|
[1]H. Y. Chien, J. K. Jan and Y. M. Tseng, “An Efficient and Practical Solution to Remote Authentication: Smart Card,” Computers and Security, Vol. 21, No. 4, pp. 372-375, 2002. [2]T. ElGamal, “A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms,” IEEE Transactions on Information Theory, Vol. 31, No. 4, pp. 469-472, July 1985. [3]M. S. Hwang, C. C. Lee and Y. L. Tang, “A Simple Remote User Authentication Scheme,” Mathematical and Computer Modelling, Vol. 36, pp. 103-107, 2002. [4]M. S. Hwang and L. H. Li, “A New Remote User Authentication Scheme Using Smart Cards,” IEEE Transactions on Consumer Electronics, Vol. 46, No.1, pp. 28-30, 2000. [5]W. S. Juang, “Efficient Password Authenticated Key Agreement Using Smart Cards,” Computers & Security, Vol. 23, No. 2, pp. 167-173, 2004. [6]W. S. Juang, “Efficient Multi-server Password Authenticated Key Agreement Using Smart Cards,” IEEE Transactions on Consumer Electronics, Vol. 50, No. 1, pp. 251-255, February 2004. [7]W. C. Ku, C. M. Chen and H. L. Lee, “Weaknesses of Lee-Li-Hwang’s Hash-based Password Authentication Scheme,” ACM Operating Systems Review, Vol. 37, No. 4, pp. 19-25, 2003. [8]L. Lamport, “Password Authentication with Insecure Communication,” Communications of the ACM, Vol. 24, pp. 770-772, November 1981. [9]C. C. Lee, L. H. Li and M. S. Hwang, “A Remote User Authentication Scheme Using Hashing Functions,” ACM Operating Systems Review, Vol. 36, No. 4, pp. 23-29, 2002. [10]R. E. Lennon, S.M. Matyas, and C.H. Mayer, “Cryptographic authentication of time-invariant quantities,” IEEE Transactions On Communications, Vol. 29, No. 6, pp. 773-777, 1981. [11]C. Lin, M. S. Hwang and L. H. Li, “A New Remote User Authentication Scheme for Multi-server Architecture,” Future Generation Computer Systems, Vol. 19, No. 1, pp. 13-22, January 2003. [12]B. Noble and J. W. Danial, Applied Linear Algebra, 2’nd Edition. Prentice-Hall, 1977. [13]Bruce Schneier, Applied Cryptography, 2’nd Edition. NewYour: John Wiley & Sons, 1996. [14]H. M. Sun, “An Efficient Remote User Authentication Scheme Using Smart Cards,” IEEE Transactions on Consumer Electronics, Vol. 46, No. 4, pp. 958-961, November 2000. [15]H. M. Sun, “Cryptanalysis of password authentication schemes with smart cards,” Information Security Conference 2001, pp. 221-223, May 2001 [16]S. J. Wang and J. F. Chang, “Smart Card Based Secure Password Authentication Scheme,” Computers and Security, Vol. 15, No. 3, pp. 231-237, 1996. [17]T. C. Wu, “Remote Login Authentication Scheme Based on a Geometric Approach,” Computer Communications, Vol.18, No.12, pp. 959-963, 1995. [18]W. H. Yang and S. P. Shieh, “Password Authentication Schemes with Smart Cards,” Computers and Security, Vol. 18, No. 8, pp. 727-733, 1999. [19]林詠彰,“網路服務安全之研究”,朝陽科技大學資訊管理學系碩士論文,2000。 [20]賴溪松、韓亮、張真誠,“近代密碼學及其應用”,旗標出版股份有限公司,8月,2003。
|