|
[1] C.S. Park, “Authentication protocol providing user anonymity and untraceability in wireless mobile communication systems,” Computer Networks, Vol. 44, Issue 2, 2004, pp. 267-273. [2] J. Zhu, J. Ma, “ A new authentication scheme with anonymity for wireless environments,” IEEE Transactions Consumer Electronics, Vol. 50, Issue 1, 2004, pp. 231-235. [3] C.C. Lee, M.S. Hwang, I.En. Liao “Security enhancement on a new authentication scheme with anonymity for wireless environments,” IEEE Transactions on Industrial Electronics, Vol. 53, Issue 5, 2006, pp. 1683-1687. [4] C.C. Wu, W.B. Lee, W.J. Tsaur, “A secure authentication scheme with anonymity for wireless communications,” IEEE Communication, Vol. 12, Issue 10, January 2008, pp. 722-723. [5] Y.P. Liao and S.S. Wang, “A secure dynamic ID based remote user authentication scheme for multi-server environment,” Computer Standards & Interfaces, Vol. 31, Issue 1, January 2009, pp. 24-29. [6] H.C. Hsiang and W.K. Shih, “Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment,” Computer Standards & Interfaces, Vol. 31, Issue 6, November 2009, pp. 1118-1123. [7] X. Li, W. Qiu, D. Zheng, K. Chen, J. Li, “Anonymity Enhancement on Robust and Efficient Password-Authenticated Key Agreement Using Smart Cards,” IEEE Transactions on Industrial Electronics, Vol. 57 , Issue 2, 2010, pp. 793 - 800. [8]J.S. Lee, J.H. Chang, D.H. Lee, “Security flaw of authentication scheme with anonymity for wireless communications,” IEEE Communication, Vol. 13, Issue 5, 2009, pp. 292-293. [9] P. Zeng, Z. Cao, K.K.R. Choo, S. Wang, “On the anonymity of some Authentication schemes for wireless communications,” IEEE Communications, Volume 13, Issue 3, 2009, pp. 170-171. [10] Jing Xu, Dengguo Feng, “Security flaws in authentication protocols with anonymity for wireless communications, ” ETRI Journal 31 , 2009, pp. 460-462. [11] D. He, M. Ma, Y. Zhang, C. Chen, J. Bu, “A strong user authentication scheme with smart cards for wireless communications,” Computer Communications, Vol. 34, Issue 3, 15 March 2011, pp. 367-374. [12] J. Xu, W.T. Zhu, D.G. Feng, “An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks,” Computer Communications, Vol. 34, Issue 3, 15 March 2011, pp. 319-325. [13] C.T. Li, C.C. Lee, “A novel user authentication and privacy preserving scheme with smart cards for wireless communications,” Mathematical and Computer Modelling, Available online 14 January 2011.
|