References
- L. Lamport, 'Password authentication with insecure communication,' Communication of ACM, Vol. 24, pp. 770-772, 1981 https://doi.org/10.1145/358790.358797
- M. S. Hwang, 'Cryptanalysis of remote login authentication scheme,' Computer Communications, Vol. 22, no. 8, pp. 42-744, 1999 https://doi.org/10.1016/S0140-3664(99)00036-5
- M. S. Hwang, 'A remote password authentication scheme based on the digital signature method,' International Journal of Computer Mathematics, Vol. 70, pp. 657-666, 1999 https://doi.org/10.1080/00207169908804781
- W. H. Yang and S. P. Shieh, 'Password authentication schemes with smart cards,' Computers & Security, Vol. 18, no. 8, pp. 727-733, 1999 https://doi.org/10.1016/S0167-4048(99)80136-9
- M. S. Hwang and L. H. Li, 'A new remote user authentication scheme using smart cards,' IEEE Transactions on Consumer Electronics, Vol. 46, no. 1, pp. 28-30, 2000 https://doi.org/10.1109/30.826377
- H. Y. Chien, J. K. Jan, and Y. M. Tseng, 'A modified remote login authentication scheme based on geometric approach,' Journal of Systems and Software, Vol. 55, pp. 287-290, 2001 https://doi.org/10.1016/S0164-1212(00)00077-7
- M. S. Hwang, C. C. Lee, and Y. L. Tang, 'An improvement of SPLICE/AS in WIDE against guessing attack,' International Journal of Informatica, Vol. 12, no. 2, pp. 297-302, 2001
- L. H. Li, I. C. Lin, and M. S. Hwang, 'A remote password authentication scheme for multi-server architecture using neural networks,' IEEE Transactions on Neural Networks, Vol. 12, no. 6, pp. 1498-1504, 2001 https://doi.org/10.1109/72.963786
- C. K. Chan and L. M. Cheng, 'Cryptanlysis of timestamp-based password authentication scheme,' Computers & Security, Vol. 21, no. 1, pp. 74-76, 2002 https://doi.org/10.1016/S0167-4048(02)00110-4
- C. C. Lee, M. S. Hwang, and W. P. Yang, 'A flexible remote user authentication scheme using smart cards,' ACM Operating Systems Review, Vol. 36, no. 3, pp. 46-52, 2002 https://doi.org/10.1145/567331.567335
- C. C. Lee, L. H. Li, and M. S. Hwang, 'A remote user authentication scheme using hash functions,' ACM Operating Systems Review, Vol. 36, no. 4, pp. 23-29, 2002 https://doi.org/10.1145/583800.583803
- Y. L. Tang, M. S. Hwang, and C. C. Lee, 'A simple remote user authentication scheme. Mathematical and Computer Modelling,' Vol. 36, pp. 103-107, 2002 https://doi.org/10.1016/S0895-7177(02)00106-1
- M. Sandirigama, A. Shimizu, and M. T. Noda, 'Simple and secure password authentication protocol (sas). IEICE Transactions on Communications,' Vol. E83-B, no. 6, pp. 1363-1365, June 2000
- C. L. Lin, H. M. Sun, and T. Hwang, 'Attacks and solutions on strong-password authentication,' IEICE Transactions on Communications, Vol. E84-B, no. 9, pp. 2622-2627, September 2001
- C. M. Chen and W. C. Ku, 'Stolen-verifier attack on two new strong-password authentication protocols,' IEICE Transactions on Communications, Vol. E85-B, no. 11, pp. 2519-2521, November 2002
- C.W. Lin, J.J. Shen, and M.S.Hwang, 'Security enhancement for optimal strong- password authentication protocol,' ACM Operating Systems Review, Vol. 37, no. 2, April 2003
- E. J. Yoon, E. K. Ryu, and K. Y. Yoo, 'Secure SE-OSPA protocol against DoS attack,' Proceeding of LSRC Summer Conference in Korean Institute of Information Scientists and Engineers, Vol. 2, no. 1, pp. 27-31, 2003
- C. W. Lin, C. S. Tasi, and M. S. Hwang, 'A new strong-password authentication scheme using one-way hash function,' Journal of Computer and Systems Sciences International, Vol. 45, no. 4, pp. 623-626, 2006 https://doi.org/10.1134/S1064230706040137
- 김천식, 윤은준, 홍유식, 문남미, '이러닝 시스템에서 사용자 인증을 위한 키스트로크의 응용 기술,' 전자공학회논문지, 제45권, 제CI-5호, pp. 25-31, 2008
- 권정호, 박종태, 'EEE 802.11 무선랜에서 고속 이동성 지원을 위한 사용자 사전 인증 기법,' 전자공학회논문지, 제44권, 제TC-10호, pp. 191-200, 2007
- 이규환, 이주화, 김재현, '무선 메쉬 네트워크의 패스워드 기반 인증 프로토콜,' 전자공학회논문지, 제44권, 제TC-5호, pp. 54-62, 2007
- 이성운, 김현성, 유기영, '패스워드를 변경 가능한 효율적인 패스워드 기반의 인증된 키 교환 프로토콜,' 전자공학회논문지, 제42권, 제TC-2호, pp. 33-38, 2005
- 강명희, 유황빈, '유비쿼터스 컴퓨팅 환경을 위한 익명성을 보장하는 사용자 인증 및 접근제어 모델,' 전자공학회논문지, 제42권, 제CI-4호, pp. 25-32, 2005
- 송영상, 신인철, '서명을 이용한 스마트카드 사용자 인증을 위한 COS 설계,' 전자공학회논문지, 제41권, 제CI-4호, pp. 421-430, 2004
- A. J. Menezes, P. C. Oorschot, and S. A. Vanstone, 'Handbook of applied cryptography,' CRC Press, New York, 1997
- B. Schneier, 'Applied cryptography protocols,' Algorithms and Source Code in C, 2nd edn. John Wiley, Chichester, 1995