References
- L. Lamport, "Password Authentication with Insecure Communication," Communications of the ACM, Vol.24, pp.770-772, November 1981. https://doi.org/10.1145/358790.358797
- C. C. Chang and T. C. Wu, "Remote password authentication with smart cards," IEEE Proceedings-Computers and Digital Techniques, Vol.38, No.3, pp.165-168, May 1991.
- H. S. Kim, S. W. Lee, and K. Y. Yoo, "ID-based Password Authentication Scheme using Smart Cards and Fingerprints," ACM Operating Systems Review, Vol.37, No.4, pp.32-41, October 2003. https://doi.org/10.1145/958965.958969
- C. L. Hsu, "Security of Chien et al's remote user authentication scheme using smart cards," Computer Standards and Interfaces 26, pp.167-169, May 2004. https://doi.org/10.1016/S0920-5489(03)00094-1
- E. J. Yoon, E. K. Ryu, and K. Y. Yoo, "Efficient Remote User Authentication Scheme base on Generalized ElGamal Signature Scheme," IEEE Transactions on Consumer Electronics, Vol.50, No.2, pp.568-570, May 2004. https://doi.org/10.1109/TCE.2004.1309425
- K. L. Das, A. Saxena, and V. P. Gulati, "A dynamic ID-based remote user authentication scheme," IEEE Transactions on Consumer Electronics, Vol.50, No.2, pp.629-631, May 2004. https://doi.org/10.1109/TCE.2004.1309441
- M. K. Khan, S. K. Kim, and K. Alghathbar, "Cryptanalysis and security enhancement of a 'more efficient & secure dynamic ID-based remote user authentication scheme," Computer Communications, Vol.34, Issue.3, pp.305-309, March 2011. https://doi.org/10.1016/j.comcom.2010.02.011
- Y. Y. Wang, J. Y. Liu, F. X. Xiao, and J. Dan, "A more efficient and secure dynamic ID-based remote user authentication scheme,"Computer Communications 32, pp.583-585, March 2009. https://doi.org/10.1016/j.comcom.2008.11.008
- R. Madhusudhan and R. C. Mittal, "Dynamic ID-based remote user password authentication schemes using smart cards : A review," Journal of Network and Computer Applications 35, pp.1235-1248, July 2012. https://doi.org/10.1016/j.jnca.2012.01.007
- C. S. Bindu, P. C. S. Reddy, and B. Satyanarayana, "Improved Remote User Authentication Scheme Preserving User Anonymity," IJCSNS International Journal of Computer Science and Network Security, Vol.8 No.3, pp.62-66, March 2008.
- H. C. Hsiang and W. K. Shih, "Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment", Computer Standard and Interfaces 31, pp.1118-1123, November 2009. https://doi.org/10.1016/j.csi.2008.11.002