|
[1]L. Lamport, Password authentication with insecure communication, ACM Communications, vol.24 (1981) [2]T. Hwang, Y. Chen and C.S. Laih, Non-interactive password authentication without password tables, IEEE Region 10 Conference on Computer and Communication Systems, pp.429-431 (1990) [3]A. Shamir, Identity-based cryptosystems and signature schemes, Proceedings of CRYPTO 84, LNCS 7, pp.47-53 (1984) [4]M.S. Hwang and L.H. Li, A new remote user authentication scheme using smart cards, IEEE Transactions on Consumer Electronics, vol.46, no.1, pp.28-30 (2000) [5]H.M. Sun, An Efficient remote user authentication scheme using smart cards, IEEE Transactions on Consumer Electronics, vol.46, no.4, pp.958-961 (2000) [6]C.C. Lee, M.S. Hwang and W.P. Yang, A flexible remote user authentication scheme using smart cards, ACM Operating Systems Review, vol.36, no.3, pp.46-52 (2002) [7]C.C. Lee, L.H. Li and M.S. Hwang, A remote user authentication scheme using hash functions, ACM Operating Systems Review, vol.36, no.4, pp.23-29 (2002) [8]J.J. Shen, C.W. Lin and M.S. Hwang, A modified remote user authentication scheme using smart cards, IEEE Transactions on Consumer Electronics, vol.49, no.2, pp.414-416 (2003) [9]A.K. Awasthi and S. Lal, A remote user authentication scheme using smart cards with forward secrecy, IEEE Transactions on Consumer Electronics, vol.49, no.4, pp.1246-1248 (2003) [10]M.L. Das, A. Saxena and V.P. Gulati, A dynamic ID-based remote user authentication scheme, IEEE Transactions on Consumer Electronics, vol.50, no.2, pp.629-631 (2004) [11]AK. Awasthi and S. Lal, Security analysis of a dynamic ID-based remote user authentication scheme, http://eprint.iacr. org/ 2004/238.pdf. [12]H.Y. Chien and C.H. Chen, A remote authentication scheme preserving user anonimity, Proceedings of the 19th International Conference on Advanced Informatiion Networking and Applications, pp.245-248 (2005) [13]P.G. Argyroudis, R. Verma, H. Tewari and D. O’Mahony, Performance analysis of cryptographic protocols on handheld devices, Proceedings of the 3rd International Symposium on Network Computing and Applications, pp.169-174 (2004) [14]M. Passing and F. Dressler, Experimental performance evaluation of cryptographic algorithms on sensor nodes, Proceedings of the 3rd International Conference on Mobile Adhoc and Sensor Systems, pp.882-887 (2006) [15]I.E. Liao, C.C. Lee and M.S. Hwang, Security enhancement for a dynamic ID-based remote user authentication scheme, IEEE. Proceedings of International Conference on Next Generation Web Services Practices, pp.437-440 (2005) [16]M. Misbahuddin, M.A. Ahmed and M.H. Shastri, A simple and efficient solution to remote user authentication using smart cards, Innovations in Information Technology, pp.1-5 (2006) [17]X. Zhang, Q.Y Feng and M. Li, A modified dynamic ID-based remote user authentication scheme, Proceedings of International Conference on Communications, Circuits and Systems, pp.1602-1604 (2006) [18]Z.X. Gao and Y.Q. Tu, An improvement of dynamic ID-based remote user authentication scheme with smart cards, Proceedings of the 7th World Congress on Intelligent Control and Automation, pp.4562-4567 (2008) [19]Y.Y Wang, J.Y Liu, F.X Xiao, J. Dan, A more efficient and secure dynamic ID-based remote user authentication scheme, Computer Communications, vol.32, pp.583-585 (2009) [20]P. Kocher, J. Jaffe and B. Jun, Differential power analysis, Advances in Cryptology: Proceedings of CRYPTO 99, LNCS 1666, pp.388-397 (1999) [21]T.S. Messergers, E.A. Dabbish and R.H. Sloan, Examining smart card security under the threat of power analysis attacks, IEEE Transactions on Computers, vol.51, no.5, pp.541-552 (2002) [22]L. Gong, A security risk of depending on synchronized clocks, ACM Operating System Review, vol.26, no.1, pp.49-53 (1992) [23]Y. Ding and P. Horster, Undetectable on-line password guessing attacks, ACM SIGOPS Operating Systems Review, vol.29, no.4, pp.77-86 (1995) [24]W.C. Ku and S.T. Chang, Impersonation attack on a dynamic ID-based remote user authentication scheme using smart cards, IEICE Transactions on Communications E88–B, no.5, pp.2165-2167 (2005) [25]R.C. Merkle, One way hash functions and DES, Advances in Cryptology: Proceedings of CRYPTO 89, LNCS 435, pp.428-446 (1989) [26]Smart Cards, http://www.ewh.ieee.org/r10/bombay/news5/SmartCards.htm [27]William Stallings,巫坤品、王青青 譯,「密碼學與網路安全-原理與實務 第三版」,碁峰資訊股份有限公司 (2006)。 [28]賴溪松,「資訊安全入門」,全華圖書公司 (2006)。 [29]賴溪松、韓亮、張真誠,「近代密碼學及其應用」,松崗電腦圖書資料股份有限公司 (2004)。 |