Password authentication with insecure communication, Communications of the ACM, vol.24, issue.11, pp.770-772, 1981. ,
DOI : 10.1145/358790.358797
An efficient anonymous authentication protocol for mobile pay-TV, Journal of Network and Computer Applications, vol.34, issue.4, pp.1131-1137, 2011. ,
DOI : 10.1016/j.jnca.2010.11.005
A Remote User Authentication Scheme with Anonymity for Mobile Devices, International Journal of Advanced Robotic Systems, vol.1, issue.4, pp.1-7, 2012. ,
DOI : 10.5772/50912
Security enhancement for a dynamic id-based remote user authentication scheme, International Conference on Next Generation Web Services Practices, pp.517-522, 2005. ,
Improving the Dynamic ID-Based Remote Mutual Authentication Scheme, First International Workshop on Information Security, pp.499-507, 2006. ,
DOI : 10.1007/11915034_73
A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, vol.21, issue.2, pp.120-126, 1978. ,
DOI : 10.1145/359340.359342
An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem, Computers & Security, vol.28, issue.3-4, pp.3-4, 2009. ,
DOI : 10.1016/j.cose.2008.11.008
Robust ID-Based Remote Mutual Authentication with Key Agreement Scheme for Mobile Devices on ECC, 2009 International Conference on Computational Science and Engineering, pp.633-640, 2009. ,
DOI : 10.1109/CSE.2009.363
A more efficient and secure ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem, Journal of Systems and Software, vol.84, issue.11, pp.1892-1898, 2011. ,
DOI : 10.1016/j.jss.2011.06.061
Security of public key encryption technique based on multiple chaotic systems, Physics Letters A, vol.360, issue.2, pp.259-262, 2006. ,
DOI : 10.1016/j.physleta.2006.05.038
Cryptanalysis of the public key encryption based on multiple chaotic systems, Chaos, Solitons & Fractals, vol.37, issue.3, pp.669-674, 2008. ,
DOI : 10.1016/j.chaos.2006.09.047
Chaotic maps-based mutual authentication and key agreement using smartcards for wireless communications, Journal of Information Hiding and Multimedia Signal Processing, vol.4, issue.2, pp.99-109, 2013. ,
Public key cryptosystems based on chaotic-Chebyshev polynomials, 2009 International Conference on Intelligent Agent & Multi-Agent Systems, pp.122-128, 2009. ,
DOI : 10.1109/IAMA.2009.5228035
Fast algorithms of public key cryptosystem based on chebyshev polynomials over finite field, The Journal of China Universities of Posts and Telecommunications, vol.18, issue.2, pp.86-93, 2010. ,
A smart card-based authentication scheme using user identify cryptography, International Journal of Network Security, vol.15, issue.2, pp.139-147, 2013. ,
A logic of authentication, ACM Transactions on Computer Systems, vol.8, issue.1, pp.18-36, 1990. ,
DOI : 10.1145/77648.77649
An efficient entire chaos-based scheme for deniable authentication, Chaos, Solitons & Fractals, vol.23, issue.4, pp.1327-1331, 2005. ,
DOI : 10.1016/S0960-0779(04)00387-X
Security of public-key cryptosystems based on Chebyshev polynomials, IEEE Transactions on Circuits and Systems I: Regular Papers, vol.52, issue.7, pp.1382-1393, 2005. ,
DOI : 10.1109/TCSI.2005.851701
A dynamic ID-based remote user authentication scheme, IEEE Transactions on Consumer Electronics, vol.50, issue.2, pp.629-631, 2004. ,
DOI : 10.1109/TCE.2004.1309441
A more efficient and secure dynamic ID-based remote user authentication scheme, Computer Communications, vol.32, issue.4, pp.583-585, 2009. ,
DOI : 10.1016/j.comcom.2008.11.008