References
- Lamport , L. 1981 . Password authentication with insecure communication . Communications of the ACM , 24 : 770 – 772 .
- Chang , C. C. and Wu , T. C. 1991 . Remote password authentication with smart card . IEE Proceedings–Computers and Digital Techniques , 138 ( 3 ) : 165 – 168 . in
- Wu , T. C. 1995 . Remote login authentication scheme based on a geometric approach . Computer Communications , 18 ( 12 ) : 959 – 963 .
- Wang , S. J. and Chang , J. F. 1996 . Smart card based secure password authentication scheme . Computers & Security , 15 ( 3 ) : 231 – 237 .
- Yang , W. H. and Shieh , S. P. 1999 . Password authentication schemes with smart cards . Computers & Security , 18 ( 8 ) : 727 – 733 .
- Tan , K. and Zhu , H. 1999 . Remote password authentication scheme based on cross-product . Computer Communications , 22 ( 4 ) : 390 – 393 .
- Huang , M. S. and Li , L. H. 2000 . A new remote user authentication scheme using smart cards . IEEE Transactions on Consumer Electronics , 46 ( 1 ) : 28 – 30 .
- Sun , H. M. 2000 . An efficient remote user authentication scheme using smart cards . IEEE Transactions on Consumer Electronics , 46 ( 4 ) : 958 – 961 .
- Chien , H. Y. , Jan , J. K. and Tseng , Y. M. 2002 . An efficient and practical solution to remote authentication: smart card . Computers & Security , 21 ( 4 ) : 372 – 375 .
- Hsu , C. L. 2004 . Security of Chien et al.’s remote user authentication scheme using smart cards . Computer Standards and Interfaces , 26 ( 3 ) : 167 – 169 .
- Lee , S. W. , Kim , H. S. and Yoo , K. Y. 2005 . Improvement of Chien et al.’s remote user authentication scheme using smart cards . Computer Standards and Interfaces , 27 ( 2 ) : 181 – 183 .
- Syverson , P. 1994 . A taxonomy of replay attacks . Proceedings of IEEE Computer Security Foundations Workshop VII . June 1994 , Franconia , New Hampshire , USA. pp. 187 – 191 . in
- 2002 . Secure hash standard . U.S. Federal Information Processing Standard (FIPS) , 180 ( 2 ) August NIST, U.S. Department of Commerce
- Naccache , D. and M’Raihi , D. 1996 . Cryptographic smart cards . IEEE Micro , 16 ( 3 ) : 14 – 24 .
- Schncier , B. 1996 . Applied Cryptography , 2nd , New York : John Wiley & Sons, Inc .
- Stinson , D. R. 2002 . Cryptography: Theory and Practice , 2nd , Boca Ration, Florida , USA : CRC Press .