[1]
Jun Zhang, Shiqi Gao, Yang Hu, et al. Study on Mixed Communication Networking in Power Distribution Access Network .Telecommunications for Electric Power System, Vol.32(2011), pp.36-40. In Chinsese.
Google Scholar
[2]
Lee Deok Gyu, Han Jong-Wook, Park Doo Soon and Lee Im Yeong. Intelligent pervasive network authentication: S/Key based device authentication. Proceedings of 6th IEEE Consumer Communications and Networking Conference, Las Vegas, NV, United states, 10-13 January, pp.1-5(2009).
DOI: 10.1109/ccnc.2009.4784994
Google Scholar
[3]
Yinxiang Li, Xiaoping Li, Lizhi Zhong, Yuhuan Jing. Research on the S / KEY one-time password authentication system and its application in banking and financial systems. Proceedings of 6th International Conference on Networked Computing and Advanced Information Management, Seoul, Korea, 16-18 August, pp.172-175(2010).
Google Scholar
[4]
Junwei Zhang, Chao Yang, Jianfeng Ma. Protocol derivation system for the Needham-Schroeder family. Proceedings of the 6th International ICST Conference on Communications and Networking, Harbin, China, 17-19 August, pp.836-840 (2011).
DOI: 10.1109/chinacom.2011.6158270
Google Scholar
[5]
Juan Wang, Mancheng Cao, Yuankang Fang. An improved kerberos intra-domain authentication protocol based-on certificateless public-key cryptography. Advances in Intelligent and Soft Computing, Vol. 129(2011), pp.489-496.
DOI: 10.1007/978-3-642-25986-9_77
Google Scholar
[6]
Yun Liu, Ziyao Cheng, Chinchen Chang and Zhenjiang Zhang. A secure dynamic identity based remote user authentication scheme using secret sharing. Journal of Internet Technology, Vol. 13(2012), pp.463-469.
Google Scholar
[7]
Xiong Li, Yongping Xiong, Jian Ma and Wendong Wang. An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards. Journal of Network and Computer Applications, Vol. 35(2012), pp.763-769.
DOI: 10.1016/j.jnca.2011.11.009
Google Scholar
[8]
Li Wang, Yong Zhang, Yue Ma, et al. A novel universal authentication protocol based on combined public key in heterogeneous networks. Journal of China Universities of Posts and Telecommunications, Vol. 17(2010), n SUPPL, pp.1-5.
DOI: 10.1016/s1005-8885(09)60616-6
Google Scholar
[9]
Ahmad Nazrul M, Yaacob, Asrul H., Khorram, Alireza, et al. Comparative analysis and implementation of certificateless based authentication scheme. Communications in Computer and Information Science, Vol.251(2011), PART 1, pp.151-162.
DOI: 10.1007/978-3-642-25327-0_14
Google Scholar
[10]
Peng Peng, Yiming Zhao, Wei Han, et al. Ultra-lightweight RFID Mutual Authentication Protocol. Computer Engineering, Vol. 37(2011), pp.140-142. In Chinese.
Google Scholar
[11]
Min Zhu. A Survey on Ultra-lightweight Security Mechanism in Low-cost RFID. Computer Knowledge and Technology, Vol.6(2010),pp.9221-9224. In Chinsese.
Google Scholar
[12]
Keting Jia. Cryptanalysis of CBC-MAC and Hash Function Related Algorithm. Shandong University Doctoral Dissertation. (2010). In Chinese.
Google Scholar