|
[1]T.H. Chen, Y.C. Chen and W.K. Shih, “An Efficient Anonymous Authentication Protocol for Mobile Pay-TV,” Journal of Network and Computer Applications, 2011, Vol. 34, pp. 1131-1137. [2]T.Y. Wu and Y.M. Tseng. “An Efficient User Authentication and Key Exchange Protocol for Mobile Client-Server Environment,” Computer Networks, 2010, Vol. 54, pp. 1520-1530. [3]L. Lamport, “Password Suthentication with Insecure Communication,” ACM Communications, 1981, Vol. 24, No. 11, pp. 770-772. [4]P.G. Argyroudis, R. Verma, H. Tewari and D. O’Mahony, “Performance Analysis of Cryptographic Protocols on Handheld Devices,” Proceedings of the 3rd International Symposium on Network Computing and Applications, 2004, pp. 169 - 174. [5]A.K. Awasthi and S. Lal, “A Remote User Authentication Scheme Using Smart Cards with Forward Secrecy,” IEEE Transactions on Consumer Electronics, 2003, Vol. 49, No. 4, pp. 1246-1248. [6]M. Bellare and P. Rogaway, “Entity Authentication and Key Distribution,” Advances in Cryptology-CRYPTO’93, LNCS, 1993, Vol. 773, pp. 232-249. [7]H.Y. Chien and C.H. Chen, “A Remote Authentication Scheme Preserving User Anonymity,” Proceedings of the 19th International Conference on Advanced Information Networking and Applications, 2005, pp. 245 - 248. [8]M.L. Das, A. Saxena and V.P. Gulati, “A Dynamic ID-Based Remote User Authentication Scheme,” IEEE Transactions on Consumer Electronics, 2004, Vol. 50, No. 2, pp. 629-631. [9]Y, Ding and P, Horster, “Undetectable On-Line Password Guessing Attacks,” ACM SIGOPS Operating Systems Review, 1995, Vol. 29, No. 4, pp. 77-86. [10]X. Duan, J.W. Liu and Q. Zhang, “Security Improvement on Chien et al.’s Remote User Authentication Scheme Using Smart Cards,” Proceedings of the IEEE International Conference on Computational Intelligence and Security, 2006, pp. 1133-1135. [11]Z.X. Gao and Y.Q. Tu, “An Improvement of Dynamic ID-Based Remote User Authentication Scheme with Smart Cards,” Proceedings of the 7th World Congress on Intelligent Control and Automation, 2008, pp. 4562-4567. [12]L. Gong, “A Security Risk of Depending on Synchronized Clocks,” ACM Operating System Review, 1992, Vol. 26, No. 1, pp. 49-53. [13]H.C. Hsiang and W.K. Shih, “Weaknesses and Improvements of the Yoon-Ryu-Yoo Remote User Authentication Scheme Using Smart Cards,” Computer Communications, 2009, Vol. 32, No. 4, pp. 649-652. [14]T. Hwang, Y. Chen and C.S. Laih, “Non-Interactive Password Authentication without Password Tables,” Proceedings of IEEE Region 10 Conference on Computer and Communication Systems, 1990, pp. 429-431. [15]M.S. Hwang, S.K. Chong and T.Y. Chen, “DoS-Resistant ID-Based Password Authentication Scheme Using Smart Cards,” Journal of Systems and Software, 2010, Vol. 83, No. 1, pp. 163-172. [16]M.S. Hwang and L.H. Li, “A New Remote User Authentication Scheme Using Smart Cards,” IEEE Transactions on Consumer Electronics, 2000, Vol. 46, No. 1, pp. 28-30. [17]P. Kocher, J. Jaffe and B. Jun, 1999. “Differential Power Analysis,” Advances in Cryptology: Proceedings of CRYPTO 99, LNCS 1666, 1999, pp. 388-397. [18]W.C. Ku and S.T. Chang, “Impersonation Attack on a Dynamic ID-Based Remote User Authentication Scheme Using Smart Cards,” IEICE Transactions on Communications, 2005, E88-B, No. 5, pp. 2165-2167. [19]C.C Lee, M.S. Hwang and W.P. Yang, “A Flexible Remote User Authentication Scheme Using Smart Cards,” ACM Operating Systems Review, 2002, Vol. 36, No. 3, pp. 46-52. [20]C.C. Lee, L.H. Li and M.S. Hwang, “A Remote User Authentication Scheme Using Hash Functions,” ACM Operating Systems Review, 2002, Vol. 36, No. 4, pp. 23-29. [21]I.E. Liao, C.C. Lee and M.S. Hwang, “Security Enhancement for a Dynamic ID-Based Remote User Authentication Scheme,” Proceedings of IEEE International Conference on Next Generation Web Services Practices, 2005, pp. 437-440. [22]N.W. Lo and K.H. Yeh, “Cryptanalysis of Two Three-party Encrypted Key Exchange Protocols,” Computer Standards and Interfaces, 2009, Vol. 31, No. 6, pp. 1167-1174. [23]T.S. Messerges, E.A. Dabbish and R.H. Sloan, “Examining Smart-Card Security under the Threat of Power Analysis Attacks,” IEEE Transactions on Computers, 2002, Vol. 51, No, 5, pp. 541-552. [24]M. Misbahuddin, M.A. Ahmed and M.H. Shastri, “A Simple and Efficient Solution to Remote User Authentication Using Smart Cards,” Innovations in Information Technology, 2006, pp. 1-5. [25]H.M. Sun, “An Efficient Remote User Authentication Scheme Using Smart Cards,” IEEE Transactions on Consumer Electronics, 2000, Vol. 46, No. 4, pp. 958-961. [26]J.J. Shen, C.W. Lin and M.S. Hwang, “A Modified Remote User Authentication Scheme Using Smart Cards,” IEEE Transactions on Consumer Electronics, 2003, Vol. 49, No. 2, pp. 414-416. [27]Y.Y. Wang, J.Y. Liu, F.X. Xiao and J. Dan, “A More Efficient and Secure Dynamic ID-Based Remote User Authentication Scheme,” Computer Communications, 2009, Vol. 32, No. 4, pp. 583-585. [28]Q. Xie, J.L. Wang, D.R. Chen and X.Y. Yu, “A Novel User Authentication Scheme Using Smart Cards,” Proceedings of the 2008 International Conference on Computer Science and Software Engineering, 2008, pp. 834-836. [29]K.H. Yeh, C. Su, N.W. Lo, Y. Li and Y.X. Hung, “Two Robust Remote User Authentication Protocols Using Smart Cards,” The Journal of Systems and Software, 2010, Vol. 83, No. 12, pp. 2556-2565. [30]E.J. Yoon, E.K. Ryu and K.Y. Yoo, “Further Improvement of an Efficient Password Based Remote User Authentication Scheme Using Smart Cards,” IEEE Transactions on Consumer Electronics, 2004, Vol. 50, No. 2, pp. 612 -614. [31]X. Zhang, Q.Y. Feng, M. Li, “A Modified Dynamic ID-Based Remote User Authentication Scheme,” Proceedings of International Conference on Communications, Circuits and Systems, 2006, pp. 1602-1604. [32]C. Chang and K.F. Hwang, “Some Forgery Attacks on a Remote User Authentication Scheme Using Smart Cards,” Informatics, 2003, Vol. 14, No. 3, pp. 289-294. [33]M.S. Hwang, C.C. Lee and Y.L. Tang, “A Simple Remote User Authentication Scheme,” Mathematical and Computer Modelling, 2002, Vol. 36, No. 1-2, pp. 103-107. [34]T. Hwang and W.C. Ku, “Reparable Key Distribution Protocols for Internet Environments,” IEEE Transactions on Consumer Electronics, 1995, Vol. 43, No. 5, pp. 1947-1949. [35]W.C. Ku and S.M. Chen, “Weaknesses and Improvements of an Efficient Password Based Remote User Authentication Scheme Using Smart Cards,” IEEE Transactions on Consumer Electronics, 2004, Vol. 50, No. 1, pp. 204-207. [36]J.P. Hubaux, S. Capkun and J. Luo, “The Security and Privacy of Smart Vehicles,” IEEE Security and Privacy Magazine, 2004, Vol. 2, pp. 49-55 [37]M, ElZarki, S. Mehrotra, G. Tsudik and N. Venkatasubramanian, “Security Issues in a Future Vehicular Network,” European Wireless’02 Conference, Italy, 2002. [38]S. Duri, M. Gruteser, X. Liu, P. Moskowitz, R. Perez, M. Singh and J.M. Tang, “Framework for Security and Privacy in Automotive Telematics,” ACM Press in Proceedings of the 2nd International Workshop on Mobile Commerce, 2002, pp. 25-32. [39]P. Klaus and F. Hannes, “A Privacy Aware and Efficient Security Infrastructure for Vehicular Ad Hoc Networks,” Computer Standards and Interfaces, 2008, Vol. 30, No. 6, pp. 390-397. [40]A. Imran, S. Salhi and N.A. Wassan, “A Variable Neighborhood-Based Heuristic for the Heterogeneous Fleet Vehicle Routing Problem,” European Journal of Operational Research, 2009, Vol. 197, No. 2, pp. 509-518. [41]AVoD: (Audio Video on Demand), website: http://www.thy.com/en-INT/services/passenger_services/avod.aspx, Access available 5/24/2010. [42]G.D. Fan, C.C Huang, Y.B. Lin, C.S. Tang, C.Y. Twu and Y.H. Wen, “Enhanced Video Phone Services for NGN/IMS,” Wireless Communications and Mobile Computing, Published online in Wiley InterScience. doi: 10.1002/wcm.997, 2010 [43]British Telecom, website: http://www.ofcom.org.uk/consult/condocs/ngndevelopments/summary. [44]Korea Telecom, website: http://www.aptsec.org/meetings/2005/ASTAP10/WS-docs/ASTAP05-WS.IP & NGN-26. [45]N. Asokan, H. Debar, M. Steiner and M. Waidner, “Authenticating Public Terminal,” Computer Networks, 1999, Vol. 31, pp. 861-870. [46]C.L. Chen, Y.Y. Chen and J.K. Jan, “A Secure Authentication Scheme for Public Terminal before A Transaction,” Lecture Notes in Computer Science, 2007, Vol. 4658, pp. 118-126. [47]C.Y. Cheng, K. Seman and J. Yunus, “Authentication Public Terminal with Smart Cards,” Proc. TENCON 2000, 2000, pp. I-527-I529. [48]C.L. Chen, C.Y. Hsu and C.C. Lee, “Using a PTD to Strengthen Remote Authentication from an Untrusted Computer,” Journal of Internet Technology, 2011. [49]V.N. Akwukwuma and A.O. Egwali, “E-commerce: Online Attacks and Protective Mechanisms,” Asian Journal of Information Technology, 2008, Vol. 7, No. 9, pp. 394-402. [50]S. Kungpisdan, “A Secure Account-Based Mobile Payment System Protocol,” International Conference on Information Technology: Coding and Computing (ITCC), 2004, pp. 35-39. [51]J.T. Isaac, J.S. Camara, S. Zeadally and J.T. Marquez, “A Secure Vehicle-to-Roadside Communication Payment Protocol in Vehicular Ad Hoc Networks,” Computer Communications, 2009, Vol. 31, pp. 2478-2484. [52]F.M. Finneran dBrn Associates, Inc, “WiMax versus Wi-Fi”, 2004. [53]Information Technology—Generic Coding of Moving Pictures and Associated Audio Information: Video, ISO/IEC International Standard 13818-2, June 1996.
|