Password authentication with insecure communication, Communications of the ACM, vol.24, issue.11, pp.770-772, 1981. ,
DOI : 10.1145/358790.358797
Efficient and timely mutual authentication, ACM SIGOPS Operating Systems Review, vol.21, issue.1, pp.8-10, 1987. ,
DOI : 10.1145/24592.24594
Using one-way functions for authentication, ACM SIGCOMM Computer Communication Review, vol.19, issue.5, pp.8-11, 1989. ,
DOI : 10.1145/74681.74682
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.47.4472
Encrypted key exchange: password-based protocols secure against dictionary attacks, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy, pp.72-84, 1992. ,
DOI : 10.1109/RISP.1992.213269
URL : http://academiccommons.columbia.edu/download/fedora_content/download/ac:127104/CONTENT/neke.pdf
A class of flexible and efficient key management protocols, Proceedings 9th IEEE Computer Security Foundations Workshop, 1996. ,
DOI : 10.1109/CSFW.1996.503685
An enhancement of timestamp-based password authentication scheme, Computers & Security, vol.21, issue.7, pp.665-667, 2002. ,
DOI : 10.1016/S0167-4048(02)01118-5
Secure SAS-like password authentication schemes, Computer Standards & Interfaces, vol.27, issue.1, pp.25-31, 2004. ,
DOI : 10.1016/j.csi.2004.02.004
Improved efficient remote user authentication scheme using smart cards, IEEE Transactions on Communications, vol.50, issue.2, pp.565-567, 2004. ,
A simple remote user authentication scheme, Mathematical and Computer Modelling, vol.36, issue.1-2, pp.103-107, 2002. ,
DOI : 10.1016/S0895-7177(02)00106-1
An improvement of Hwang???Lee???Tang's simple remote user authentication scheme, Computers & Security, vol.24, issue.1, pp.50-56, 2005. ,
DOI : 10.1016/j.cose.2004.06.004
A two-factor user authentication scheme providing mutual authentication and key agreement over insecure channels, Journal of Information Assurance and Security, vol.5, issue.1, pp.201-208, 2010. ,
Cryptanalysis and Improvement of a Two-Factor User Authentication Scheme Providing Mutual Authentication and Key Agreement over Insecure Channels, International Journal of Machine Learning and Computing, vol.3, issue.5, 2012. ,
DOI : 10.7763/IJMLC.2013.V3.348
Prudent engineering practice for cryptographic protocols, Research in Security and Privacy, pp.122-136, 1994. ,
DOI : 10.1109/risp.1994.296587
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.225.1311
A Logic of Authentication, Software -Concepts and Tools, pp.233-271, 1989. ,
DOI : 10.1098/rspa.1989.0125
Automated analysis of cryptographic protocols using Mur-phi, IEEE Symposium on Security and Privacy, pp.141-151, 1997. ,
Athena: a novel approach to efficient automatic security protocol analysis1, Journal of Computer Security, vol.9, issue.1-2, pp.47-74, 2001. ,
DOI : 10.3233/JCS-2001-91-203
The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols, Computer Aided Verification, 2008. ,
DOI : 10.1007/978-3-540-70545-1_38
Evaluation of ISO/IEC 9798 protocols version 2.0, 2011. ,
The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications, 17th International Conference on Computer Aided Verification (CAV), 2005. ,
DOI : 10.1007/11513988_27
URL : https://hal.archives-ouvertes.fr/inria-00000408
Automated Security Protocol Analysis With the AVISPA Tool, Electronic Notes in Theoretical Computer Science, vol.155, issue.0, pp.61-86, 2006. ,
DOI : 10.1016/j.entcs.2005.11.052
Using animation to improve formal specifications of security protocols, 2nd Conference on Security in Network Architectures and Information Systems, pp.169-182, 2007. ,
URL : https://hal.archives-ouvertes.fr/hal-00468718