References
- L. Lamport, "Password authentication with insecure communication," Communications of the ACM, Vol. 24, No. 11, pp. 770-772, 1981. https://doi.org/10.1145/358790.358797
- M.S. Hwang, L.H. Li, "A new remote user authentication scheme using smart cards," IEEE Transactions on Consumer Electronics, Vol. 46, No. 1, pp. 28-30, 2000. https://doi.org/10.1109/30.826377
- H.M. Sun, "An efficient remote use authentication scheme using smart cards," IEEE Transactions on Consumer Electronics, Vol. 46, No. 4, pp.958-961, 2000. https://doi.org/10.1109/30.920446
- H.Y. Chien, J.K. Jan, Y.M. Tseng, "An efficient and practical solution to remote authentication: smart card," Computers and Security, Vol.21 , No. 4, pp. 372-375, 2002. https://doi.org/10.1016/S0167-4048(02)00415-7
- W.C. Ku, S.M. Chen, "Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards," IEEE Transactions on Consumer Electronics, Vol. 50, No. 1, pp. 204-207, 2004. https://doi.org/10.1109/TCE.2004.1277863
- E.J. Yoon, E.K. Ryu, K.Y. Yoo, "Further improvement of an efficient password based remote user authentication scheme using smart cards," IEEE Transactions on Consumer Electronics, Vol. 50, No. 2, pp. 612-614, 2004. https://doi.org/10.1109/TCE.2004.1309437
- X.M. Wang, W.F. Zhang, J.S. Zhang, M.K Khan, "Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards," Computer Standards & Interfaces, Vol. 29, No. 5, pp. 507-512, 2007. https://doi.org/10.1016/j.csi.2006.11.005
- T.H. Chen, H.C. Hsiang, W.K. Shih, "Security enhancement on an improvement on two remote user authentication schemes using smart cards," Future Generation Computer Systems, 2010 (in press).
- C.L. Hsu, "Security of Chien et al.'s remote user authentication scheme using smart cards," Computers & Standards Interfaces, Vol. 26, No. 3, pp. 167-169, 2004. https://doi.org/10.1016/S0920-5489(03)00094-1
- N.Y. Lee, Y.C. Chiu, "Improved remote authentication scheme with smart card," Computer Standards & Interfaces, Vol. 27, No. 2, pp. 177-180, 2005. https://doi.org/10.1016/j.csi.2004.06.001
- J. Xu, W.T. Zhu, D.G. Feng, "An improved smart card based password authentication scheme with provable security," Computer Standards & Interfaces, Vol. 31, No. 4, pp. 723-728, 2009. https://doi.org/10.1016/j.csi.2008.09.006
- R. Song, "Advanced smart card based password authentication scheme," Computer Standards & Interfaces, Vol. 32, No. 5, pp. 321-325, 2010. https://doi.org/10.1016/j.csi.2010.03.008
- J.K. Lee, S.R. Ryu, K.Y. Yoo, "Fingerprint -based remote user authentication scheme using smart cards," IEE Electronics Letters, Vol. 38, No. 12, pp. 554-555, 2002. https://doi.org/10.1049/el:20020380
- H.S. Kim, S.W.Lee, K.Y. Yoo, "ID-based Password Authentication Scheme using Smart Cards and Fingerprints," ACM Operating Systems Review, pp. 32-41, 2003.
- C.H. Lin, Y.Y. Lai, "A flexible biometrics remote user authentication scheme," Computer Standard & Interfaces, Vol. 27, No. 1, pp. 19-23, 2004. https://doi.org/10.1016/j.csi.2004.03.003
- M.K. Khan, J. Zhang, "Improving the security of 'a flexible biometrics remote user authentication scheme," Computer Standards & Interfaces, Vol. 29, No. 1, pp. 82-85, 2007. https://doi.org/10.1016/j.csi.2006.01.002
- C.T. Li, M.S. Hwang, "An efficient biometrics-based remote user authentication scheme using smart cards," Journal of Network and Computer Applications, Vol. 33, No. 1, pp. 1-5, 2010. https://doi.org/10.1016/j.jnca.2009.08.001
- O. Kommerling, M.G. Kuhn, "Design Principles for Tamper-Resistant Smartcard Processors," Proceedings of the USENIX Workshop on Smartcard Technology, pp. 9-20, 1999.
- S. Ravi, A. Raghunathan, S. Chakradhar, "Tamper Resistance Mechanisms for Secure Embedded Systems," IEEE Proceedings of the 17th International Conference on VLSI Design, pp. 605-611, 2004.
- H. Jin, G. Myles, J. Lotspiech, "Towards Better Software Tamper Resistance," Lecture Notes in Computer Science, Vol. 3650, pp. 417-430, 2005. https://doi.org/10.1007/11556992_30
- P. Wang, S.K. Kang, K. Kim, "Tamper Resistant Software Through Dynamic Integrity Checking," The 2005 Symposium on Cryptography and Information Security, 2005.
- X. Leng, "Smart card applications and security," Information Security Technical Report, Vol. 14 pp. 36-45, 2009. https://doi.org/10.1016/j.istr.2009.06.006
- http://www.smartcardalliance.org/pages/smart-cards-faq#how-do-smart-cards-help-to-protect-privacy
- M. Feldhofer, C. Rechberger, "A case against currently used hash functions in RFID protocols," Lecture Notes in Computer Science, Vol. 4277 pp. 372-381, 2006. https://doi.org/10.1007/11915034_61