|
[1] "Gnu multiple precision arithmetic library," http://www.swox.com/gmp/. [2] "Secure hash standard," U.S. Federal Information Processing Standard (FIPS) 180-1, NIST, 1995. [3] S. Berkovits, "How to broadcast a secret," in Proceedings of Advances in Cryptology-EUROCRYPT 1991, pp. 535-541, 1991. [4] R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naor, and B. Pinkas, "Multicast security: A taxonomy and some efficient constructions," in Proceedings of IEEE Infocom 1999, pp. 708-716, 1999. [5] R. Canetti, T. Malkin, and K. Nissim, "Efficient communication-storage tradeoffs for multicast encryption," in Proceedings of Advances in Cryptology-EUROCRTPT 1999, pp. 459-474, 1999. [6] C. C. Chang and T. C. Wu, "Remote password authentication with smart card," IEE proceedings - Computers and Digital Techniques, vol. 138, no. 3, pp. 165-168, 1991. [7] H. Y. Chien, J. K. Jan, and Y. M. Tseng, "An e±cient and practical solution to remote authentication: Smart card," Computers & Security, vol. 21, no. 4, pp. 372-375, 2002. [8] W. Diffee and M. E. Hellman, "New directions in cryptography," IEEE Transactions on Information Theory, vol. IT-22, no. 6, pp. 644-654, 1976. [9] A. Fiat and M. Naor, "Boradcast encryption," in Proceedings of Advances in Cryptology-CRYPTO 1992, pp. 480-491, 1992. [10] C. L. Hsu, "Security of chien et al.'s remote user authentication scheme using smart cards," Computer Standards and Interfaces, vol. 26, no. 3, pp. 167-169, 2004. [11] K. F. Hwang and C. C. Chang, "A self-encryption mechanism for authentication of roaming and teleconference services," IEEE Transactions on Wireless Communications, vol. 2, no. 2, pp. 400-407, 2003. [12] M. S. Hwang and L. H. Li, "A new remote user authentication scheme using smart cards," IEEE Transactions on Consumer Electronics, vol. 46, no. 1, pp. 28-30, 2000. [13] L. Lamport, "Password authentication with insecure communication," Communications of the ACM, vol. 24, pp. 770{772, 1981. [14] S. W. Lee, H. S. Kim, and K. Y. Yoo, "Improvement of chien et al.'s remote user authentication scheme using smart cards," Computer Standards and Interfaces, vol. 27, no. 2, pp. 181-183, 2005. [15] T. F. Lee, T. Hwang, and C. L. Lin, "Enhanced three-party encrypted key exchange without server public keys," Computers & Security, vol. 23, no. 7, pp. 571-577, 2004. [16] C. L. Lin, H. M. Sun, and T. Hwang, "Three-party encrypted key exchange: Attacks and a solution," ACM Operating Systems Review, vol. 34, no. 4, pp. 12-20, 2000. [17] C. L. Lin, H. M. Sun, M. Steiner, and T. Hwang, "Three-party encrypted key exchange without server public-keys," IEEE Communications Letters, vol. 5, no. 12, pp. 497-499, 2001. [18] H. Lu, "A novel high-order tree for secure multicast key management," IEEE Transactions on Computers, vol. 54, no. 2, pp. 214-224, 2005. [19] S. Mittra, "Iolus: A framework for scalable secure multicasting," in Proceedings of ACM SIGCOMM 1997, pp. 277-288, 1997. [20] M. J. Moyer, J. R. Rao, and P. Rohatgi, "A surevey of security issues in multicast communications," pp. 12-23, Nov/Dec 1999. [21] J. Nam, S. Kim, and D. Won, "Attack on the sun-chen-hwang's three-party key agreement protocols using passwords," IEICE Transactions on Fundamentals, vol. E89-A, no. 1, pp. 209-212, 2006. [22] D. Naor, M. Naor, and J. B. Lotspiech, "Revocation and tracing schemes for stateless receivers," in Proceedings of Advances in Cryptology-CRYPTO 2001, pp. 41-62, 2001. [23] R. Nojima and Y. Kaji, "Using trapdoor permutations in a complete subtree method for broadcast encryption," IEICE Transactions on Fundamentals, vol. E88-A, no. 2, pp. 568-574, 2005. [24] R. Rivest. "The md5 message-digest algorithm,". RFC 1321, IETF, 1992. [25] B. Schneier, Applied Cryptography, Jon Wiley & Sons, Inc., New York, USA, 2nd edition. [26] M. Steiner, G. Tsudik, and M. Waidner, "Re¯nement and extension of encrypted key exchange," ACM Operating Systems Review, vol. 29, no. 3, pp. 22-30, 1995. [27] D. R. Stinson, Cryptography: Theory and Practice, CRC Press, Boca Ration, Florida, USA, 2nd edition. [28] H. M. Sun, "An efficient remote user authentication scheme using smartcards," IEEE Transactions on Consumer Electronics, vol. 46, no. 4, pp. 958-961, 2000. [29] H. M. Sun, B. C. Chen, and T. Hwang, "Secure key agreement protocols for three-party against guessing attacks," The Journal of Systems and Software, vol. 75, pp. 63-68, 2005. [30] P. Syverson, "A taxonomy of replay attacks," in Proceedings of IEEE Computer Security Foundations Workshop VII, Franconia, New Hampshire, USA, pp. 187-191, 1994. [31] K. Tan and H. Zhu, "Remote password authentication scheme based on cross-product," Computer Communications, vol. 22, no. 4, pp. 390-393, 1999. [32] D. M. Wallner, E. J. Harder, and R. C. Agee. "Key management for multicast: Issues and architectures,". RFC 2627, IETF, 1999. [33] S. J. Wang and J. F. Chang, "Smart card based secure password authentication scheme," Computers & Security, vol. 15, no. 3, pp. 231-237, 1996. [34] C. K. Wong, M. Gouda, and S. S. Lam, "Secure group communication using key graphs," IEEE/ACM Transactions on Networking, vol. 8, no. 1, pp. 16-30, 2000. [35] T. C. Wu, "Remote login authentication scheme based on a geometric approach," Computer Communications, vol. 18, no. 12, pp. 959-963, 1995. [36] W. H. Yang and S. P. Shieh, "Password authentication schemes with smart cards," Computers & Security, vol. 18, no. 8, pp. 727-733, 1999. [37] W. T. Zhu, "Optimizing the tree structure in secure multicast key management," IEEE Communication Letters, vol. 9, no. 5, pp. 477-479, 2005.
|