Citation: | Qi Wenhua, Zhang Qishan, Liu Jianweiet al. Enhancement of a timestamp-based password authentication scheme[J]. Journal of Beijing University of Aeronautics and Astronautics, 2007, 33(05): 577-579. (in Chinese) |
[1] Yang W H, Shieh S P. Password authentication schemes with smart cards[J]. Computers & Security, 1999, 18(8):727-733 [2] Chan C K, Cheng L M. Cryptanalysis of a timestamp-based password authentication scheme[J].Computer & Security, 2002, 21(1):74-76 [3] Fan L, Li J H, Zhu H W. An enhancement of timestamp-based password authentication scheme[J]. Computer & Security, 2002, 21(7):655-667 [4] Wang Y J, Li J H. Security improvement on a timestamp-based password authentication scheme[J]. IEEE Transaction on Consumer Electronics, 2004, 50(2):580-582 [5] Ku W C, Chen S M. Weaknesses and improvements of an efficient password based user authentication scheme using smart cards[J]. IEEE Transaction on Consumer Electronics, 2004, 50(1):204-207 [6] Yoon E J, Ryu E K, Yoo K Y. Further improvement of an efficient password based remote user authentication scheme using smart cards[J]. IEEE Transaction on Consumer Electronics, 2004, 50(2):612-614 [7] Shieh W G, Wang J M. Efficient remote mutual authentication and key agreement[J]. Computers & Security, 2006,25(1):72-77
|