SEARCH

SEARCH BY CITATION

REFERENCES

  • 1
    Lamport L. Password authentication with insecure communication. Communication of ACM 1981; 24:770771.
  • 2
    Mitchell C. Limitation of challenge-response entity authentication. Electronic Letters 1989; 25:11951196.
  • 3
    Shimizu A. A dynamic password authentication method using a one-way function. Systems and Computers in Japan 1991; 22:3240.
  • 4
    Diffie W, Van Oorschot PC, Wiener MJ. Authentication and authenticated key exchanges. Design Code and Cryptography 1992; 2:107125.
  • 5
    Horng G. Password authentication without using password table. Information Processing Letters 1995; 55:247250.
  • 6
    Jan JK, Chen YY. ‘Paramita Wisdom’ password authentication scheme without verification tables. Journal of System Software 1998; 42:4557.
  • 7
    Hwang MS, Li LH. A new remote user authentication scheme using smart card. IEEE Transactions of Consumer Electronics 2000; 46:2830.
  • 8
    Yoon EJ, Ryu EK, Yoo KY. Further improvement of an efficient password based remote user authentication scheme using smart cards. IEEE Transactions of Consumer Electronics 2004; 50:612614.
  • 9
    Fan CI, Chan YC, Zhang ZK. Robust remote authentication scheme with smart cards. Computer and Security 2005; 24:619628.
  • 10
    Liao IE, Lee CC, Hwang MS. A password authentication scheme over insecure networks. Journal of Computer and System Sciences 2006; 72:727740.
  • 11
    Wang XM, Zhang WF, Jhang JS, Khan MK. Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards. Computer Standards and Interfaces 2007; 29:507512.
  • 12
    Liu JY, Zhou AM, Gao MX. A new mutual authentication scheme based on nonce and smart cards. Computer Communications 2008; 31(10):22052209.
  • 13
    Kim SK, Chung MG. More secure remote user authentication scheme. Computer Communications 2009; 32:10181021.
  • 14
    Khan MK, Kim SK, Alghathbar K. Cryptanalysis and security enhancement of a ‘more efficient & secure dynamic ID-based remote user authentication scheme’. Computer Communications 2010; 34(3):305309.
  • 15
    Kumar M, Gupta MK, Kumari S. An improved efficient remote password authentication scheme with smart card over insecure networks. International Journal of Network Security 2011; 13(3):167177.
  • 16
    Chen TH, Hsiang HC, Shih WK. Security enhancement on an improvement on two remote user authentication schemes using smart cards. Future Gener. Comp. Sy. 2011; 27:377380.
  • 17
    Truong TT, Tran MT, Duong AD. Modified, efficient and secure dynamic ID-based user authentication scheme. International Conference on Information and Communication Technology, ICT-EURASIA, LNCS, Yogyakarata, Indonesia, 25–29 March 2013, vol. 7804, 2013. P. 409–415.
  • 18
    Madhusudhan R, Mittal RC. Dynamic ID-based remote user password authentication schemes using smart cards: a review. Journal of Network and Computer Applications 2012; 35(4):12351248.
  • 19
    Kumari S, Gupta MK, Kumar M. Cryptanalysis and security enhancement of Chen et al.'s remote user authentication scheme using smart card. Central European Journal of Computer Science 2012; 2(1):6075.
  • 20
    Truong TT, Tran MT, Duong AD. Robust mobile device integration of a fingerprint biometric remote authentication scheme. Proceedings of 26th IEEE International Conference on Advanced Information Networking and Applications, 2012. p. 678–685.
  • 21
    An YH. Security improvements of a dynamic ID-based remote user authentication scheme with session key agreement. Proceedings of International Conference on Advanced Communication Technology ICACT, Pyeongchang, South Korea, 27-30 Jan. 2013. P. 1072–1076
  • 22
    Xu J, Zhu WT, Feng DG. An improved smart card based password authentication scheme with provable security. Computer Standards & Interfaces 2009; 31(4):723728.
  • 23
    Sood SK, Sarje AK, Singh K. An improvement of Xu et al.'s authentication scheme using smart cards. Proceedings of the Third Annual ACM Bangalore Conference, Bangalore, Karnataka, India, 2010. P. 1–5.
  • 24
    Song R. Advanced smart card based password authentication protocol. Computer Standards & Interfaces 2010; 32(5):321325.
  • 25
    Kocher P, Jaffe J, Jun B. Differential power analysis. Proceedings of Advances in Cryptology CRYPTO'99, 1999. p. 388–397.
  • 26
    Messerges TS, Dabbish EA, Sloan RH. Examining smart-card security under the threat of power analysis attacks. IEEE Transactions on Computers 2002; 51(5):541552.
  • 27
    Chen BL, Kuo WC, Wuu LC. Robust smart-card-based remote user password authentication scheme. International Journal of Communication Systems 2012. doi:10.1002/dac.2368.
  • 28
    Li X, Niu J, Khan MK, Liao J. An enhanced smart card based remote user password authentication scheme. Journal of Network and Computer Applications 2013 http://dx.doi.org/10.1016/j.jnca.2013.02.034
  • 29
    Xiang T, Wong K, Liao X. Cryptanalysis of a password authentication scheme over insecure networks. Journal of Computer and system Sciences 2008; 74(5):657661.
  • 30
    Ma CG, Wang D, Zhao SD. Security flaws in two improved remote user authentication schemes using smart cards. International Journal of Communication Systems 2012. doi:10.1002/dac.2468.
  • 31
    Klein DV. Foiling the cracker a survey of, and improvements to, password security. Proceedings of the 2nd USENIX Security Workshop, Anaheim, Berkeley, CA, USA: USENIX Association, 1990. p. 5–14.
  • 32
    Dell'Amico M, Michiardi P, Roudier Y. Password strength: an empirical analysis. Proceedings of INFOCOM 2010,IEEE, San Diego, CA, USA, May 2010. p. 1–9.
  • 33
    Ku WC, Chen SM. Weakness and improvement of an efficient password based remote user authentication scheme using smart cards. IEEE Transaction on Consumer Electronics 2004; 50(1):204207.
  • 34
    Kumar M, Gupta MK, Kumari S. An improved smart card based remote user authentication scheme with session key agreement during the verification phase. Journal of Applied Computer Science & Mathematics 2011; 11(5):3846.
  • 35
    Yang G, Wong DS, Wang H, Deng X. Two-factor mutual authentication based on smart cards and passwords. Journal of Computer and System Sciences 2008; 74(7):11601172.
  • 36
    Kumar M, Gupta MK, Kumari S. Cryptanalysis of enhancements of a password authentication scheme over insecure networks. Proceedings of 4th International Conference on Contemporary Computing (IC3), JIIT Noida 2011. 168. p. 524–532.
  • 37
    Wang YY, Liu JY, Xiao FX, Dan J. A more efficient and secure dynamic ID-based remote user authentication scheme. Computer Communications 2009; 32(4):583585.
  • 38
    Hsiang HC, Shih WK. Weaknesses and improvements of the Yoon–Ryu–Yoo remote user authentication scheme using smart cards. Computer Communications 2009; 32(4):649652.
  • 39
    Sood SK, Sarjee AK, Singh K. An improvement of Liao et al.'s authentication scheme using smart card. Proceedings of IEEE 2nd International Advance Computing Conference, 2010. p. 240–245.
  • 40
    Liao YP, Wang SS. A secure dynamic-ID based remote user authentication scheme for multi-server environment. Computer Standards & Interfaces 2009; 31:2429.
  • 41
    Das ML. Two-factor user authentication in wireless sensor networks. IEEE Transactions on Wireless Communication 2009; 1086–1090.
  • 42
    Pippal RS, Jaidhar CD, Tapaswi S. Comments on symmetric key encryption based smart card authentication scheme. Proceedings of the Second International Conference on Computer Technology and Development (ICCTD), Cairo, Egypt, November 2010. 2–4, p. 482–484.