References
[ I ]. Junquing Liu, Jun Sun, Tianhao Li, "An Enhanced
Remote Login Authentication with Smart Card", IEEE
Transactions on consumer Electronics, SIPS 2005, pp, 229-
232,
[2]. H. Y. Chien, J. K. Jon, and Y. M. Tseng, "An Efficient and
Practical Solution to Remote Authentication: Smart Card" ,
Computers & Security, Vol, 2 I {4) pp. 372-375, 2002.
[3]. C . L. Hsu, "Security of Two Remote User Authentication
Schemes Using Smart Cards", IEEE Trans. On Consumer
Electronics, Vol. 49, pp. I I 96- I I 98, 2003,
[4]. L.Lamport, "password authentication with insecure
communication," Communications of the ACM, vol,24,
no.1 I , pp. 770-772, I 981 . Authentication Technologies,
Smartcards, Key.
[5]. R.C-W.Phan and B-M Goi, "Further Attacks and
Comments on 'Security of Two Remote User
Authentication Schemes Using Smart Cards," IEEE Trans.
Consumer Electronics~, pp. 609-61 I , April 2004.
[6]. T.ElGamaI, "A Public-key cryptosystem and a
signature scheme based on discrete logarithms, IEEE
Transactions on informatlonTheory { I 985).
[7]. Y. Ding and R Horsier, "Undetectable on-line password
guessing attacks," ACM Operating Systems Review, Vol,
29{4), pp. 77-86, 1995.
[8]. H. M. Sun, "An Efficient Remote User Authentication
Scheme Using Smart Cards", IEEE Trans. on Cons. Elec.,
VoL 46, pp. 958- 96 I , 2000,
[9]. A. K. Awasthi and S. LaI, "A Remote User
Authentication Scheme Using Smart Cards with Forward
Secrecy" , IEEE Trans. On Consumer Electronics, 2003 .
[l0]. Ya-Fen Chang, Chien-Chen Chang, Yu-Wei Su, "A Secure improvement on the User.-Friendly Remote Authentication Scheme with no Time Concurrency
Mechanism", Proceedings of the 20h International
Conference on Advanced information Networking
Applications(AINA'05).
[ I I ]. Eun-Jun Yoon, Kee-Young Yoo, "More Efficient and Secure Remote User Authentication Scheme Using Smart
Cards", Proceedings of the 2005 11'h international
Conference on Parallel and Distributed Systems
(iCPADS'05).