| 期刊論文1. | Lamport, L.(1981)。Password authentication with insecure communication。Communications of the Association for Computing Machinery,24(11),770-772。 | 2. | Chang, C. C.、Wu, T. C.(1991)。Remote password authentication with smart cards。IEE Proceedings E: Computers and Digital Techniques,138(3),165-168。 | 3. | Wu, T. C.、Sung, H. S.(1996)。Authenticating Passwords over an Insecure Channel。Computer & Security,15(5),431-439。 | 4. | Yang, W. H.、Shieh, S. P.(1999)。Password Authentication Schemes with Smart Cards。Computer & Security,18(8),727-733。 | 5. | Lin, H.-Y.(2014)。Chaotic map based mobile dynamic ID authenticated key agreement scheme。Wireless Personal Communications,78(2),1487-1494。 | 6. | Farash, M. S.、Turkanović, M.、Kumari, S.、Hölbl, M.(2016)。An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment。Ad Hoc Networks,36(Part 1),152-176。 | 7. | Amin, R.、Islam, S. K. H.、Biswas, G. P.、Khan, M. K.、Leng, L.、Kumar, N.(2016)。Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks。Computer Networks,101,42-62。 | 8. | Chaudhry, S. A.、Farash, M. S.、Naqvi, H.、Kumari, S.、Khan, M. K.(2015)。An enhanced privacy preserving remote user authentication scheme with provable security。Security and Communication Networks,8(18),3782-3795。 | 9. | Chen, T. H.、Hsiang, H. C.、Shih, W. K.(2011)。Security enhancement on an improvement on two remote user authentication schemes using smart cards。Future Generation Computer Systems,27(4),377-380。 | 10. | Chien, H. Y.、Jan, J. K.、Tseng, Y. M.(2002)。An efficient and practical solution to remote authentication: Smart card。Computers & Security,21(4),372-375。 | 11. | Chuang, M. C.、Chen, M. C.(2014)。An anonymous multi-server authenticated key agreement scheme based on trust computing using smart cards and biometrics。Expert Systems with Applications,41(4) Part1,1411-1418。 | 12. | Dhillon, P. K.、Kalra, S.(2017)。A lightweight biometrics based remote user authentication scheme for IoT services。Journal of Information Security and Applications,34(Part 2),255-270。 | 13. | Farash, M. S.、Chaudhry, S. A.、Heydari, M.、Sadough, S. M.、Kumari, S.、Khan, M. K.(2017)。A lightweight anonymous authentication scheme for consumer roaming in ubiquitous networks with provable security。International Journal of Communication Systems,30(4),e3019。 | 14. | Hsu, C. L.(2004)。Security of Chien et al.'s remote user authentication scheme using smart cards。Computer Standards & Interfaces,26(3),167-169。 | 15. | Islam, SK Hafizul、Obaidat, M. S.、Amin, R.(2016)。An anonymous and provably secure authentication scheme for mobile user。International Journal of Communication Systems,29(9),1529-1544。 | 16. | Jiang, Q.、Zeadally, S.、Ma, J.、He, D.(2017)。Lightweight three-factor authentication and key agreement protocol for internet-integrated wireless sensor networks。IEEE Access,5,3376-3392。 | 17. | Juang, W. S.(2004)。Efficient password authenticated key agreement using smart cards。Computers & Security,23(2),167-173。 | 18. | Karuppiah, M.、Saravanan, R.(2014)。A secure remote user mutual authentication scheme using smart cards。Journal of Information Security and Applications,19(4/5),282-294。 | 19. | Kumari, S.、Khan, M. K.、Atiquzzaman, M.(2015)。User authentication schemes for wireless sensor networks: A review。Ad Hoc Networks,27,159-194。 | 20. | Kumari, S.、Khan, M. K.、Li, X.(2014)。An improved remote user authentication scheme with key agreement。Computers & Electrical Engineering,40(6),1997-2012。 | 21. | Lee, C. C.、Lin, T. H.、Chang, R. X.(2011)。A secure dynamic ID based remote user authentication scheme for multi-server environment using smart cards。Expert Systems with Applications,38(11),13863-13870。 | 22. | Leu, J. S.、Hsieh, W. B.(2014)。Efficient and secure dynamic ID-based remote user authentication scheme for distributed systems using smart cards。IET Information Security,8(2),104-113。 | 23. | Li, C. T.、Hwang, M. S.(2010)。An efficient biometrics-based remote user authentication scheme using smart cards。Journal of Network and Computer Applications,33(1),1-5。 | 24. | Li, X.、Niu, J. W.、Ma, J.、Wang, W. D.、Liu, C. L.(2011)。Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards。Journal of Network and Computer Applications,34(1),73-79。 | 25. | Li, X.、Xiong, Y.、Ma, J.、Wang, W.(2012)。An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards。Journal of Network and Computer Applications,35(2),763-769。 | 26. | Liao, Y. P.、Wang, S. S.(2009)。A secure dynamic ID based remote user authentication scheme for multi-server environment。Computer Standards & Interfaces,31(1),24-29。 | 27. | Messerges, T. S.、Dabbish, E. A.、Sloan, R. H.(2002)。Examining smart-card security under the threat of power analysis attacks。IEEE Transactions on Computers,51(5),541-552。 | 28. | Mishra, D.、Das, A. K.、Mukhopadhyay, S.(2014)。A secure user anonymity-preserving biometric-based multi-server authenticated key agreement scheme using smart cards。Expert Systems with Applications,41(18),8129-8143。 | 29. | Shi, Yajuan、Shen, Han、Zhang, Yuanyuan、Chen, Jianhua(2015)。An improved anonymous remote user authentication scheme with key agreement based on dynamic identity。International Journal of Security and Its Applications,9(5),255-268。 | 30. | Shieh, W. G.、Wang J. M.(2006)。Efficient remote mutual authentication and key agreement。Computers & Security,25(1),72-77。 | 31. | Shieh, W. G.、Yu, P.(2016)。The weaknesses of karuppiah et al. S remote user mutual authentication scheme using smart card。ICIC Express Letters,10(12),2817-2822。 | 32. | Shin, S.、Yeh, H.、Kim, K.(2015)。An efficient secure authentication scheme with user anonymity for roaming user in ubiquitous networks。Peer-to-Peer Networking and Applications,8(4),674-683。 | 33. | Sood, S. L.、Sarje, A. K.、Singh, K.(2011)。A secure dynamic identity based authentication protocol for multi-server architecture。Journal of Network and Computer Applications,34(2),609-618。 | 34. | Tan, K.、Zhu, H.(1999)。Remote password authentication scheme based on Cross-Product。Computer Communications,22(4),390-393。 | 35. | Tsai, J. L.(2008)。Efficient multi-server authentication scheme based on one-way hash function without verification table。Computers & Security,27(3/4),115-121。 | 36. | Tsai, J. L.、Lo, N. W.、Wu, T. C.(2013)。Novel anonymous authentication scheme using smart cards。IEEE Transactions on Industrial Informatics,9(4),2004-2013。 | 37. | Tsaur, W. J.、Li, J. H.、Lee, W. B.(2012)。An efficient and secure multi-server authentication scheme with key agreement。Journal of Systems and Software,85(4),876-882。 | 38. | Wang, D.、Ma, C. G.(2012)。Cryptanalysis and security enhancement of a remote user authentication scheme using smart cards。The Journal of China Universities of Posts and Telecommunications,19(5),104-114。 | 39. | Wang, S. J.、Chang, J. F.(1996)。Smart card based secure password authentication scheme。Computers & Security,15(3),231-237。 | 40. | Wang, X. M.、Zhang, W. F.、Zhang, J. S.、Khan, M. K.(2007)。Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards。Computer Standards & Interfaces,29(5),507-512。 | 41. | Wen, F.、Susilo, W.、Yang, G.(2013)。A secure and effective anonymous user authentication scheme for roaming service in global mobility networks。Wireless Personal Communications,73(3),993-1004。 | 42. | Wu, F.、Li, X.、Sangaiah, A. K.、Xu, L.、Kumari, S.、Wu, L.、Shen, J.(2018)。A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks。Future Generation Computer Systems,82,727-737。 | 43. | Wu, F.、Xu, L.、Kumari, S.、Li, X.、Shen, J.、Choo, K. K. R.、Wazid, M.、Das, A. K.(2017)。An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment。Journal of Network and Computer Applications,89,72-85。 | 44. | Wu, T. C.(1995)。Remote login authentication scheme based on a geometric approach。Computer Communications,18(12),959-963。 | 45. | Yang, Y.、Wu, L.、Yin, G.、Li, L.、Zhao, H.(2017)。A survey on security and privacy issues in Internet-of-Things。IEEE Internet of Things Journal,4(5),1250-1258。 | 會議論文1. | Kumari, S.、Khan, M. K.、Muhaya, F. B.、Kumar, R.(2013)。Cryptanalysis of a robust smart-card-based remote user password authentication scheme。The 2013 International Symposium on Biometrics and Security Technologies,(會議日期: July 2-5)。Chengdu。247-250。 | 2. | Lee, C. C.、Li, C. T.、Chen, C. L.、Chang, R. X.(2010)。On security of a more efficient and secure dynamic ID-based remote user authentication scheme。The 10th International Conference on Intelligent Systems Design and Applications,(會議日期: November 29-December 1)。Cairo, Egypt。1371-1375。 | 3. | Vijayalakshmi, P. R.、Raja, K. B.(2012)。Performance analysis of RSA and ECC in identity-based authenticated new multiparty key agreement protocol。The 2012 International Conference on Computing, Communication and Applications,(會議日期: February 22-24)。Dindigul, India。1-5。 | 其他1. | Blanchet, B.,Smyth, B.,Cheval, V.,Sylvestre, M.(2018)。ProVerif 2.02pl1: Automatic cryptographic protocol verifier, user manual and tutorial,https://ics.upjs.sk/~jirasek/krp/manual.pdf。 | |