[1] LEE C-C, LI L-H, HWANG M-S. A remote user authentication scheme using Hash functions [J]. ACM Sigops Operating Systems Review, 2002, 36(4): 23-29. [2] RAMASAMY R, MUNIYANDI A. New remote mutual authentication scheme using smart cards [J]. Transaction on Data Privacy, 2009, 2(2): 141-152. [3] YANG J, WANG Y, ZHOU Y. New remote user authentication scheme using smart cards [J]. Transactions of Nanjing University of Aeronautics & Astronautics, 2012, 29(2): 187-192. [4] XUE F, WANG D, WANG L, et al. Cryptanalysis of two smartcard-based remote user password authentication protocols [J]. Journal of Computer Applications, 2012,32(7):221-224. (薛锋,汪定,王立萍,等.对两个基于智能卡的远程用户口令认证协议的安全性分析[J].计算机应用,2012,32(7):221-224.) [5] LIN I-C, HWANG M-S, LI L-H. A new remote user authentication scheme for multi-server architecture [J]. Future Generation Computer Systems, 2003, 19(1): 13-22. [6] TSAI J-L. Efficient multi-server authentication scheme based on one-way Hash function without verification table [J]. Computers & Security, 2008, 27(3/4): 115-121. [7] WAN T, LIAO W, MA J. Analysis and improvement of an authentication protocol for multi-server architecture [J]. Journal of Xidian University: Natural Science, 2013, 40(6): 174-179. (万涛,廖维川,马建峰.面向多服务器架构的认证协议分析与改进[J].西安电子科技大学学报:自然科学版,2013,40(6):174-179.) [8] HU L, NIU X, YANG Y. An efficient multi-server password authenticated key agreement scheme using smart cards [C]//MUE'07: Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering. Piscataway: IEEE, 2007: 903-907. [9] LIAO Y-P, WANG S-S. A secure dynamic ID based remote user authentication scheme for multi-server environment [J]. Computer Standards & Interfaces, 2009, 31(1): 24-29. [10] HSIANG H-C, SHIH W-K. Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment [J]. Computer Standards & Interfaces, 2009, 31(6): 1118-1123. [11] LEE C-C, LIN T-H, CHANG R-X. A secure dynamic ID based remote user authentication scheme for multi-server environment using smart cards [J]. Expert Systems with Applications, 2011, 38(11): 13863-13870. [12] LEE C-C, LAI Y-M, LI C-T. An improved secure dynamic ID based remote user authentication scheme for multi-server environment [J]. International Journal of Security and Its Applications, 2012, 6(2): 203-209. [13] XU C, JIA Z, WEN F, et al. Cryptanalysis and improvement of a dynamic ID based remote user authentication scheme using smart cards [J]. Journal of Computational Information Systems, 2013, 9(14): 5513-5520. [14] CHOI Y, NAM J, LEE D, et al. Security enhanced anonymous multiserver authenticated key agreement scheme using smart cards and biometrics [J]. The Scientific World Journal, 2014, 2014: 281305. [15] CHUANG M-C, CHEN M C. An anonymous multi-server authenticated key agreement scheme based on trust computing using smart cards and biometrics [J]. Expert Systems with Applications, 2014, 41(4): 1411-1418. [16] CHEN T-H, WANG B-J, TU T-Y, et al. A security-enhanced key agreement protocol based on chaotic maps [J]. Security and Communication Networks, 2013, 6(1): 108-114. [17] JABBARI A, BAGHERZADEH J. A revised key agreement protocol based on chaotic maps [J]. Nonlinear Dynamics, 2014, 78(1): 669-680. [18] ZHU H. Flexible and password-authenticated key agreement scheme based on chaotic maps for multiple servers to server architecture [J]. Wireless Personal Communications, 2015, 82(3): 1697-1718. [19] SHU J. An authenticated key agreement protocol based on extended chaotic maps [J]. Acta Physica Sinica, 2014, 63(5): 1-4. (舒剑.基于扩展混沌映射的认证密钥协商协议[J].物理学报,2014,63(5):1-4.) [20] ZHANG L. Cryptanalysis of the public key encryption based on multiple chaotic systems [J]. Chaos, Solitons & Fractals, 2008, 37(3): 669-674. |