References
- Chan, C. K., and L. M. Cheng. 2002. “Cryptanalysis of Timestamp-based Password Authentication Scheme.” Computers and Security 21 (1): 74–76. doi:10.1016/S0167-4048(02)00110-4.
- Fan, L., J. H. Li, and H. W. Zhu. 2002. “An Enhancement of Timestamp-based Password Authentication Scheme.” Computers & Security 21 (7): 665–667. doi:10.1016/S0167-4048(02)01118-5.10.1016/S0167-4048(02)01118-5
- He, D., S. Wu, and J. Chen. 2012. “Note on Design of Improved Password Authentication and Update Scheme Based on Elliptic Curve Cryptography.” Mathematical and Computer Modelling 55 (3–4): 1661–1664. doi:10.1016/j.mcm.2011.10.079.10.1016/j.mcm.2011.10.079
- Huang, H.-F., S.-E. Liu, and H.-F. Chen. 2013. “Designing a New Mutual Authentication Scheme Based on Nonce and Smart Cards.” Journal of the Chinese Institute of Engineers 36 (1): 98–102. doi:10.1080/02533839.2012.726329.10.1080/02533839.2012.726329
- Lamport, L. 1981. “Password Authentication with Insecure Communication.” Communications of the ACM 24 (11): 770–772. doi:10.1145/358790.358797.10.1145/358790.358797
- Leu, J. S., W. H. Lin, and H. J. Tzeng. 2010. “Design and Implementation of a Mobile Home Surveillance System.” Journal of the Chinese Institute of Engineers 33 (5): 669–680. doi:10.1080/02533839.2010.9671656.10.1080/02533839.2010.9671656
- Liu, J. Y., A. M. Zhou, and M. X. Gao. 2008. “A New Mutual Authentication Scheme Based on Nonce and Smart Cards.” Computer Communications 31 (10): 2205–2209. doi:10.1016/j.comcom.2008.02.002.10.1016/j.comcom.2008.02.002
- Messerges, T. S., E. A. Dabbish, and R. H. Sloan. 2002. “Examining Smart-card Security under the Threat of Power Analysis Attacks.” IEEE Transactions on Computers 51 (5): 541–552. doi:10.1109/TC.2002.1004593.10.1109/TC.2002.1004593
- Shen, J. J., C. W. Lin, and M. S. Hwang. 2003. “Security Enhancement for the Timestamp-based Password Authentication Scheme Using Smart Cards.” Computers & Security 22 (7): 591–595. doi:10.1016/S0167-4048(03)00709-0.10.1016/S0167-4048(03)00709-0
- Sun, D. Z., J. P. Huai, J. Z. Sun, and J. X. Li. 2009. “Cryptanalysis of a Mutual Authentication Scheme Based on Nonce and Smart Cards.” Computer Communications 32 (6): 1015–1017. doi:10.1016/j.comcom.2008.12.023.10.1016/j.comcom.2008.12.023
- Wang, M., J. Z. Lu, and X. F. Li. 2005. “Remote Password Authentication Scheme Based on Smartcard.” Computer Applications 25 (10): 2289–2290.
- Yang, W. H., and S. P. Shieh. 1999. “Password Authentication Schemes with Smart Cards.” Computers & Security 18 (8): 727–733. doi:10.1016/S0167-4048(99)80136-9.10.1016/S0167-4048(99)80136-9
- Yingjie Wang, J., and H. Jianhua Li. 2004. “Security Improvement on a Timestamp-based Password Authentication Scheme.” IEEE Transactions on Consumer Electronics 50 (2): 580–582. doi:10.1109/TCE.2004.1309429.10.1109/TCE.2004.1309429
- Yoon, E. J., E. K. Ryu, and K. Y. Yoo. 2005. “Attacks on the Shen et al.’s Timestamp-based Password Authentication Scheme Using Smart Cards.” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E88-A (1): 319–321. doi:10.1093/ietfec/E88-A.1.319.10.1093/ietfec/E88-A.1.319
- Zhou, J., and Y. H. Ou. 2009. “Key Tree and Chinese Remainder Theorem Based Group Key Distribution Scheme.” Journal of the Chinese Institute of Engineers 32 (7): 967–974. doi:10.1080/02533839.2009.9671584.10.1080/02533839.2009.9671584