[1]
|
W. Ford and B. S. Kaliski, “Server-Assisted Generation of a Strong Secret from a Password,” Proceedings of IEEE 9th International Workshop Enabling Technologies, June 2000, pp. 176-180.
|
[2]
|
D. P. Jablon, “Password Authentication Using Multiple Servers,” Proceedings of RSA Security Conference, April 2001, pp. 344-360.
|
[3]
|
I. C. Lin, M. S. Hwang and L. H. Li, “A New Remote User Authentication Scheme for Multi-Server Architecture,” Future Generation Computer System, Vol. 19, No. 1, 2003, pp. 13-22.
|
[4]
|
W. S. Juang, “Efficient Multi-Server Password Authenticated Key Agreement using Smart Cards,” IEEE Transactions on Consumer Electronics, Vol. 50, No. 1, 2004, pp. 251-255.
|
[5]
|
C. C. Chang and J. S. Lee, “An Efficient and Secure Multi-Server Password Authentication Scheme Using Smart Cards,” Proceedings of International Conference on Cyber Worlds, November 2004, pp. 417-422.
|
[6]
|
L. Hu, X. Niu and Y. Yang, “An Efficient Multi-Server Password Authenticated Key Agreement Scheme Using Smart Cards,” Proceedings of International Conference on Multimedia and Ubiquitous Engineering (MUE’07), April 2007, pp. 903-907.
|
[7]
|
Y. Yang, R. H. Deng and F. Bao, “A Practical Password-Based Two-Server Authentication and Key Exchange System,” IEEE Transactions on Dependable and Secure Computing, Vol. 3, No. 2, 2006, pp. 105-114.
|
[8]
|
J. L. Tsai, “Efficient Multi-Server Authentication Scheme Based on One-Way Hash Function without Verification Table,” Computers & Security, Vol. 27, No. 3-4, 2008, pp. 115-121.
|
[9]
|
Y. P. Liao and S. S. Wang, “A Secure Dynamic ID-Based Remote User Authentication Scheme for Multi-Server Environment,” Computer Standards & Interface, Vol. 31, No. 1, 2009, pp. 24-29.
|
[10]
|
H. C. Hsiang and W. K. Shih, “Improvement of the Secure Dynamic ID Based Remote User Authentication Scheme for Multi-Server Environment,” Computer Standards & Interface, Vol. 31, No. 6, 2009, pp. 1118-1123.
|
[11]
|
S. K. Sood, A. K. Sarje and K. Singh, “A Secure Dynamic Identity Based Authentication Protocol for Multi-Server Architecture,” Journal of Network and Computer Applications, Vol. 34, No. 2, 2011, pp. 609-618.
|
[12]
|
P. Kocher, J. Jaffe and B. Jun, “Differential Power Analysis,” Proceedings of CRYPTO 99, Springer-Verlag, August 1999, pp. 388-397.
|
[13]
|
T. S. Messerges, E. A. Dabbish and R. H. Sloan, “Examining Smart-Card Security under the Threat of Power Analysis Attacks,” IEEE Transactions on Computers, Vol. 51, No. 5, 2002, pp. 541-552.
|