[1] NEWELL A, YAO H, RYKER A. Node-capture resilient key establishment in sensor networks:design space and new protocols[J]. ACM Computing Surveys, 2014, 47(2):1-24. [2] WANG D, WANG P. On the anonymity of two-factor authentication schemes for wireless sensor networks:attacks, principle and solutions[J]. Computer Networks, 2014, 73:41-57. [3] BONNEAU J. The science of guessing:analyzing an anonymized corpus of 70 million passwords[C]//Proceedings of the 2012 IEEE Symposium on Security and Privacy. Piscataway:IEEE, 2012:538-552. [4] DAS M. Two-factor user authentication in wireless sensor networks[J]. IEEE Transactions on Wireless Communications, 2009, 8(3):1086-1090. [5] HE D, GAO Y, CHAN S, et al. An enhanced two-factor user authentication scheme in wireless sensor networks[J]. Ad Hoc Sensor & Wireless Networks, 2010, 10(4):361-371. [6] XUE K, MA C, HONG P, et al.A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks[J]. Journal of Network and Computer Applications, 2012, 36(1):316-323. [7] MESSERGES T S, DABBISH E A, SLOAN R H. Examining smart-card security under the threat of power analysis attacks[J]. IEEE Transactions on Computers, 2002, 51(5):541-552. [8] KIM T H, KIM C, PARK I. Side channel analysis attacks using AM demodulation on commercial smart cards with seed[J]. Journal of Systems and Software, 2012, 85(12):2899-2908. [9] WANG D, WANG P. Offline dictionary attack on password authentication schemes using smart cards[C]//Proceedings of the 16th Information Security Conference. Berlin:Springer, 2014:1-16. [10] LIU C, GAO F, MA C, et al. User authentication protocol with anonymity in wireless sensor network[J]. Computer Engineering, 2012, 38(22):99-103. (刘聪,高峰修,马传贵,等.无线传感器网络中具有匿名性的用户认证协议[J].计算机工程,2012,38(22):99-103.) [11] YAN L, ZHANG S, CHANG Y. A user authentication and key agreement scheme for wireless sensor networks[J]. Journal of Chinese Computer Systems, 2013, 34(10):2342-2344. (闫丽丽,张仕斌,昌燕.一种传感器网络用户认证与密钥协商协议[J].小型微型计算机系统,2013,34(10):2342-2344.) [12] WANG D, MA C,WENG C,et al. Cryptanalysis and improvement of a remote user authentication scheme for resource-limited environment[J]. Journal of Electronics & Information Technology, 2012, 34(10):2520-2526. (汪定,马春光,翁臣,等.一种适于受限资源环境的远程用户认证方案的分析与改进[J].电子与信息学报,2012,34(10):2520-2526.) [13] ZAN Y, LIU W, JIANG F. Remote user mutual authentication scheme based on dynamic ID[J]. Journal of Information Engineering University, 2014,15(3):262-269. (昝亚洲,刘文芬,蒋峰云.基于动态ID的远程用户交互认证方案[J].信息工程大学学报,2014,15(3):262-269.) [14] XUE F, WANG D, WANG L, et al. Cryptanalysis of two smartcard-based remote user password authentication protocols[J]. Journal of Computer Applications, 2012, 32(7):221-224. (薛锋,汪定,王立萍,等.对两个基于智能卡的远程用户口令认证协议的安全性分析[J].计算机应用,2012,32(7):221-224.) [15] MA C, WANG D, ZHAO S. Security flaws in two improved remote user authentication schemes using smart cards[J]. International Journal of Communication Systems, 2014, 27(10):2215-2227. |