A. G. Vicente, I. B. Munoz, J. L. Galilea, and P. A. Del-toro, Remote Automation Laboratory Using a Cluster of Virtual Machines, IEEE Transactions on Industrial Electronics, vol.57, issue.10, pp.3276-3283, 2010.
DOI : 10.1109/TIE.2010.2041131

L. Barolli and F. Xhafa, JXTA-Overlay: A P2P Platform for Distributed, Collaborative, and Ubiquitous Computing, IEEE Transactions on Industrial Electronics, vol.58, issue.6, pp.2163-2172, 2010.
DOI : 10.1109/TIE.2010.2050751

L. Lamport, Password authentication with insecure communication, Communications of the ACM, vol.24, issue.11, pp.770-772, 1981.
DOI : 10.1145/358790.358797

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.64.3756

N. Hailer, The S/Key One-time Password System, Proceedings of the Symposium on Network and Distributed System Security, pp.151-158, 1994.
DOI : 10.17487/rfc1760

C. C. Chang and T. C. Wu, Remote password authentication with smart cards, IEE Proceedings-E, vol.138, issue.3, pp.165-168, 1993.
DOI : 10.1049/ip-e.1992.0053

E. J. Yoon, E. K. Ryu, and K. Y. Yoo, Further improvement of an efficient password based remote user authentication scheme using smart cards, IEEE Transactions on Consumer Electronics, vol.50, issue.2, pp.612-614, 2004.
DOI : 10.1109/TCE.2004.1309437

G. Yang, D. S. Wong, H. Wang, and . X. Deng, Two-factor mutual authentication based on smart cards and passwords, Journal of Computer and System Sciences, vol.74, issue.7, pp.1160-1172, 2008.
DOI : 10.1016/j.jcss.2008.04.002

URL : http://doi.org/10.1016/j.jcss.2008.04.002

H. C. Hsiang and W. K. Shih, Weaknesses and improvements of the Yoon?Ryu?Yoo remote user authentication scheme using smart cards, Computer Communications, vol.32, issue.4, pp.649-652, 2009.
DOI : 10.1016/j.comcom.2008.11.019

S. K. Sood, A. K. Sarje, and K. Singh, An improvement of Hsiang-Shih's authentication scheme using smart cards, Proceedings of the International Conference and Workshop on Emerging Trends in Technology, ICWET '10, pp.19-25, 2010.
DOI : 10.1145/1741906.1741910

C. G. Ma, D. Wang, and Q. M. Zhang, Cryptanalysis and Improvement of Sood et al.?s Dynamic ID-Based Authentication Scheme, ICDCIT 2012, pp.141-152, 2012.
DOI : 10.1007/978-3-642-28073-3_13

D. Dolev and A. C. Yao, On the security of public key protocols, IEEE Transactions on Information Theory, vol.29, issue.2, pp.198-208, 1983.
DOI : 10.1109/TIT.1983.1056650

P. Kocher, J. Jaffe, and B. Jun, Differential Power Analysis, CRYPTO 1999, pp.388-397, 1999.
DOI : 10.1007/3-540-48405-1_25

T. S. Messerges, E. A. Dabbish, and R. H. Sloan, Examining smart-card security under the threat of power analysis attacks, IEEE Transactions on Computers, vol.51, issue.5, pp.541-552, 2002.
DOI : 10.1109/TC.2002.1004593

S. Mangard, E. Oswald, and F. X. Standaert, One for all ? all for one: unifying standard differential power analysis attacks, IET Information Security, vol.5, issue.2, pp.100-110, 2011.
DOI : 10.1049/iet-ifs.2010.0096

C. Tsai, C. Lee, and M. Hwang, Password authentication schemes: current status and key issues, International Journal of Network Security, vol.3, issue.2, pp.101-115, 2006.

S. Blake-wilson, D. Johnson, and A. Menezes, Key agreement protocols and their security analysis, Cryptography and Coding 1997, pp.30-45, 1997.
DOI : 10.1007/BFb0024447

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.25.387

H. Krawczyk, HMQV: A High-Performance Secure Diffie-Hellman Protocol, CRYPTO 2005, pp.546-566, 2005.
DOI : 10.1007/11535218_33

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.59.3027

K. H. Yeh, C. H. Su, and N. W. Lo, Two robust remote user authentication protocols using smart cards, Journal of Systems and Software, vol.83, issue.12, pp.2556-2565, 2010.
DOI : 10.1016/j.jss.2010.07.062

D. V. Klein, Foiling the Cracker: A Survey of, and Improvements to, Password Security, 2nd USENIX Security Workshop, pp.5-14, 1990.

S. Halevi and H. Krawczyk, Public-key cryptography and password protocols, ACM Transactions on Information and System Security, vol.2, issue.3, pp.230-268, 1999.
DOI : 10.1145/322510.322514

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.142.8515