14
Views
1
CrossRef citations to date
0
Altmetric
Original Articles

A mutual authenticated key agreement scheme over insecure networks

, &
Pages 603-612 | Received 01 May 2006, Published online: 03 Jun 2013

References

  • Lamport , L. 1981 . Password authentication with insecure communication . Communications of the ACM , 24 : 770 – 772 .
  • Chang , C. C. and Wu , T. C. 1991 . Remote password authentication with smart card . IEE Proceedings–Computers and Digital Techniques , 138 ( 3 ) : 165 – 168 . in
  • Wu , T. C. 1995 . Remote login authentication scheme based on a geometric approach . Computer Communications , 18 ( 12 ) : 959 – 963 .
  • Wang , S. J. and Chang , J. F. 1996 . Smart card based secure password authentication scheme . Computers & Security , 15 ( 3 ) : 231 – 237 .
  • Yang , W. H. and Shieh , S. P. 1999 . Password authentication schemes with smart cards . Computers & Security , 18 ( 8 ) : 727 – 733 .
  • Tan , K. and Zhu , H. 1999 . Remote password authentication scheme based on cross-product . Computer Communications , 22 ( 4 ) : 390 – 393 .
  • Huang , M. S. and Li , L. H. 2000 . A new remote user authentication scheme using smart cards . IEEE Transactions on Consumer Electronics , 46 ( 1 ) : 28 – 30 .
  • Sun , H. M. 2000 . An efficient remote user authentication scheme using smart cards . IEEE Transactions on Consumer Electronics , 46 ( 4 ) : 958 – 961 .
  • Chien , H. Y. , Jan , J. K. and Tseng , Y. M. 2002 . An efficient and practical solution to remote authentication: smart card . Computers & Security , 21 ( 4 ) : 372 – 375 .
  • Hsu , C. L. 2004 . Security of Chien et al.’s remote user authentication scheme using smart cards . Computer Standards and Interfaces , 26 ( 3 ) : 167 – 169 .
  • Lee , S. W. , Kim , H. S. and Yoo , K. Y. 2005 . Improvement of Chien et al.’s remote user authentication scheme using smart cards . Computer Standards and Interfaces , 27 ( 2 ) : 181 – 183 .
  • Syverson , P. 1994 . A taxonomy of replay attacks . Proceedings of IEEE Computer Security Foundations Workshop VII . June 1994 , Franconia , New Hampshire , USA. pp. 187 – 191 . in
  • 2002 . Secure hash standard . U.S. Federal Information Processing Standard (FIPS) , 180 ( 2 ) August NIST, U.S. Department of Commerce
  • Naccache , D. and M’Raihi , D. 1996 . Cryptographic smart cards . IEEE Micro , 16 ( 3 ) : 14 – 24 .
  • Schncier , B. 1996 . Applied Cryptography , 2nd , New York : John Wiley & Sons, Inc .
  • Stinson , D. R. 2002 . Cryptography: Theory and Practice , 2nd , Boca Ration, Florida , USA : CRC Press .

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.