JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2017, Vol. 52 ›› Issue (1): 37-42.doi: 10.6040/j.issn.1671-9352.2.2015.289
Previous Articles Next Articles
QU Juan1, LI Yan-ping2
CLC Number:
[1] LAMPORT L. Password authentication with insecure communication[J]. Communications of the ACM, 1981, 24(11):770-772. [2] HWANG M S, LI L H. A new remote user authentication scheme using smart cards[J]. IEEE Transactions on Consumer Electronics, 2000, 46(1):28-30. [3] LIN C H, LAI Y Y. A flexible biometrics remote user authentication scheme[J]. Computer Standards & Interfaces, 2004, 27(1):19-23. [4] KHAN M K, ZHANG J. Improving the security of a flexible biometrics remote user authentication scheme[J]. Computer Standards & Interfaces, 2007, 29(1): 82-85. [5] TSAI J L. Efficient multi-server authentication scheme based on one-way hash function without verification table[J]. Computers & Security, 2008, 27(3): 115-121. [6] TSENG H R, JAN R H, YANG W. A bilateral remote user authentication scheme that preserves user anonymity[J]. Security and Communication Networks, 2008,1(4): 301-308. [7] ZHU H F, HAO X, ZHANG Y F, et al. A biometrics-based multi-server key agreement scheme on chaotic maps cryptosystem[J]. Journal of Information Hiding and Multimedia Signal Processing, 2015, 6(2): 211-224. [8] TSAI C S, LEE C C, HWANG M S. Password Authentication Schemes: current status and key issues[J]. Internatonal Journal of Network Security, 2006, 3(2): 101-115. [9] DAS M L, SAXEAN A, GULATI V P. A dynamic ID-based remote user authentication scheme[J]. IEEE Transactions on Consumer Electronics, 2004, 50(2): 629-631. [10] KU W C, CHANG S T. Impersonation attack on a dynamic ID-based remote user authentication scheme using smart cards[J]. IEICE Transactions on Communications, 2005, 88(5):2165-2167. [11] WANG Y, LIU J, XIAO F, et al. A more efficient and secure dynamic ID-based remote user authentication scheme[J]. Computer Communications, 2009, 32(4): 583-585. [12] LIAO C H, CHEN H C, WANG C T. An exquisite mutual authentication scheme with key agreement using smart card[J]. Informatica, 2009, 33(2): 117-124. [13] SHIN S, KIM K, KIM K H, et al. A remote user authentication scheme with anonymity for mobile devices[J]. International Journal of Advanced Robotic Systems, 2012, 9(13): 1-7. [14] LEE Y C. Weakness and Improvement of the Smart Card Based Remote User Authentication Scheme with Anonymity [J]. Journal of Information Science and Engineering, 2013, 29(6): 1121-1134. |
[1] | ZHU Zhi-qiang, MA Ke-xin, SUN Lei. A zero-knowledge proof based remote desktop authentication protocol [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(9): 47-52. |
[2] | . A system of monitoring and protecting Android privacy leakage [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(9): 59-67. |
[3] | WAN Zhi-ping. An authentication protocol based on hybrid Das protocol for wireless sensor networks [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2015, 50(05): 12-17. |
[4] | WANG Xu-yu, JING Feng-xuan, WANG Yu-qing. An improved hash-based RFID security authentication algorithm [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2014, 49(09): 154-159. |
[5] | NI Liang1,2,3, CHEN Gong-liang3, LI Jian-hua3. Security analysis of the eCK model [J]. J4, 2013, 48(7): 46-50. |
[6] | WANG Ding1,2, XUE Feng1, WANG Li-ping1, MA Chun-guang2. Improved password-based key agreement scheme with perfect forward secrecy [J]. J4, 2012, 47(9): 19-25. |
[7] | WANG Juan1,2, HE Qi1, YAN Fei1,2, JIANG Wan-wei1, YANG Ming1, WANG Yan1. A user-centric identity management and authentication system for mobile Internet [J]. J4, 2012, 47(11): 12-17. |
[8] | PAN Xiao-zhong1, 2, LUO Peng1, LIU Fang-ming1, LEI Yu1. Design of digital authentication camera based on FPGA [J]. J4, 2012, 47(11): 59-66. |
[9] | SHI Runhua, ZHONG Hong. A novel anonymous threshold secret sharing scheme [J]. J4, 2012, 47(11): 31-39. |
[10] | ZHENG Shi-hui,WANG Shao-hui and ZHANG Guo-yan . A dynamic secure and efficient group key agreement protocol [J]. J4, 2006, 41(2): 89-93 . |
|