|
[1]吳永川,林秀峰,陳志瀅,A Fair and Dynamic Password Authentication System, Communication of the CCISA, 2006, pp. 222-228. [2]Chang C.C., Hwang K.F., Some forgery attacks on a remote user authentication scheme using smart cards, Informatica, Vol. 14, No. 2, 2003, pp. 289-294. [3]Chang C.C., Wu L.H., A new password authentication scheme, Journal of Information Science and Engineering, Vol. 6, No. 2, 1990, pp. 139-147. [4]Chen C.K., Cheng L.M., Cryptanalysis of a remote user authentication scheme using smart cards, IEEE Transactions on Consumer Electronics, Vol. 46, No. 4, 2000, pp. 992-993. [5]Harn L., Hwang D., Laih C.S., Password authentication using public-key cryptography, Computer and Mathematics with Applications, Vol. 18, No. 12, 1989, pp. 1001-1017. [6]Hwang T.Y., Passwords authentication using public-key encryption, International Carnahan Conference on Security Technology, 1983, pp. 35-38. [7]Hwang M.S., Li L.H., A new remote user authentication scheme using smart cards, IEEE Transactions on Consumer Electronics, Vol. 46, No. 1, 2000, pp. 28-30. [8]Juang W.S., Efficient password authenticated key agreement using smart cards, Computers & Security, Vol. 23, No. 2, 2004, pp. 167-173. [9]Lamport L., Password authentication with insecure communications, Communication of ACM, Vol. 24, No. 11, 1981, pp. 770-772. [10]Lee N.Y., Chiu Y.C., Improved remote authentication scheme with smart card, Computer Standards & Interfaces, Vol.27, No. 2, 2005, pp. 177-180. [11]Lennon R., Matyas S., Meyer C., Cryptographic authentication of time-invariant quantities, IEEE Transactions on Communications, Vol. COM-29, No. 6, 1981, pp. 773-777. [12]Liew H.T., Lin J.F., Wu C.W., An efficient and complete remote user authentication scheme using smart card, Mathematical and Computer Modelling, Vol. 44, No. 1-2, 2006, pp. 223-228. [13]Lin C.L., Sun H.M., Hwang T., Attacks and solution on strong-password authentication, IEICE Transactions on Communications, Vol. E84-B, No. 9, 2001, pp. 2622-2627. [14]Lu R., Cao Z., Efficient remote user authentication scheme using smart card, Computer Networks, Vol. 49, No. 6, 2005, pp. 535-540. [15]Purdy G.B., High security log-in procedure, Communications of the ACM, Vol. 17, No. 8, 1974, pp. 442-445. [16]Shimizu A., A dynamic password authentication method by one-way function, SYST. COMP. , Vol. 22, No. 7, 1991, pp. 32-40. [17]Sun H.M., An efficient remote use authentication scheme using smart card, IEEE Transactions on Consumer Electronics, Vol. 46, No. 4, 2000, pp. 958-961. [18]Tsuji T., Shimizu A., One-time password authentication protocol against theft attacks, IEICE Transactions on Communications, Vol. E87-B, No. 3, 2004, pp. 523-529. [19]Wu S.T. , Chieu B.C., A user friendly remote authentication scheme with smart cards, Computer and Security, Vol. 22, No. 6, 2003, pp. 547-550.
|