1. Suzuki S, Nakada K. An authentication technique based on distributed security management for the global mobility network. IEEE Journal on Selected Areas in Communications, 1997, 15(8): 1608-1617
2. Zhu J M, Ma J F. A new authentication scheme with anonymity for wireless environments. IEEE Transactions on Consumer Electronics, 2004, 50(1): 231-235
3. Lee C C, Hwang M S, Liao I E. Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE Transactions on Industrial Electronics, 2006, 53(5): 1683-1687
4. Jiang Y X, Lin C, Shen X M, et al. Mutual authentication and key exchange protocols for roaming services in wireless mobile networks. IEEE Transactions on Wireless Communications, 2006, 5(9): 2569-2577
5. Horn G, Martin K M, Mitchell C J. Authentication protocols for mobile network environment value-added services. IEEE Transactions on Vehicular Technology, 2002, 51(2): 383-392
6. Ren K, Lou W J, Kim K J, et al. A novel privacy preserving authentication and access control scheme for pervasive computing environments. IEEE Transactions on Vehicular Technology, 2006, 55(4): 1373-1384
7. Peng H X. An identity-based authentication model for multi-domain. Chinese Journal of Computers, 2006, 29(8): 1271-1281 (in Chinese)
8. Lamport L. Password authentication with insecure communication. Communications of the ACM, 1981, 24(11): 770-771
9. Yang C N, Teng H T. An efficient method for finding minimum hash chain of multi-payword chains in micropayment. Proceedings of the IEEE International Conference on E-commerce. Jun 24-27, 2003, Newport Beach, CA USA. Piscataway, NJ, USA: IEEE, 2003: 45-48
10. Rivest R L, Shamir A. Payword and micromint: two simple micropayment schemes. Cryptobytes, 1996, 2(1): 7-11
11. Schneier B. Applied cryptography: protocols, algorithms, and source code in C. 2nd edition. New York, NY, USA: John Wiley and Sons, 1996
12. Tewari H, O’Mahony D, Perice M. Reusable off-line electronic cash using secret splitting. (1998-12-05). http://www.cs.tcd.ie/publications/ tech-reports/reports.98/TCD-CD-1998-27.pdf |