<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>2007-0705</journal-id>
<journal-title><![CDATA[Nova scientia]]></journal-title>
<abbrev-journal-title><![CDATA[Nova scientia]]></abbrev-journal-title>
<issn>2007-0705</issn>
<publisher>
<publisher-name><![CDATA[Universidad de La Salle Bajío A. C., Coordinación de Investigación]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S2007-07052016000200263</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[Dynamic ID-based remote user authentication scheme using ElGamal encryption system]]></article-title>
<article-title xml:lang="es"><![CDATA[Esquema de autenticación de usuario remoto basado en un identificador dinamico utilizando el sistema de cifrado ElGamal]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Martínez Peláez]]></surname>
<given-names><![CDATA[Rafael]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Saavedra Benitez]]></surname>
<given-names><![CDATA[Yesica]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Velarde Alvarado]]></surname>
<given-names><![CDATA[Pablo]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Pomykala]]></surname>
<given-names><![CDATA[Jacek]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Universidad De La Salle Bajío Facultad de Tecnologías de Información ]]></institution>
<addr-line><![CDATA[León ]]></addr-line>
<country>Mexico</country>
</aff>
<aff id="Af2">
<institution><![CDATA[,Instituto Tecnológico de Toluca División de Estudios de Posgrado e Investigación ]]></institution>
<addr-line><![CDATA[Toluca ]]></addr-line>
<country>Mexico</country>
</aff>
<aff id="Af3">
<institution><![CDATA[,Universidad Autónoma de Nayarit Ciencias Básicas e Ingenierías ]]></institution>
<addr-line><![CDATA[ Nayarit]]></addr-line>
<country>Mexico</country>
</aff>
<aff id="Af4">
<institution><![CDATA[,University of Warsaw Faculty of Mathematics Informatics and Mechanics ]]></institution>
<addr-line><![CDATA[Warsaw ]]></addr-line>
<country>Poland</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>00</month>
<year>2016</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>00</month>
<year>2016</year>
</pub-date>
<volume>8</volume>
<numero>17</numero>
<fpage>263</fpage>
<lpage>277</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S2007-07052016000200263&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S2007-07052016000200263&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S2007-07052016000200263&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract We propose a new dynamic ID-based remote user authentication scheme using smart cards, which it is based on one-way hash function, ElGamal&#8217;s public key cryptosystem and nonce. The scheme achieves the following security requirements: 1) users can choose and change their password freely, 2) mutual authentication between the user and the server, 3) the user and the server establish a session key after successful authentication process, 4) the server does not maintain a verification table, 5) the login request message does not contain the user&#8217;s identity, and 6) the authentication phase does not require time-synchronization, making it more secure than previous schemes. In order to verify the security characteristics of our protocol, we have modelled and analysed the proposal using High-level Protocol Specification Language (HLPSL) and Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. The results demonstrate that our protocol achieves more security requirements than previous works.]]></p></abstract>
<abstract abstract-type="short" xml:lang="es"><p><![CDATA[Resumen Se propone un nuevo esquema de autenticación de usuario remoto basado en un identificador dinámico, utilizando tarjetas inteligentes. Se utiliza una función unidireccional, criptosistema de clave pública ElGamal, y un número aleatorio. El esquema propuesto cumple con los siguientes requerimientos de seguridad: 1) los usuarios pueden seleccionar y cambiar su contraseña libremente, 2) autenticación mutua entre el usuario y el servidor, 3) el usuario y el servidor establecen una clave de sesión después de concluir exitosamente el proceso de autenticación, 4) el servidor no mantiene una tabla de verificación, 5) el mensaje de inicio de sesión no contiene la identidad del usuario, y 6) la fase de autenticación no requiere sincronización de tiempo. Además, el esquema puede resistir ataques bien conocidos, haciéndolo más seguro que otros trabajos relacionados. Con el fin de verificar las características de seguridad del protocolo propuesto, se ha modelado y analizado utilizando HLPSL y la herramienta AVISPA. Los resultados demuestran que el protocolo introducido ofrece mayores requisitos de seguridad que trabajos anteriores.]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[cryptography]]></kwd>
<kwd lng="en"><![CDATA[computer network]]></kwd>
<kwd lng="en"><![CDATA[discrete logarithm]]></kwd>
<kwd lng="en"><![CDATA[mutul authentication]]></kwd>
<kwd lng="en"><![CDATA[password]]></kwd>
<kwd lng="en"><![CDATA[smart cards]]></kwd>
<kwd lng="en"><![CDATA[AVISPA tool]]></kwd>
<kwd lng="es"><![CDATA[criptografía]]></kwd>
<kwd lng="es"><![CDATA[seguridad en redes]]></kwd>
<kwd lng="es"><![CDATA[logaritmo discreto]]></kwd>
<kwd lng="es"><![CDATA[autenticación mutua]]></kwd>
<kwd lng="es"><![CDATA[contraseña]]></kwd>
<kwd lng="es"><![CDATA[tarjetas inteligentes]]></kwd>
<kwd lng="es"><![CDATA[herramienta AVISPA]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[The AVISPA tool for the automated validation of Internete security protocols and applications]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Armando]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Basin]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Boichut]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
</person-group>
<source><![CDATA[Lecture Notes in Computer Science]]></source>
<year>2005</year>
<publisher-loc><![CDATA[Berlin ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[A new remote user authentication scheme using smart cards with check digits]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Awasthi]]></surname>
<given-names><![CDATA[A.-K.]]></given-names>
</name>
<name>
<surname><![CDATA[Lal]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<source><![CDATA[CoRR]]></source>
<year>2005</year>
</nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Cryptanalysis of a remote user authentication scheme using smart cards]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chan]]></surname>
<given-names><![CDATA[C.-K.]]></given-names>
</name>
<name>
<surname><![CDATA[Cheng]]></surname>
<given-names><![CDATA[L.-M.]]></given-names>
</name>
</person-group>
<source><![CDATA[IEEE Transactions on Consumer Electronics]]></source>
<year>2000</year>
<volume>46</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>992-3</page-range></nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Some forgery attacks on a remote user authentication scheme using smart cards]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chang]]></surname>
<given-names><![CDATA[C.-C.]]></given-names>
</name>
<name>
<surname><![CDATA[Hwang]]></surname>
<given-names><![CDATA[K.-F.]]></given-names>
</name>
</person-group>
<source><![CDATA[Informatica]]></source>
<year>2003</year>
<volume>14</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>289-94</page-range></nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[A remote password authentication scheme based upong ElGamal's signature scheme]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chang]]></surname>
<given-names><![CDATA[C.-C.]]></given-names>
</name>
<name>
<surname><![CDATA[Liao]]></surname>
<given-names><![CDATA[W.-Y.]]></given-names>
</name>
</person-group>
<source><![CDATA[Computers &amp; Security]]></source>
<year>1994</year>
<volume>13</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>137-44</page-range></nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Remote password authentication with smart cards]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chang]]></surname>
<given-names><![CDATA[C.-C.]]></given-names>
</name>
<name>
<surname><![CDATA[Wu]]></surname>
<given-names><![CDATA[T.-C.]]></given-names>
</name>
</person-group>
<source><![CDATA[IEE Proceedings-E]]></source>
<year>1991</year>
<volume>138</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>165-8</page-range></nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chevalier]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Compagna]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Cuellar]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Workshop on Specification and Automated Processing of Security Requirements]]></source>
<year>2004</year>
<publisher-loc><![CDATA[Linz, Austria ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[A Dynamic ID-based remote user authentication scheme]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Das]]></surname>
<given-names><![CDATA[M.-L.]]></given-names>
</name>
<name>
<surname><![CDATA[Saxena]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Gulati]]></surname>
<given-names><![CDATA[V.-P.]]></given-names>
</name>
</person-group>
<source><![CDATA[IEEE Transactions on Consumer Electronics]]></source>
<year>2004</year>
<volume>50</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>629-31</page-range></nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[On the security of public key protocols]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Dolev]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Yao]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[IEEE Transactions on Information Theory]]></source>
<year>1983</year>
<volume>29</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>198-208</page-range></nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[A public-key cryptosystem and a signature scheme based on discrete logarithms]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[ElGamal]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<source><![CDATA[IEEE Transactions on Information Theory]]></source>
<year>1985</year>
<volume>31</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>469-72</page-range></nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Two improved two-party identity-based authenticated key agreement protocols]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hölbl]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Welzer]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<source><![CDATA[Computer Standards &amp; Interfaces]]></source>
<year>2009</year>
<volume>31</volume>
<numero>6</numero>
<issue>6</issue>
<page-range>1056-60</page-range></nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[A new remote user authentication scheme using smart cards]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hwang]]></surname>
<given-names><![CDATA[M.-S.]]></given-names>
</name>
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[L.-H.]]></given-names>
</name>
</person-group>
<source><![CDATA[IEEE Transactions on Consumer Electronics]]></source>
<year>2000</year>
<volume>46</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>28-30</page-range></nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hwang]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Laih]]></surname>
<given-names><![CDATA[C.-S.]]></given-names>
</name>
</person-group>
<source><![CDATA[Non-interactive password authentication without password tables]]></source>
<year>1990</year>
<conf-name><![CDATA[ IEEE Region 10 Conference on Computer and Communication System]]></conf-name>
<conf-loc>Hong Kong </conf-loc>
</nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Efficient password authenticated key agreement using smart cards]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Juang]]></surname>
<given-names><![CDATA[W.-S.]]></given-names>
</name>
</person-group>
<source><![CDATA[Computers &amp; Security]]></source>
<year>2004</year>
<volume>23</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>167-73</page-range></nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[New remote user authentication scheme using smart cards]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kumar]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[IEEE Transactions on Consumer Electronics]]></source>
<year>2004</year>
<volume>50</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>597-600</page-range></nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Password authentication with insecure communication]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lamport]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<source><![CDATA[Communications of the ACM]]></source>
<year>1981</year>
<volume>24</volume>
<numero>11</numero>
<issue>11</issue>
<page-range>770-2</page-range></nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Improved remote authentication scheme with smart card]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lee]]></surname>
<given-names><![CDATA[N.-Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Chiu]]></surname>
<given-names><![CDATA[Y.-C.]]></given-names>
</name>
</person-group>
<source><![CDATA[Computer Standards &amp; Interfaces]]></source>
<year>2005</year>
<volume>27</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>177-80</page-range></nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Efficient nonce-based remote user authentication scheme using smart cards]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lee]]></surname>
<given-names><![CDATA[S.-W.]]></given-names>
</name>
<name>
<surname><![CDATA[Kim]]></surname>
<given-names><![CDATA[H.-S.]]></given-names>
</name>
<name>
<surname><![CDATA[Yoo]]></surname>
<given-names><![CDATA[K. Y.]]></given-names>
</name>
</person-group>
<source><![CDATA[Applied Mathematics and Computation]]></source>
<year>2005</year>
<volume>167</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>355-61</page-range></nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Improvement of Chien et al.'s remote user authentication scheme using smart cards]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lee]]></surname>
<given-names><![CDATA[S.-W.]]></given-names>
</name>
<name>
<surname><![CDATA[Kim]]></surname>
<given-names><![CDATA[H.-S.]]></given-names>
</name>
<name>
<surname><![CDATA[Yoo]]></surname>
<given-names><![CDATA[K.-Y.]]></given-names>
</name>
</person-group>
<source><![CDATA[Computer Standards &amp; Interfaces]]></source>
<year>2005</year>
<volume>27</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>181-3</page-range></nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Cryptanalysis of a modified remote user authentication scheme using smart cards]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Leung]]></surname>
<given-names><![CDATA[K.-C.]]></given-names>
</name>
<name>
<surname><![CDATA[Cheng]]></surname>
<given-names><![CDATA[L.-M.]]></given-names>
</name>
<name>
<surname><![CDATA[Fong]]></surname>
<given-names><![CDATA[A.-S.]]></given-names>
</name>
<name>
<surname><![CDATA[Chan]]></surname>
<given-names><![CDATA[C.-K.]]></given-names>
</name>
</person-group>
<source><![CDATA[IEEE Transactions on Consumer Electronics]]></source>
<year>2003</year>
<volume>49</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>1243-5</page-range></nlm-citation>
</ref>
<ref id="B21">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[An efficient and complete remote user authentication scheme using smart cards]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Liaw]]></surname>
<given-names><![CDATA[H.-T.]]></given-names>
</name>
<name>
<surname><![CDATA[Lin]]></surname>
<given-names><![CDATA[J.-F.]]></given-names>
</name>
<name>
<surname><![CDATA[Wu]]></surname>
<given-names><![CDATA[W.-C.]]></given-names>
</name>
</person-group>
<source><![CDATA[Mathematical and Computer Modelling]]></source>
<year>2006</year>
<volume>44</volume>
<numero>1-2</numero>
<issue>1-2</issue>
<page-range>223-8</page-range></nlm-citation>
</ref>
<ref id="B22">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Dynamic ID-based remote user password authentication schemes using smart cards: A review]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Madhusudhan]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Mittal]]></surname>
<given-names><![CDATA[R.-C.]]></given-names>
</name>
</person-group>
<source><![CDATA[Journal of Network and Computer Applications]]></source>
<year>2012</year>
<volume>35</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>1235-48</page-range></nlm-citation>
</ref>
<ref id="B23">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[New remote mutual authentication scheme using smart cards]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ramasamy]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Muniyandi]]></surname>
<given-names><![CDATA[A.-P.]]></given-names>
</name>
</person-group>
<source><![CDATA[Transactions on Data Privacy]]></source>
<year>2009</year>
<volume>2</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>141-52</page-range></nlm-citation>
</ref>
<ref id="B24">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[A remote user authentication scheme without using smart cards]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rhee]]></surname>
<given-names><![CDATA[H.-S.]]></given-names>
</name>
<name>
<surname><![CDATA[Kwon]]></surname>
<given-names><![CDATA[J.-L.]]></given-names>
</name>
<name>
<surname><![CDATA[Lee]]></surname>
<given-names><![CDATA[D.-H.]]></given-names>
</name>
</person-group>
<source><![CDATA[Computer Standards &amp; Interfaces]]></source>
<year>2009</year>
<volume>31</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>6-13</page-range></nlm-citation>
</ref>
<ref id="B25">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Shamir]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Identity-based cryptosystems and signature schemes]]></source>
<year>1984</year>
<conf-name><![CDATA[ CRYPTO 84]]></conf-name>
<conf-loc> </conf-loc>
</nlm-citation>
</ref>
<ref id="B26">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Efficient deniable authentication protocol based on generalized ElGamal signature scheme]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Shao]]></surname>
<given-names><![CDATA[Z.]]></given-names>
</name>
</person-group>
<source><![CDATA[Computer Standards &amp; Interfaces]]></source>
<year>2004</year>
<volume>26</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>449-54</page-range></nlm-citation>
</ref>
<ref id="B27">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[A modified remote user authentication scheme using smart cards]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Shen]]></surname>
<given-names><![CDATA[J.-J.]]></given-names>
</name>
<name>
<surname><![CDATA[Lin]]></surname>
<given-names><![CDATA[C.-W.]]></given-names>
</name>
<name>
<surname><![CDATA[Hwang]]></surname>
<given-names><![CDATA[M.-S.]]></given-names>
</name>
</person-group>
<source><![CDATA[IEEE Transactions on Consumer Electronics]]></source>
<year>2003</year>
<volume>49</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>414-6</page-range></nlm-citation>
</ref>
<ref id="B28">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[An efficient two-party identity-based key exchange protocol]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tseng]]></surname>
<given-names><![CDATA[Y.-M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Informatica]]></source>
<year>2007</year>
<volume>18</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>125-36</page-range></nlm-citation>
</ref>
<ref id="B29">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Smart card based secure password authentication scheme]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[S.-J.]]></given-names>
</name>
<name>
<surname><![CDATA[Chang]]></surname>
<given-names><![CDATA[J.-F.]]></given-names>
</name>
</person-group>
<source><![CDATA[Computer &amp; Security]]></source>
<year>1996</year>
<volume>15</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>231-7</page-range></nlm-citation>
</ref>
<ref id="B30">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Efficient remote user authentication scheme based on Generalized ElGamal Signature Scheme]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Yoon]]></surname>
<given-names><![CDATA[E.-J.]]></given-names>
</name>
<name>
<surname><![CDATA[Ryu]]></surname>
<given-names><![CDATA[E.-K.]]></given-names>
</name>
<name>
<surname><![CDATA[Yoo]]></surname>
<given-names><![CDATA[K.-Y.]]></given-names>
</name>
</person-group>
<source><![CDATA[IEEE Transactions on Consumer Electronics]]></source>
<year>2004</year>
<volume>50</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>568-70</page-range></nlm-citation>
</ref>
</ref-list>
</back>
</article>
