References
- C. Chan and L. Cheng, "Cryptanalysis of a remote user authentication scheme using smart cards," IEEE Trans. Consumer Electron., vol. 46, no. 4, pp. 992-993, Nov. 2000. https://doi.org/10.1109/30.920451
- C. Chan and L. Cheng, "Cryptanalysis of timestamp-based password authentication scheme," J. Computers and Security, vol. 21, no. 1, pp. 74-76, 1st Quarter 2001. https://doi.org/10.1016/S0167-4048(02)00110-4
- H. Chien, J. Jan, and Y. Tseng, "An efficient and practical solution to remote authentication: Smart card," J. Computers and Security, vol. 21, no. 4, pp. 372-375, Aug. 2002. https://doi.org/10.1016/S0167-4048(02)00415-7
- Citrix, http://support.citrix.com.
- M. Das, A. Saxena, and V. Gulati, "A dynamic ID-based remote user authentication scheme," IEEE Trans. Consumer Electron., vol. 50, no. 2, pp. 629-631, May 2004. https://doi.org/10.1109/TCE.2004.1309441
- N. Duif, "Smart card implementation of a digital signature scheme for twisted Edwards curves," M.S. Thesis, Technische Universiteit Eindhoven, May, 2011.
- T. Elgamal, "A public key cryptosystem and a signature scheme based on discrete logarithms," IEEE Trans. Inform. Theory, vol. 31, no. 4, pp. 469-472, Jul. 1985. https://doi.org/10.1109/TIT.1985.1057074
- M. Hwang and L. Li, "A new remote user authentication scheme using smart cards," IEEE Trans. Consumer Electron., vol. 46, no. 1, pp. 28-30, Feb. 2000. https://doi.org/10.1109/30.826377
- M. Hwang, C. Lee, and Y. Tang, "A simple remote user authentication scheme," Math. and Computer Modelling, vol. 36, no. 1, pp. 103-107, Nov. 2002. https://doi.org/10.1016/S0895-7177(02)00106-1
- C. Hsu, "Security of two remote user authentication schemes using smart cards," IEEE Trans. Consumer Electron., vol. 49, no. 4, pp. 1196-1198, Nov. 2003. https://doi.org/10.1109/TCE.2003.1261216
- Z. Hao and N. Yu, "A security enhanced remote password authentication scheme using smart card," ISDPE, pp. 56-60, Buffalo, NY, Sept. 2010.
- I. Lee, C. Lee, and M. Hwang, "Security enhancement for a dynamic ID-based remote user authentication scheme," NWeSP, pp. 437-440, Seoul, Korea, Aug. 2005.
- M. Kim, "A brokered authentication scheme based on smart-card for multi-server authentication," J. KICS, vol. 38, no B.3, pp. 190-198, Mar. 2013. https://doi.org/10.7840/kics.2013.38B.3.190
- W. Ku and S. Chen, "Weakness and improvements of an efficient password based remote user authentication using smart cards," IEEE Trans. Consumer Electron., vol. 50, no. 1, pp. 204-207, Feb. 2004. https://doi.org/10.1109/TCE.2004.1277863
- R. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Commun. ACM, vol. 21, no. 2, pp. 120-126, Feb. 1978. https://doi.org/10.1145/359340.359342
- H. Sun, "An efficient remote use authentication scheme using smart cards," IEEE Trans. Consumer Electron., vol. 46, no. 4, pp. 958-961, Nov. 2000. https://doi.org/10.1109/30.920446
- J. Tsai, T. Wu, and K. Tsai, "New dynamic ID authentication scheme using smart cards," IJCS, vol. 23, no. 12, pp. 1449-1462, Dec. 2010.
- Y. Wang, J. Liu, F. Xiao, and J. Dan, "A more efficient and secure dynamic ID-based remote user authentication scene," Computer Comm., vol. 32, pp. 583-585, 2009. https://doi.org/10.1016/j.comcom.2008.11.008
- X. Wang, W. Zhang, J. Zhang, and M. Khan, "Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards," Computer Standards and Interfaces, vol. 29, no. 5, pp. 507-512, Jul. 2007. https://doi.org/10.1016/j.csi.2006.11.005
- E. Yoon, E. Lee, and K. Yoo, "Cryptanalysis of Wang et al.'s remote user authentication scheme using smart cards," ICIT: New Generations, pp. 575-580, Las Vegas, USA, Apr. 2008.
- E. Yoon, E. Ryu, and Y. Yoo, "Further improvement of an efficient password based remote user authentication scheme using smart cards," IEEE Trans. Consumer Electron., vol. 50, no. 2, pp. 612-614, May 2004. https://doi.org/10.1109/TCE.2004.1309437
- E. Yoon, E. Ryu, and Y. Yoo, "An improvement of Hwang-Lee-Tang's simple remote user authentication scheme," Computers & Security, vol. 24, no. 1, pp. 50-56, Feb. 2005. https://doi.org/10.1016/j.cose.2004.06.004
- W. Yang and S. Shieh, "Password authentication schemes with smart cards," Computers and Security, vol. 18, no. 8, pp.727-733, 1999. https://doi.org/10.1016/S0167-4048(99)80136-9
- H. Zhang and M. Li, "Security vulnerabilities of an remote password authentication scheme with smart card," CECNet, pp. 698-701, Xianning, China, Apr. 2011.