1. Ku W C, Chen S M. Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics, 2004, 50(1): 204-207
2. Hu L L, Niu X X, Yang Y X. Weaknesses and improvements of a remote user authentication scheme using smart cards. The Journal of China Universities of Posts and Telecommunications, 2007, 14(3): 91-94
3. Song R G. Advanced smart card based password authentication protocol. Computer Standards & Interfaces, 2010, 32 (4): 321-325
5. Yeh K H, Su C H, Lo N W. Two robust remote user authentication protocols using smart cards. Journal of Systems and Software, 2010, 83(12): 2556-2565
6. Sood K S. Secure dynamic identity-based authentication scheme using smart cards. Information Security Journal: A Global Perspective, 2011, 20(2): 67-77
7. Yang G, Wong D S, Wang H, et al. Two-factor mutual authentication based on smart cards and password. Journal of Computer and System Sciences, 2008, 74(7): 1160-1172
8. Ma C G, Wang D, Zhang Q M. Cryptanalysis and improvement of Sood et al’s dynamic ID-based authentication scheme. Proceedings of the 8th International Conference on Distributed Computing and Internet Technology (ICDCIT’12), Feb 2-4, 2012, Bhubaneswar, India. LNCS 7154. Berlin, Germany: Springer-Verlag, 2012: 141-152
14. Kim J Y, Choi H K, Copeland J A. Further improved remote user authentication scheme. IEICE Transactions on Fundamentals, 2011, 94(6): 1426-1433
16. Messerges T S, Dabbish E A., Sloan R H. Examining smart-card security under the threat of power analysis attacks. IEEE Transactions on Computers, 2002, 51(5): 541-552
17. Mangard S, Oswald E, Popp T. Power analysis attacks—Revealing the secrets of smart cards. New York, NY, USA: Springer-Verlag , 2007
18. Mangard S, Oswald E, Standaert F X. One for all-all for one: unifying standard differential power analysis attacks. IET Information Security, 2011, 5(2): 100-110
20. Krawczyk H. HMQV: a high-performance secure Diffie-Hellman protocol. Advances in Crytography: Proceedings of the 25st Annual International Cryptology Conference (Crypto’05), Aug 14-18, 2005, Santa Barbara, CA, USA. LNCS 3621. Berlin, Germany: Springer-Verlag, 2005: 546-566
21. Tang C, Wu D. Mobile privacy in wireless networks-revisited. IEEE Transactions on Wireless Communications, 2008, 7(3): 1035-1042
22. Chung H R, Ku W C, Tsaur M J. Weaknesses and improvement of Wang et al’s remote user password authentication scheme for resource-limited environments. Computer Standards & Interfaces, 2009, 31(4): 863-868
23. Ferguson N, Schneier B, Kohno T. Cryptography engineering: design principles and practical applications. New York, NY, USA: John Wiley & Sons, 2010
24. Mao W B. Modern cryptography: theory and practice. Englewood Cliffs, NJ,USA: Prentice Hall, 2004
25. Wong D S, Fuentes H H, Chan A H. The performance measurement of cryptographic primitives on palm devices. Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC’01), Dec 10-14, 2001, New Orleans, LA, USA. Los Alamitos, CA, USA: IEEE Computer Society, 2001: 92-101
26. Großschädl J, Kamendje G A. Architectural enhancements for montgomery multiplication on embedded RISC processors. Proceedings of the 1st International Conference on Applied Cryptography and Network Security (ACNS’03), Oct 16-19, 2003, Kunming, China. LNCS 2846. Berlin, Germany: Springer-Verlag, 2003: 418-434
27. Potlapally N R, Ravi S, Raghunathan A, et al. A study of the energy consumption characteristics of cryptographic algorithms and security protocols. IEEE Transactions on Mobile Computing, 2006, 5(2): 128-143 |