Authenticated Key Exchange Secure against Dictionary Attacks, pp.139-155, 2000. ,
DOI : 10.1007/3-540-45539-6_11
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.12.5384
Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman, pp.156-171, 2000. ,
DOI : 10.1007/3-540-45539-6_12
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.132.7667
Security proofs for an efficient passwordbased key exchange, ACM Conference on Computer Communications Security, pp.241-250, 2003. ,
DOI : 10.1145/948138.948142
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.150.6434
Comment on four two-party authentication protocols, 2010. ,
A dynamic ID-based remote user authentication scheme, IEEE Transactions on Consumer Electronics, vol.50, issue.2, pp.629-631, 2004. ,
DOI : 10.1109/TCE.2004.1309441
Protecting poorly chosen secrets from guessing attacks, IEEE Journal on Selected Areas in Communications, vol.11, issue.5, pp.648-656, 1993. ,
DOI : 10.1109/49.223865
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.208.5305
An improved bilinear pairing based remote user authentication scheme, Computer Standards & Interfaces, vol.31, issue.1, pp.181-185, 2009. ,
DOI : 10.1016/j.csi.2007.11.016
Public-key cryptography and password protocols, ACM Transactions on Information and System Security, vol.2, issue.3, pp.230-268, 1999. ,
DOI : 10.1145/322510.322514
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.37.1413
Robust and Efficient Password-Authenticated Key Agreement Using Smart Cards, IEEE Transactions on Industrial Electronics, vol.55, issue.6, pp.2551-2556, 2008. ,
DOI : 10.1109/TIE.2008.921677
HMQV: A High-Performance Secure Diffie-Hellman Protocol, CRYPTO 2005, pp.546-566 ,
DOI : 10.1007/11535218_33
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.59.3027
Vulnerabilities in a Remote Agent Authentication Scheme Using Smart Cards, LNCS: AMSTA, vol.4953, pp.850-857, 2008. ,
DOI : 10.1007/978-3-540-78582-8_86
A remote user authentication scheme without using smart cards, Computer Standards & Interfaces, vol.31, issue.1, pp.6-13, 2009. ,
DOI : 10.1016/j.csi.2007.11.017
Efficient Identity-Based and Authenticated Key Agreement Protocol, 2005. ,
DOI : 10.1007/978-3-642-35840-1_9
Cryptanalysis of a password authentication scheme over insecure networks, Journal of Computer and System Sciences, vol.74, issue.5, pp.657-661, 2008. ,
DOI : 10.1016/j.jcss.2007.05.001
Security analysis of a password-based authentication protocol proposed to IEEE 1363, Theoretical Computer Science, vol.352, issue.1-3, pp.280-287, 2006. ,
DOI : 10.1016/j.tcs.2005.11.038