1. Evans A, Kantrowitz W. A User Authentication Scheme not Requiring Secrecy in the Computer. Comet ACM, 1974, 17(8):437^-4422. Lennon K E, Matyas S M. Cryptographic Authentication of Time-invariant Quantities. IEEE Trans Comet, 1981,24(11):773一7773. l,amport L. Password Authentication with Insecure Communication. Comet ACM, 1981,24(11):770-7734. CHANG C C, WU T C. Remote Y}ssword Authentication with Smart Cards. iEE Proc E, 1991,138(3):165 } 1685. CHANCE C C, Laih l' S. Correspondence for Remote Password Authentication with Smart Cards. IEE Proc E, 1992, 139(4):372一3756. CHANC: C C, Hwang S J. Using Smart Cards to Authenticate Remote asswords. Comput Math Applic, 1993, 26(7):19一277. 潭凯军,何晨,诸鸿文.基于矢积的远程Cl令鉴别方案.电子学报,2000,28(2):28-30 |