet RFC 1510, Sep. 1993. [15] T. Kwon and J. Song, “Efficient key exchange and authentication protocols protecting weak secrets,” IEICE Trans. Fundamentals, Vol. E81-A, No. 1, pp. 156-163, Jan. 1998. [16] L. Lamport, “Password authentication with insecure communication,” Communications of ACM, Vol. 24, pp. 28-30, 1981. [17] R. E. Lennon, S. M. Matyas and C. H. Meyer, “Cryptographic authentication of time-invariant quantities,” IEEE Transactions on Communications, COM-29, No. 6, pp. 773-777, 1981. [18] G. Li, M. A. Lomas, R. M. Needham and J. H. Saltzer, “Protecting poorly chosen secrets from guessing attacks,” IEEE Journal on Selected Areas in Communications 11 (5) (1993). [19] E. Okamoto and K. Tanaka, “Identity-based information security management system for personal computer networks,” IEEE Journal on Selected Areas in Communications, Vol. 7, No. 2, pp. 290-294, Feb. 1989. [20] P. Peyret, G. Lisimaque and T. Y. Chua, “Smart cards provide very high security and flexibility in subscribers management,” IEEE Transactions on Consumer Electronics, Vol. 36, No. 3, pp. 744-753, 1990. [21] R. L. Rivest, A. Shamir and L. Adleman, “A method for obtaining digital signature and public-key cryptosystem,” Communications of the ACM, Vol. 21, No. 2, pp. 120-126, 1978. [22] M. Sandirigama, A. Shimizu and M. T. Noda, “Simple and secure password authentication protocol,” IEICE Trans. Commun., Vol.E83-B, No. 6, June. 2000. [23] A. Shamir, “Identity-based cryptosystems and signature schemes,” Proceedings CRYPTO’84, pp. 47-53, Springer, Berlin, 1985. [24] S. P. Shieh and W. H. Yang, “An authentication and key distribution system for open network system,” ACM Operating Systems Review, Vol. 30, No. 2, pp. 32-41, 1996. [25] S. P. Shieh, W. H. Yang and H. M. Sun, “An authentication protocol without trusted third party,” IEEE Communications Letters, Vol. 1, No. 3, May. 1997. [26] H. M. Sun, “An efficient remote use authentication scheme using smart cards,” IEEE Transactions on Consumer Electronics, Vol. 46, No. 4, November, 2000, pp. 28-30. [27] S. J. Wang and J. F. Chang, “Smart card based secure password authentication scheme,” Computers and Security, Vol. 15, No. 3, pp. 231-237, 1996. [28] T. C. Wu, “Remote login authentication scheme based on a geometric approach,” Computer Communications, Vol. 18, No. 12, pp. 959-963, 1995. [29] W. H. Yang and S. P. Shieh, “Password Authentication Schemes with Smart Cards,” Computers & Security, Vol.18, No8, pp.727-733, 1999. [30] B. Zhan, Z. Li, Y. Yang and Z. Hu, “On the security of HY-key authentication scheme,” Computer Communication 22 (1999) 739-741.
|