M. Bellare, D. Pointcheval, and P. Rogaway, Authenticated Key Exchange Secure against Dictionary Attacks, pp.139-155, 2000.
DOI : 10.1007/3-540-45539-6_11

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.12.5384

V. Boyko, P. Mackenzie, and S. Patel, Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman, pp.156-171, 2000.
DOI : 10.1007/3-540-45539-6_12

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.132.7667

E. Bresson, O. Chevassut, and D. Pointcheval, Security proofs for an efficient passwordbased key exchange, ACM Conference on Computer Communications Security, pp.241-250, 2003.
DOI : 10.1145/948138.948142

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.150.6434

Y. Chen, J. Chou, and C. Huang, Comment on four two-party authentication protocols, 2010.

M. L. Das, A. Saxena, and V. P. Gulati, A dynamic ID-based remote user authentication scheme, IEEE Transactions on Consumer Electronics, vol.50, issue.2, pp.629-631, 2004.
DOI : 10.1109/TCE.2004.1309441

L. Gong, T. Mark, T. A. Mark, R. M. Lomas, J. H. Needham et al., Protecting poorly chosen secrets from guessing attacks, IEEE Journal on Selected Areas in Communications, vol.11, issue.5, pp.648-656, 1993.
DOI : 10.1109/49.223865

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.208.5305

T. Goriparthi, M. L. Das, and A. Saxena, An improved bilinear pairing based remote user authentication scheme, Computer Standards & Interfaces, vol.31, issue.1, pp.181-185, 2009.
DOI : 10.1016/j.csi.2007.11.016

S. Halevi and H. Krawczyk, Public-key cryptography and password protocols, ACM Transactions on Information and System Security, vol.2, issue.3, pp.230-268, 1999.
DOI : 10.1145/322510.322514

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.37.1413

W. S. Juang, S. T. Chen, and H. T. Liaw, Robust and Efficient Password-Authenticated Key Agreement Using Smart Cards, IEEE Transactions on Industrial Electronics, vol.55, issue.6, pp.2551-2556, 2008.
DOI : 10.1109/TIE.2008.921677

H. Krawczyk, HMQV: A High-Performance Secure Diffie-Hellman Protocol, CRYPTO 2005, pp.546-566
DOI : 10.1007/11535218_33

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.59.3027

Y. Lee, J. Nam, and D. Won, Vulnerabilities in a Remote Agent Authentication Scheme Using Smart Cards, LNCS: AMSTA, vol.4953, pp.850-857, 2008.
DOI : 10.1007/978-3-540-78582-8_86

H. S. Rhee, J. O. Kwon, and D. H. Lee, A remote user authentication scheme without using smart cards, Computer Standards & Interfaces, vol.31, issue.1, pp.6-13, 2009.
DOI : 10.1016/j.csi.2007.11.017

Y. Wang, Efficient Identity-Based and Authenticated Key Agreement Protocol, 2005.
DOI : 10.1007/978-3-642-35840-1_9

T. Xiang, K. Wong, and X. Liao, Cryptanalysis of a password authentication scheme over insecure networks, Journal of Computer and System Sciences, vol.74, issue.5, pp.657-661, 2008.
DOI : 10.1016/j.jcss.2007.05.001

Z. Zhao, Z. Dong, and Y. Wang, Security analysis of a password-based authentication protocol proposed to IEEE 1363, Theoretical Computer Science, vol.352, issue.1-3, pp.280-287, 2006.
DOI : 10.1016/j.tcs.2005.11.038