参考文献
|
-
[1] L. Lamport, “Password authentication with insecure communication,” Communications of the ACM, Vol. 24, pp. 770-772, 1981.
連結:
-
[2] M. S. Hwang and L. H. Li, “A new remote user authentication scheme using smart card, ” IEEE Transactions on Consumer Electronics, Vol. 46, pp. 28-30, 2000.
連結:
-
[3] C. K. Chan, “Cryptanalysis of a remote user authentication scheme using smart cards,” IEEE Transactions on Consumer Electronics, Vol. 46, pp. 992-993, 2000.
連結:
-
[4] H. M. Sun, “An efficient remote use authentication scheme using smart cards,” IEEE Transactions on Consumer Electronics, Vol. 46, pp. 958-961, 2000.
連結:
-
[5] M. L. Das, A. Saxena and V. p. Gulati, “A dynamic ID-based remote user authentication scheme,” IEEE Transactions on Consumer Electronics, Vol. 50, pp. 629-631, 2004.
連結:
-
[6] Y. Wang, J. Liu, F. Xiao and J. Dan, “A more efficient and secure dynamic ID-based remote user authentication scheme,” Computer Communications, Vol. 32, pp. 583-585, 2009.
連結:
-
[7] E. J. Yoon, K. Y. Yoo and K. S. Ha, “A user friendly authentication scheme with anonymity for wireless communications,” Computer and Electrical Engineering, Vol. 37, pp. 356-364, 2011.
連結:
-
[8] Y. F. Chang, P. Y. Lin, Y. C. Chen, C. S. Chang, J. W. Fan, and C. W. Chan, “An effective authentication scheme with anonymity for wireless communications,” Proceedings of ACEAIT 2015, Osaka, Japan, pp. 255-263, March 2015.
連結:
-
[9] J. Zhu and J. Ma, “A new authentication scheme with anonymity for wireless environments, ” IEEE Transactions on Consumer Electronics, Vol. 50, No. 1, pp. 230-234, 2004.
連結:
-
[11] C. C. Wu, W. B. Lee, and W. J. Tsaur, “A secure authentication scheme with anonymity for wireless communications,” IEEE Communications Letters, Vol. 12, No. 10, pp. 722-723, 2008.
連結:
-
[12] C. C. Chang, C. Y. Lee, and Y. C. Chiu, “Enhanced authentication scheme with anonymity for roaming service in global mobility networks,” Computer Communications, Vol. 32, No. 4, pp. 611-618, 2009.
連結:
-
[13] H. Mun, K. Han, Y. S. Lee, C. Y. Yeun, and H. H. Choi, “Enhanced secure anonymous authentication scheme for roaming service in global mobility networks,” Mathematical and Computer Modelling, Vol. 55, No. 1-2, pp. 214-222, 2012.
連結:
-
[14] W. C. Kuo, H. J. Wei, and J. C. Cheng, “An efficient and secure anonymous mobility network authentication scheme,” Journal of Information Security and Applications, Vol. 19, No. 1, pp. 18-24, 2014.
連結:
-
[15] Y. Lu, X. Wu, and X. Yang, “A secure anonymous authentication scheme for wireless communications using smart cards,” International Journal of Network Security, Vol. 17, No. 3, pp. 237-245, 2015.
連結:
-
[16] Y. F. Chang, M. H. Hsu, and W.L. Tai, “Comments on Kuo et al.’s anonymous mobility network authentication scheme,” Proceedings of ACEAIT-2016, Kyoto Japan, pp. 778-785, 2016.
連結:
-
[17] R. Want, “An introduction to RFID technology,” IEEE Pervasive Computing, Vol. 5, No. 1, pp. 25-33, 2006.
連結:
-
[18] G. Venkataramain and S. Gopalan, “Mobile phone based RFID architecture for secure electronic payments using RFID credit cards,” Proceedings of ARES-2007, Vienna Austria, pp. 610-620, 2007.
連結:
-
[19] A. Y. Chang, D. R. Tsai, C. L. Tsai and Y. J. Lin, “An improved certificate mechanism for transactions using radio frequency identification enabled mobile phone,” Proceedings of Annual International Carnahan Conference-2009, Zurich Switzerland, pp. 36-40, 2009.
連結:
-
[20] I. Syamsuddin, T. Dillon, E. Chang and S. Han, “A survey of RFID authentication protocols based on hash-chain method,” Proceedings of ICCIT-2008, Busan South Korea, pp. 559-564, 2008.
連結:
-
[21] Y. Q. Gui and J. Zhang, “A new authentication RFID protocol with ownership transfer,” Proceedings of ICTC-2013, Jeju South Korea, pp. 359-364, 2013.
連結:
-
[22] J. Li, Y. Wang, B. Jiao and Y. Xu, “An authentication protocol for secure and efficient RFID communication,” Proceedings of ICLSIM-2010, Harbin China, pp. 1648-1651, 2010.
連結:
-
[24] F. M. Albert, T. R. Rolando, C. R. Jordi and D. F. Josep, “A scalable RFID authentication protocol supporting ownership transfer and controlled delegation,” Proceedings of RFIDSec-2011, Amherst USA, pp. 147-162, 2012.
連結:
-
[25] M. Rahman, R. V. Sampangi and S. Sampalli, “Lightweight oriticil for anonymity and mutual authentication in RFID systems,” Proceedings of CCNC-2015, Las Vegas USA, pp. 910-915. 2015.
連結:
-
[26] P. Dass and H. Om, “A secure authentication scheme for RFID systems,” Procedia Computer Science, Vol. 78, pp. 100-106, 2016.
連結:
-
[10] C. H. Lin and C. Y. Lee, “Cryptanalysis of a new authentication scheme with anonymity for wireless environments,” Proceedings of the Second International Conference on Advances in Mobile Multimedia, Bail, Indonesia, pp. 399-402, 2004.
-
[23] J. Fu, C. Wu, X. Chen, R. Fan and L. Ping, “Scalable pseudo random RFID private mutual authentication,” Proceedings of ICCET-2010, Chengdu China, pp. 497-500, 2010.
|