TANG Hong-bin LIU Xin-song. Robust and efficient remote authentication with key agreement protocol[J]. Journal of Computer Applications, 2012, 32(05): 1381-1384.
[1]LAMPORT L. Password authentication with insecure communication[J].Communication of the ACM, 1981, 24(11): 770-772.[2]PEYRAVIAN M, ZUNIC N. Methods for protecting password transmission[J]. Computers & Security, 2000, 19(5): 466-469.[3]LEE C C, LI L H, HWANG M S. A remote user authentication scheme using hash functions[J].ACM SIGOPS Operating Systems Review, 2002, 36(4): 23-29.[4]HWANG J J, YEH T C. Improvement on Peyravian-Zunic's password authentication schemes[J].IEICE Transactions on Communications, 2002,E85-B(4): 823-825.[5]PEYRAVIAN M, JEFFRIES C. Secure remote user access over insecure networks[J].Computer Communications, 2006, 29(5): 660-667.[6]KU W C, CHEN C M, HUI L. Cryptanalysis of a variant of Peyravian-Zunic's password authentication scheme[J].IEICE Transactions on Communications, 2003, E86-B(5): 1682-1684.[7]LIN C L, HWANG T. A password authentication scheme with secure password updating[J]. Computers & Security, 2003, 22(1): 68-72.[8]ZHU L, YU S, ZHANG X. Improvement upon mutual password authentication scheme[C]// International Seminar on Business and Information Management.Wuhan:IEEE, 2008, 1: 400-403.[9]ISLAM SK H, BISWAS G P. Improved remote login scheme based on ECC[C]// International Conference on Recent Trends in Information Technology. Washington, DC: IEEE Computer Society, 2011: 1221-1226.[10]YOON E J, YOO K Y. Robust user password change scheme based on the elliptic curve cryptosystem[J].Fundamenta Informaticae, 2008, 87(3/4): 483-492.[11]HE D B. Weaknesses in an ECC-based AKA protocol for wireless mobile communications [EB/OL]. [ 2011-09-11].http://eprint.iacr.org/2011/336.pdf.[12]KOBLITZ N. Elliptic curve cryptosystems[J].Mathematics of Computation, 1987, 48(177): 203-209.[13]CERTICOM RESEARCH. Standard for efficient cryptography, SEC 1: EC Cryptography. Ver. 1.0[EB/OL]. [ 2011-09-11].http://www.secg.org/collateral/sec1.pdf.[14]DENNING D E, SACCO G M. Timestamps in key distribution protocols[J].Communications of the ACM, 1981,24(8): 533-536.