[1]Leslie Lamport, “Password authentication with insecure communications.” Communication of ACM, vol. 24, pp. 770-772, Nov. 1981.
[2]Lein Harn, D. Huang, C,-S. Laih, “Password authentication using public-key cryptography.” Computer Mathematics with Application, vol. 18, No. 12, pp. 1001-1017, 1989.
[3]Chin-Chen Chang, Ling-Hua Wu, “Sharing a polynomial for password authentication.” Journal of Computers, R.O.C., vol. 1, No.4, pp. 11-17, 1989.
[4]G. Horng, “Password authentication without using password table.” Information Processing Letters, vol. 55, pp.247-250, 1995.
[5]J. K. Jan, Y. Y. Chen, “Paramita wisdom’ password authentication scheme without verification tables.” The Journal of Systems and Software, vol. 42, pp. 45-57, 1998.
[6]H.-Y. Chien, J.-K. Jan, Y.-M. Tseng, “A modified remote log in authentication scheme based on geometric approach.” Journal of System and Software, vol. 55, pp.287-290, 2001.
[7]Cheng-Chi Lee, Li-Hua Li, Min-Shiang Hwang, “A remote user authentication scheme using hash functions.” ACM Operating Systems Review, vol.36, No. 4, pp.23-29, 2002.
[8]Chien H, Jan J, Tseng Y, “An efficient and practical solution to remote authentication:smart card.” Computer and Security, vol. 21, No. 4, pp. 372-375, 2002.
[9]Hsu CL, “Security of Chien et al’s remote user authentication scheme using smart card.” Computer Standards and Interfaces, vol. 26, pp.167-169, 2004
[10]Wen-Shenq Juang, “Efficient password authenticated key agreement using smart cards.” Computer and Security, vol. 23, No. 2, pp. 167-173, 2004.
[11]Wen-Gong Shieh, Jian-Ming Wang, “Efficient remote mutual authentication and key agreement.” Computers and Security, vol 25, No.1, pp.72-77, 2006.
[12]Sung-Woon Lee, Hyun-Sung Kim, Kee-Young Yoo, “Efficient nonce-based remote user authentication scheme using smart cards.” Applied Mathematics and Computation, vol. 167, pp.355-361, 2005.
[13]X. Y. Wang, D. G. Feng, X. J. Lai, and H. B. Yu, ”Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD. ” Rump session of Crypto’04 and IACR Eprint archive, August 2004.
[14]Xiaoyun Wang, Hongbo Yu , “How to Break MD5 and Other Hash Functions.” Advances in Cryptology – EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005.
[15]Xiaoyun Wang, Yiqun Lisa Yin, Hongbo Yu, “Fing collision in the full SHA-1.” Advances in Cryptology – CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005.
[16]C. C. Chang, T. C. Wu, “Remote password authentication with smart cards.” IEEE Proceedings 138, pp.165-168, 1991.
[17]C. C. Chang, W. Y. Liao, “A remote password authentication scheme based upon EI Gamal’s signature scheme.” Computer and Security, vol. 13,pp. 137-144, 1994.
[18]T. C. Wu, “Remote log in authentication scheme based on a geometric approach.” Computer Communications, vol. 18, pp.959-963, 1995.
[19]M.-S. Hwang, “A remote password authentication scheme based on the digital signature method.” International Journal of Computer Mathematics, vol. 70, pp. 657-666, 1999.
[20]W. H. Yang, S. P. Shieh, “Password authentication schemes with smart cards.” Computer and Security, vol. 18, pp.727-733, 1999.
[21]M.-S. Hwang, L. H. Li, “A new remote user authentication scheme using smart cards.” IEEE Transactions on Consumer Electronics, vol. 46, pp.28-30, 2000.
[22]H. Sun, “An efficient remote user authentication scheme using smart cards.” IEEE Transactions on Consumer Electronics, vol. 46, No.4, pp.958-961, 2000.
[23]Wei-Chi Ku, Hao-Chuan Tsai, and Maw-Jinn Tsaur, “Stolen-Verifier Attack on an Efficient Smartcard-Based One-Time Password Authentication Protocol,” to appear in IEICE Transaction on Communications, Vol.E87-B, No.8, Aug. 2004.
[24]余彥宏,智慧卡離線交易認證機制之研究,碩士論文,民國93年。[25]I. C. Lin, M. S. Hwang and L. H. Li, “A new remote user authentication scheme for multi-server architecture, Future Generation Computer Systems, Vol. 19, pp. 13-22, 2003.
[26]Workshop on Smart Card Standards and Practical Applications, Sep.2005.
[27] 劉建良,“健保IC卡與分散式電子病歷系統整合探討”,國立暨南國際大學資訊管理學系碩士學位論文,2001年。