[1]
H. Kim, K. G Shin, and W. Dabbous: Improving Cross-domain Authentication over Wireless Local Area Networks, "1st Int, l. Conf. Security and Privacy for Emerging Areas in Communication. Networks, p.127–38, (2005).
DOI: 10.1109/securecomm.2005.24
Google Scholar
[2]
Li Gong: Increasing Availability and Security Authentication Service. IEEE Journal on Selected Areas in Communications, Vol. 11, No. 5, pp.657-662, (1993).
DOI: 10.1109/49.223866
Google Scholar
[3]
Nancy Loveland: Single Sign On Through Password Synchronization. SANS Institute, (2002).
Google Scholar
[4]
Gough et al: System and Method for synchronizing a user password between and alternative computer operating environments. United States Patent: 7055042 B1, May 30, (2006).
Google Scholar
[5]
WANG Feng-jiao, ZHANG Yu-qing: New security model for cross-realm C2C-PAKE protocol. Journal on Communications, Vol. 29, No. 4, pp.24-29, 2008 (in Chinese).
Google Scholar
[6]
Byun J W, Lee D H, Lim J: Efficient and provably secure client-to—client password-based key exchange protocol / APWeb2006. Berlin: Springer-Verlag, pp.830-836, (2006).
DOI: 10.1007/11610113_81
Google Scholar
[7]
Byun J W, Lee D H, Lim J: EC2C-PAKA: an Efficient client-to—client password-authenticated key agreement. Information Sciences, Vol. 117, No. 19, pp.3995-4013, (2007).
DOI: 10.1016/j.ins.2007.03.024
Google Scholar
[8]
LiHuafeng, QianHuanyan: A GeneralHybrid Cryptograph Transfer Protocol Applied in Password Synchronization . Journal of Nanjin Normal University, Vol. 8 No. 4, pp.178-181, 2008(in Chinese).
Google Scholar
[9]
Dae-Hee Seo, Im-Yeong Lee: Single Sign-on Authentication Model Using MAS (Multi-agent System) . Communications, Computers and Signal Processing, pp.692-695, (2003).
DOI: 10.1109/pacrim.2003.1235875
Google Scholar
[10]
Bellovin S M, Merritt M: Limitations of the Kerberos Authentication Systems. Computer Communication Review, Vol. 20 No. 5, pp.119-132, (1990).
DOI: 10.1145/381906.381946
Google Scholar
[11]
Myungsoo Kang: Choong Seon Hong, Hee, Jung Koo, Gil Haeng Lee. An SAML Based SSO Architecture for Secure Data Exchange between User and OSS, http: /www. apnoms. org/2005/technical/8_5. pdf, pp.609-617, (2006).
Google Scholar
[12]
Jeff Hodges , Prateek Mishra , Bob Morgan , Tim Moses , Evan Prodromou : Add To MetaCart OASIS SSTC: SAML Security Considerations, draft-sstc-sec-consider-00, 10-Aug-2001: 1-12.
Google Scholar
[13]
Bruce Schneier: Applied Cryptography – Protocols, algorithms, and source code. (China Machine Press, Beijing 2000).
Google Scholar
[14]
W. tallings: Cryptography and Network Security Principles and Practices. (Prentice Hall, Inc 2008).
Google Scholar
[15]
K. J. Hole, V. Moen, and T. Tjstheim: Case Study: Online Banking Security. IEEE Security and Privacy, Vol. 4 No. 2, p.14–20, (2006).
DOI: 10.1109/msp.2006.36
Google Scholar
[16]
Narasimham Challa, Jayaram Pradhan: Performance Analysis of Public key Cryptographic Systems RSA and NTRU, IJCSNS International Journal of Computer Science and Network Security, pp.87-96, (2007).
Google Scholar