L. Lamport, Password authentication with insecure communication, Communications of the ACM, vol.24, issue.11, pp.770-772, 1981.
DOI : 10.1145/358790.358797

T. H. Chen, Y. C. Chen, W. K. Shih, and H. W. Wei, An efficient anonymous authentication protocol for mobile pay-TV, Journal of Network and Computer Applications, vol.34, issue.4, pp.1131-1137, 2011.
DOI : 10.1016/j.jnca.2010.11.005

S. Shin, K. Kim, K. Kim, and H. Yeh, A Remote User Authentication Scheme with Anonymity for Mobile Devices, International Journal of Advanced Robotic Systems, vol.1, issue.4, pp.1-7, 2012.
DOI : 10.5772/50912

I. E. Liao, C. C. Lee, and M. S. Hwang, Security enhancement for a dynamic id-based remote user authentication scheme, International Conference on Next Generation Web Services Practices, pp.517-522, 2005.

E. J. Yoon and K. Y. Yoo, Improving the Dynamic ID-Based Remote Mutual Authentication Scheme, First International Workshop on Information Security, pp.499-507, 2006.
DOI : 10.1007/11915034_73

R. L. Rivest, A. Shamir, and L. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, vol.21, issue.2, pp.120-126, 1978.
DOI : 10.1145/359340.359342

J. Yang and C. Chang, An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem, Computers & Security, vol.28, issue.3-4, pp.3-4, 2009.
DOI : 10.1016/j.cose.2008.11.008

E. Yoon and K. Yoo, Robust ID-Based Remote Mutual Authentication with Key Agreement Scheme for Mobile Devices on ECC, 2009 International Conference on Computational Science and Engineering, pp.633-640, 2009.
DOI : 10.1109/CSE.2009.363

S. H. Islam and G. P. Biswas, A more efficient and secure ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem, Journal of Systems and Software, vol.84, issue.11, pp.1892-1898, 2011.
DOI : 10.1016/j.jss.2011.06.061

K. Wang, W. J. Pei, L. H. Zou, Y. M. Cheung, and Z. Y. He, Security of public key encryption technique based on multiple chaotic systems, Physics Letters A, vol.360, issue.2, pp.259-262, 2006.
DOI : 10.1016/j.physleta.2006.05.038

L. Zhang, Cryptanalysis of the public key encryption based on multiple chaotic systems, Chaos, Solitons & Fractals, vol.37, issue.3, pp.669-674, 2008.
DOI : 10.1016/j.chaos.2006.09.047

C. Guo, C. Chang, and C. Sun, Chaotic maps-based mutual authentication and key agreement using smartcards for wireless communications, Journal of Information Hiding and Multimedia Signal Processing, vol.4, issue.2, pp.99-109, 2013.

K. Prasadh, K. Ramar, and R. Gnanajeyaraman, Public key cryptosystems based on chaotic-Chebyshev polynomials, 2009 International Conference on Intelligent Agent & Multi-Agent Systems, pp.122-128, 2009.
DOI : 10.1109/IAMA.2009.5228035

L. Zhi-hui, C. Yi-dong, and X. Hui-min, Fast algorithms of public key cryptosystem based on chebyshev polynomials over finite field, The Journal of China Universities of Posts and Telecommunications, vol.18, issue.2, pp.86-93, 2010.

C. Chang and C. Lee, A smart card-based authentication scheme using user identify cryptography, International Journal of Network Security, vol.15, issue.2, pp.139-147, 2013.

M. Burrows, M. Abadi, and R. Needham, A logic of authentication, ACM Transactions on Computer Systems, vol.8, issue.1, pp.18-36, 1990.
DOI : 10.1145/77648.77649

D. Xiao, X. Liao, and K. Wong, An efficient entire chaos-based scheme for deniable authentication, Chaos, Solitons & Fractals, vol.23, issue.4, pp.1327-1331, 2005.
DOI : 10.1016/S0960-0779(04)00387-X

P. Bergamo, P. Arco, A. Santis, and L. Kocarev, Security of public-key cryptosystems based on Chebyshev polynomials, IEEE Transactions on Circuits and Systems I: Regular Papers, vol.52, issue.7, pp.1382-1393, 2005.
DOI : 10.1109/TCSI.2005.851701

M. L. Das, A. Saxena, and V. P. Gulati, A dynamic ID-based remote user authentication scheme, IEEE Transactions on Consumer Electronics, vol.50, issue.2, pp.629-631, 2004.
DOI : 10.1109/TCE.2004.1309441

Y. Y. Wang, J. Y. Kiu, F. X. Xiao, and J. Dan, A more efficient and secure dynamic ID-based remote user authentication scheme, Computer Communications, vol.32, issue.4, pp.583-585, 2009.
DOI : 10.1016/j.comcom.2008.11.008