Citation: | Zhang Lihua, Lü Shanwei. Analysis and improvements of a remote authentication scheme[J]. Journal of Beijing University of Aeronautics and Astronautics, 2005, 31(10): 1076-1079. (in Chinese) |
[1] Lamport L. Password suthentication with insecure communication. Communications of the ACM, 1981, 24(11):770~772 [2] Hwang M S, Li L H. A new remote authentication scheme using smart cards[J] IEEE Transactions on Consumer Electronics, 2000,46(1):28~30 [3] Chan C K, Cheng L M. Cryptanalysis of a remote user authentication scheme using smart cards[J] IEEE Transactions on Consumer Electronics, 2000,46(4):992~993 [4] Shen J J, Lin C W, Hwang M S. A modified remote user authentication scheme using smart cards[J] IEEE Transactions on Consumer Electronics, 2003, 49(2):414~416 [5] Leung K C, Cheng L M, Anthony S Fong, et al. Cryptanalysis of a modified remote user authentication scheme using smart cards [J] IEEE Transactions on Consumer Electronics, 2003, 39(14):1243~1245 [6] Amit K, Awasthi, Sunder L. A remote user authentication scheme using smart cards with forward secrecy[J] IEEE Transactions on Consumer Electronics, 2003, 49(4):1246~1248 [7] Sun H M. An efficient remote use authentication scheme using smart cards[J] IEEE Transactions on Consumer Electronics, 2000, 46(4):958~961 [8] Chien H Y, Jan J K, Tsing Y M. An efficient and practical solution to remote authentication:smart cards[J] Computers and Security, 2002, 21( 4):372~375 [9] Hsu C L. Security of two remote user authentication schemes using smart cards[J] IEEE Transactions on Consumer Electronics, 2003, 49(4):1196~1198. [10] Ku W C, Chen S M. Weaknesses and improvements of an efficient password base remote user authentication scheme using smart cards[J] IEEE Transactions on Consumer Electronics, 2004,50(1):204~206. [11] 李 莉,张焕国. 一种对密码协议攻击的分类分析[J] 计算机工程与应用, 2004,40(1):16~19 Li Li, Zhang Huanguo. Analyzing the attacks types on cryptographic protocol[J] Computer Engineering and Application, 2004,40(1):16~19(in Chinese) [12] Li Gong. A security risk of depending on synchronized clocks[J] Operating Systems Review, 1992, 26(1):49~53
|