S. K. Kim and M. G. Chung, More secure remote user authentication scheme, Computer Communications, vol.32, issue.6, pp.1018-1021, 2009.
DOI : 10.1016/j.comcom.2008.11.026

P. Kocher, J. Jaffe, and B. Jun, Differential Power Analysis, Proceedings of Advances in Cryptology, pp.388-397, 1999.
DOI : 10.1007/3-540-48405-1_25

L. Lamport, Password authentication with insecure communication, Communications of the ACM, vol.24, issue.11, pp.770-772, 1981.
DOI : 10.1145/358790.358797

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.64.3756

C. T. Li and M. S. Hwang, An efficient biometrics-based remote user authentication scheme using smart cards, Journal of Network and Computer Applications, vol.33, issue.1, pp.1-5, 2010.
DOI : 10.1016/j.jnca.2009.08.001

C. T. Li and M. S. Hwang, An online biometrics-based secret sharing scheme for multiparty cryptosystem using smart cards, International Journal of Innovative Computing, Information and Control, vol.6, issue.5, pp.2181-2188, 2010.

C. T. Li and C. C. Lee, A novel user authentication and privacy preserving scheme with smart cards for wireless communications, Mathematical and Computer Modelling, vol.55, issue.1-2, 2011.
DOI : 10.1016/j.mcm.2011.01.010

URL : http://doi.org/10.1016/j.mcm.2011.01.010

I. E. Liao, C. C. Lee, and M. S. Hwang, A password authentication scheme over insecure networks, Journal of Computer and System Sciences, vol.72, issue.4, pp.727-740, 2006.
DOI : 10.1016/j.jcss.2005.10.001

URL : http://doi.org/10.1016/j.jcss.2005.10.001

T. S. Messerges, E. A. Dabbish, and R. H. Sloan, Examining smart-card security under the threat of power analysis attacks, IEEE Transactions on Computers, vol.51, issue.5, pp.541-552, 2002.
DOI : 10.1109/TC.2002.1004593