References
- Lin, Chu-Hsing, and Yi-Yi Lai. "A fingerprint-based user authentication scheme for multimedia systems." Multimedia and Expo, 2004. ICME'04. Vol. 2. IEEE, 2004. http://dx.doi.org/10.1109/ICME.2004.1394355.
- Xiong Li, Jianwei Niu, Muhammad Khurram Khan, Junguo Liao and Xiaoke Zhao, "Robust three-factor remote user authentication scheme with key agreement for multimedia systems." Security and Communication Networks (2014). http://dx.doi.org/10.1002/ sec.961.
- Lamport, Leslie. "Password authentication with insecure communication." Communications of the ACM 24.11 (1981): 770-772. http://dx.doi.org/10.1145/358790.358797.
- Chuang, Ming-Chin, and Meng Chang Chen. "An anonymous multi-server authenticated key agreement scheme based on trust computing using smart cards and biometrics." Expert Systems with Applications 2014. http://dx.doi.org/10.1016/j.eswa.2013.08.040
- An, Younghwa. "Security analysis and enhancements of an effective biometric-based remote user authentication scheme using smart cards." BioMed Research International 2012. http://dx.doi.org/10.1155/2012/519723
- Xiong Lia, Jian-Wei Niub, Jian Maa, Wen-Dong Wanga, Cheng-Lian Liuc, "Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards." Journal of Network and Computer Applications 34.1 (2011): 73-79. http://dx.doi.org/10.1016/j.jnca.2010.09.003
- Jongho Moon, Younsung Choi, jaewook Jung, Dongho Won, "An Improvement of Robust Biometrics-Based Authentication and Key Agreement Scheme for Multi-Server Environments Using Smart Cards." PloS one 10.12 (2015), http://dx.doi.org/10.1371/journal.pone.0145263
- Younsung Choi, Donghoon Lee, Jiye Kim, Jaewook Jung, Junghyun Nam and Dongho Won, "Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography." Sensors 14.6, 2014. http://dx.doi.org/10.3390/s140610081
- Dodis, Yevgeniy, Leonid Reyzin, and Adam Smith. "Fuzzy extractors: How to generate strong keys from biometrics and other noisy data." Advances in cryptology-Eurocrypt 2004. http://dx.doi.org/10.1007/978-3-540-24676-3_31
- Choi, Younsung, Youngsook Lee, and Dongho Won. "Security Improvement on Biometric Based Authentication Scheme for Wireless Sensor Networks Using Fuzzy Extraction." International Journal of Distributed Sensor Networks, 2016. http://dx.doi.org/10.1155/2016/8572410
- Lauter, Kristin. "The advantages of elliptic curve cryptography for wireless security." IEEE Wireless communications 11.1 (2004): 62-67. http://dx.doi.org/10.1109/MWC.2004.1269719
- Messerges, T. S.; Dabbish, E. A.; Sloan, R. H, "Examining smart-card security under the threat of power analysis attacks". Computers. IEEE Transactions on Computers, 2002, 51(5). http://dx.doi.org/10.1109/TC.2002.1004593
- Nam, Junghyun, et al. "Dictionary Attacks against Password-Based Authenticated Three-Party Key Exchange Protocols." TIIS 7.12 (2013): 3244-3260. http://www.dbpia.co.kr/Article/NODE02405172 https://doi.org/10.3837/tiis.2013.12.016
- Younsung Choi, Donghoon Lee, Jiye Kim, Jaewook Jung and Dongho Won.. "Cryptanalysis of Robust Three-Factor Remote User Authentication Scheme with Key Agreement for Multimedia System." The International Conference on Digital Security and Forensics (DigitalSec2014). The Society of Digital Information and Wireless Communication, 2014. http://sdiwc.net/digital-library/cryptanalysis-of-robust-t hreefactor-remote-user-authentication-scheme-with-ke y-agreement-for-multimedia-system.html
- Das, Amal K. "Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards." Information Security, IET 5.3 (2011): 145-151. http://dx.doi.org/10.1049/iet-ifs.2010.0125
- Li, Chun-Ta, and Min-Shiang Hwang. "An efficient biometrics-based remote user authentication scheme using smart cards." Journal of Network and computer applications 33.1 (2010): 1-5. http://dx.doi.org/10.1016/j.jnca.2009.08.001