暂无分享,去创建一个
[1] Hung-Min Sun,et al. Cryptanalysis of a fingerprint-based remote user authentication scheme using smart cards , 2003, IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings..
[2] Min-Shiang Hwang,et al. A new remote user authentication scheme using smart cards , 2000, IEEE Trans. Consumer Electron..
[3] Yu-Chung Chiu,et al. Improved remote authentication scheme with smart card , 2005, Comput. Stand. Interfaces.
[4] Min-Shiang Hwang,et al. Authenticated Encryption Schemes: Current Status and Key Issues , 2005, Int. J. Netw. Secur..
[5] Yu-Yi Chen,et al. "Paramita wisdom" password authentication scheme without verification tables , 1998, J. Syst. Softw..
[6] Leslie Lamport,et al. Password authentication with insecure communication , 1981, CACM.
[7] Xiaomin Wang,et al. Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices , 2008 .
[8] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[9] Min-Shiang Hwang,et al. Security enhancement for the timestamp-based password authentication scheme using smart cards , 2003, Comput. Secur..
[10] Jean-Paul M. G. Linnartz,et al. New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometric Templates , 2003, AVBPA.
[11] Taher El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.
[12] Muhammad Khurram Khan,et al. Improving the security of 'a flexible biometrics remote user authentication scheme' , 2007, Comput. Stand. Interfaces.
[13] J. K. Lee,et al. Fingerprint-based remote user authentication scheme using smart cards , 2002 .
[14] Lei Fan,et al. An enhancement of timestamp-based password authentication scheme , 2002, Comput. Secur..