参考文献
[1]Fan Rong,He Daojing.An Efficient and DoS-resistant User Authentication Scheme for Two-tiered Wireless Sensor Networks[J].Journal of Zhejiang University:Science C,2011,12(7):550-560.
[2]Jiang Qi,Ma Jianfeng,Li Guangsong,et al.An Enhanced Authentication Scheme with Privacy Preservation for Roaming Service in Global Mobility Networks[J].Wireless Personal Communications,2013,68(4):1477-1491.
[3]Pippal R S,Jaidhar C D.Secure Key Exchange Scheme for IPTV Broadcasting[J].Informatica,2012,36(1):47-52.
[4]Liao Yipin,Wang Shenshang.A Secure Dynamic ID Based Remote User Authentication Scheme for Multi-server Environment[J].Computer Standards & Interfaces,2009,31(1):24-29.
[5]Chen Te-Yu,Hwang Min-Shiang,Lee Cheng-Chi,et al.Cry-ptanalysis of a Secure Dynamic ID Based Remote User Auth-entication Scheme for Multi-server Environment[C]//Proceedings of the 4th International Conference on
Innovative,Computing,Information and Control.Washington D.C.,USA:IEEE Computer Society,2009:725-728.
[6]Hsiang C,Shih W K.Improvement of the Secure Dynamic ID Based Remote User Authentication Scheme for Multi-server Environment[J].Computer Standards & Interfaces,2009,31(6):1118-1123.
[7]Lee C C,Lin Tsung-Hung,Chang Ruixiang.A Secure Dynamic ID Based Remote User Authentication Scheme for Multi-server Environment Using Smart Cards[J].Expert Systems with Applications,2011,38(11):13863-13870.
[8]Li Xiong,Xiong Yongping,Jian Ma,et al.An Efficient and Security Dynamic Identity Based Authentication Protocol for Multi-server Architecture Using Smart Cards[J].Journal of Network and Computer Applications,2012,35(2):763-769.
[9]Xue Kaiping,Hong Peilin,Ma Changsha.A Light Weight Dynamic Pseudonym Identity Based Authentication and Key Agreement Protocol Without Verification Tables for Multi-server Architecture[J].Journal of Computer and System
Sciences,2012,80(1):195-206.
[10]万涛,廖维川,马建峰.面向多服务器架构的认证协议分析与改进[J].西安电子科技大学学报,2013,40(6):174-179.
[11]Wang Bin,Ma Maode.A Smart Card Based Efficient and Secured Multi-server Authentication Scheme[J].Wireless Personal Communications,2013,68(2):361-378.
[12]Ravi S P,Jaidhar C D,Shashikala T.Robust Smart Card Authentication Scheme for Multi-server Architecture[J].Wireless Personal Communication,2013,72(1):729-745.
[13]Guo Dianli,Wen Fengtong.Analysis and Improvement of a Robust Smart Card Based-authentication Scheme for Multi-server Architecture[J].Wireless Personal Com-munications,2014,78(1):475-490.
[14]Burrows M,Abadi M,Needham R M.A Logic of Authentication[J].Proceedings of the Royal Society of London,Series A:Mathematical and Physical Sciences,1989,426(1871):233-271.
[15]Kessler V,Wedel G.AUTLOG——An Advanced Logic of Authentication[C]//Proceedings of IEEE Computer Security Foundations Workshop VII.Franconia,USA:IEEE Press,1994:90-99.
[16]Kemal B,Nazife B.One-time Passwords:Security Analysis Using BAN Logic and Integrating with Smart Card Authentication[J].Lecture Notes in Computer Science,2003,2869:794-801.
编辑刘冰 |