1 |
李晓伟,张玉清,张格非,等.基于智能卡的强安全认证与密钥协商协议[J].电子学报,2014,42(8):1587-1593. 10.3969/j.issn.0372-2112.2014.08.020
|
|
LI X W, ZHANG Y Q, ZHANG G F, et al. Strongly secure authenticated key agreement protocol using smart card [J]. Acta Electronica Sinica, 2014, 42(8): 1587-1593. 10.3969/j.issn.0372-2112.2014.08.020
|
2 |
LAMPORT L. Password authentication with insecure communication [J]. Communications of the ACM, 1981, 24(11): 770-772. 10.1145/358790.358797
|
3 |
JUANG W S, CHEN S T, LIAW H T. Robust and efficient password-authenticated key agreement using smart cards [J]. IEEE Transactions on Industrial Electronics, 2008, 55(6): 2551-2556. 10.1109/tie.2008.921677
|
4 |
SUN D Z, HUAI J P, SUN J Z, et al. Improvements of Juang’s password-authenticated key agreement scheme using smart cards [J]. IEEE Transactions on Industrial Electronics, 2009, 56(6): 2284-2291. 10.1109/tie.2009.2016508
|
5 |
BELLARE M, POINTCGEVAL D, ROGAWAY P. Authenticated key exchange secure against dictionary attacks [C]// Proceedings of the 2000 International Conference on the Theory and Applications of Cryptographic Techniques, LNCS1807. Berlin: Springer, 2000: 139-155.
|
6 |
王倩.基于口令的智能卡认证密钥协商协议的研究与设计[D].沈阳:沈阳师范大学,2014:24-28. 10.1109/icact.2015.7224880
|
|
WANG Q. Research and design of password-based mutual authentication key agreement scheme with smart card [D]. Shenyang: Shenyang Normal University, 2014: 24-28. 10.1109/icact.2015.7224880
|
7 |
MISHRA D, DAS A K, CHATURVEDI A, et al. A secure password-based authentication and key agreement scheme using smart cards [J]. Journal of Information Security and Applications, 2015, 23:28-43. 10.1016/j.jisa.2015.06.003
|
8 |
李晓伟,杨邓奇,陈本辉,等.基于生物特征和口令的双因子认证与密钥协商协议[J].通信学报,2017,38(7):89-95. 10.11959/j.issn.1000-436x.2017148
|
|
LI X W, YANG D Q, CHEN B H, et al. Two-factor authenticated key agreement protocol based on biometric feature and password [J]. Journal on Communications, 2017, 38(7):89-95. 10.11959/j.issn.1000-436x.2017148
|
9 |
薛素静,孔梦荣.基于单向哈希函数的远程口令认证方案[J]. 计算机应用研究,2008,25(2):512-515. 10.3969/j.issn.1001-3695.2008.02.060
|
|
XUE S J, KONG M R. New remote password authentication scheme based on one-way hash function [J]. Application Research of Computers, 2008, 25(2):512-515. 10.3969/j.issn.1001-3695.2008.02.060
|
10 |
刘润杰,刘恒超,申金媛.一种改进的智能卡远程用户匿名认证方案[J].计算机工程与科学,2016,38(3):465-470. 10.3969/j.issn.1007-130X.2016.03.011
|
|
LIU R J, LIU H C, SHEN J Y. An improved remote user anonymous authentication scheme using smart cards [J]. Computer Engineering and Science, 2016, 38(3): 465-470. 10.3969/j.issn.1007-130X.2016.03.011
|
11 |
龙威.基于生物特征的匿名身份认证研究[D].北京:北京交通大学,2015:33-36. 10.18552/2016/scmt4s312
|
|
LONG W. Research on anonymous identity authentication based on biometrics [D]. Beijing: Beijing Jiaotong University, 2015: 33-36. 10.18552/2016/scmt4s312
|
12 |
李艳平,刘小雪,屈娟,等.基于智能卡的多服务器远程匿名认证密钥协商协议[J].四川大学学报(工程科学版),2016,48(1):91-98. 10.15961/j.jsuese.2016.01.014
|
|
LI Y P, LIU X X, QU J, et al. Multi-server anonymous remote authenticated key agreement protocol based on smart card [J]. Journal of Sichuan University (Engineering Science Edition), 2016, 48(1): 91-98. 10.15961/j.jsuese.2016.01.014
|
13 |
侯枫.一种新型的基于口令和生物特征的双因子认证与密钥协商协议[J].宏观经济管理,2017(S1):239-240.
|
|
HOU F. A new two-factor authentication and key agreement protocol based on password and biometric feature [J]. Macroeconomic Management, 2017(S1):239-240.
|
14 |
刘鑫玥,潘巍,王新艳,等.一种更安全的基于智能卡的多服务器身份认证方案研究[J].计算机应用研究,2017,34(11):3446-3450. 10.3969/j.issn.1001-3695.2017.11.055
|
|
LIU X Y, PAN W, WANG X Y, et al. Research of smart card based multi-server identity authentication scheme [J]. Application Research of Computers, 2017, 34(11): 3446-3450. 10.3969/j.issn.1001-3695.2017.11.055
|
15 |
HE D B, ZHANG Y Y, CHEN J H. Robust biometric-based user authentication scheme for wireless sensor networks [J]. Ad Hoc and Sensor Wireless Networks, 2015, 25: 309-321.
|
16 |
CHUANG M C, CHEN M C. An anonymous multi-server authenticated key agreement scheme based on trust computing using smart cards and biometric [J]. Expert Systems with Applications, 2014, 41(4): 1411-1418. 10.1016/j.eswa.2013.08.040
|
17 |
MISHRA D, DAS A K, MUKHOPADHYAY S. A secure user anonymity-preserving biometric-based multi-server authenticated key agreement scheme using smart cards [J]. Expert Systems with Applications, 2014, 41(18): 8129-8143. 10.1016/j.eswa.2014.07.004
|
18 |
王瑞兵,陈建华,张媛媛.一个匿名的基于生物特征的多服务器的密钥认证协议方案的研究[J].计算机应用研究,2016,33(7):2190-2196. 10.3969/j.issn.1001-3695.2016.07.059
|
|
WANG R B, CHEN J H, ZHANG Y Y. Research of anonymous biometric-based multi-server authentication key agreement scheme using smart card [J]. Application Research of Computers, 2016, 33(7): 2190-2196. 10.3969/j.issn.1001-3695.2016.07.059
|
19 |
CHAUDHRY S A. A secure biometric based multi-server authentication scheme for social multimedia network [J]. Multimedia Tools and Applications, 2016, 75(20): 12705-12725. 10.1007/s11042-015-3194-0
|
20 |
夏鹏真,陈建华.基于椭圆曲线密码的多服务器环境下三因子认证协议[J].计算机应用研究,2017,34(10):3061-3067. 10.3969/j.issn.1001-3695.2017.10.041
|
|
XIA P Z, CHEN J H. Three-factor authentication scheme for multi-server environments based on elliptic curve cryptography [J]. Application Research of Computers, 2017, 34(10): 3061-3067. 10.3969/j.issn.1001-3695.2017.10.041
|
21 |
殷秋实,陈建华.多服务器环境下基于椭圆曲线密码的改进的身份认证协议[J].计算机科学,2018,45(6):111-116,150. 10.11896/j.issn.1002-137X.2018.06.019
|
|
YIN Q S, CHEN J H. Improved identity authentication protocol based on elliptic curve cryptography in multi-server environment [J]. Computer Science, 2018, 45(6): 111-116, 150. 10.11896/j.issn.1002-137X.2018.06.019
|
22 |
杜浩瑞,陈建华,戚明平,等.一个前向安全的基于RSA的多服务器的认证协议[J].计算机科学,2019,46(11A):409-413, 437.
|
|
DU H R, CHEN J H, QI M P, et al. Forward-secure RSA-based multi-server authentication protocol [J]. Computer Science, 2019, 46(11A): 409-413, 437.
|
23 |
李晓伟.可证明安全的认证与密钥协商协议研究[D].西安:西安电子科技大学,2013:40-47. 10.1109/icmecg.2014.29
|
|
LI X W. Research on provably secure authenticated key agreement protocol [D]. Xi’an: Xidian University, 2013: 40-47. 10.1109/icmecg.2014.29
|
24 |
曹建宇.匿名认证与密钥分配协议研究[D].桂林:桂林电子科技大学,2012:21-26.
|
|
CAO J Y. Research on anonymous authentication and key distribution protocol [D]. Guilin: Guilin University of Electronic Technology, 2012: 21-26.
|
25 |
CHIOU S Y, YING Z Q, LIU J Q. Improvement of a privacy authentication scheme based on cloud for medical environment[J]. Journal of Medical Systems, 2016, 40(4): Article No.101. 10.1007/s10916-016-0453-1
|
26 |
WANG D, WANG N, WANG P, et al. Preserving privacy for free: efficient and provably secure two-factor authentication scheme with user anonymity [J]. Information Sciences, 2015, 321: 162-178. 10.1016/j.ins.2015.03.070
|
27 |
胡兆鹏,丁卫平,高瞻,等.一种基于区块链技术的多阶段级联无线安全认证方案[J].计算机科学,2019,46(12):180-185. 10.11896/jsjkx.181102170
|
|
HU Z P, DING W P, GAO Z, et al. Multi-stage cascade wireless security authentication scheme based on blockchain technology [J]. Computer Science, 2019, 46(12): 180-185. 10.11896/jsjkx.181102170
|