[1] |
HALEVI S , KRAWCZYK H . Public-key cryptography and password protocols[C]// The 5th ACM Conference on Computer and Communications Security. 1998: 122-131.
|
[2] |
BELLOVIN S M , MERRITT M . Encrypted key exchange:password based protocols secure against dictionary attacks[C]// IEEE Security and Privacy. 1992: 72-84.
|
[3] |
BELLARE M , POINTCHEVAL D , ROGAWAY P . Authenticated key exchange secure against dictionary attacks[J]. Tecnologia Electronica E Informatica, 2000: 139-155.
|
[4] |
JUANG W S , CHEN S T , LIAW H T . Robust and efficient password authenticated key agreement using smart cards[J]. IEEE Transaction on Industrial Electronics, 2008,55(6): 2551-2556.
|
[5] |
WANG D , WANG N , WANG P ,et al. Preserving privacy for free:Efficient and provably secure two-factor authentication scheme with user anonymity[J]. Information Sciences, 2015,321(10): 162-178.
|
[6] |
MISHRA D , DAS A K , CHATURVEDI A ,et al. A secure password-based authentication and key agreement scheme using smart cards[J]. Journal of Information Security and Applications, 2015,23(8): 28-43.
|
[7] |
LI X , NIU J , WANG Z ,et al. Applying biometrics to design three-factor remote user authentication scheme with key agreement[J]. Security and Communication Networks, 2014,7(10): 1488-1497.
|
[8] |
GIRI D , SHERRATT R S , MAITRA T . A novel and efficient session spanning biometric and password based three-factor authentication protocol for consumer USB mass storage devices[J]. IEEE Transactions on Consumer Electronics, 2016,62(3): 283-291.
|
[9] |
DODIS Y , REYZIN L , SMITH A . Fuzzy extractors:how to generate strong keys from biometrics and other noisy data[C]// Cryptology Eurocrypt 2004. 2004: 523-540.
|
[10] |
李晓伟, 张玉清, 张格非 ,等. 基于智能卡的强安全认证与密钥协商协议[J]. 电子学报, 2014,42(8): 1587-1593.
|
|
LI X W , ZHANG Y Q , ZHANG G F ,et al. Strongly secure authenticated key agreement protocol using smart card[J]. Acta Electronica Sinica, 2014,42(8): 1587-1593.
|