1 Z. Cheng, "novel biometric-based remote user authentication scheme using Quadratic Residues" 3 (3): 419-422, 2013
2 Ku, W. -C, "Weaknesses of a remote user authentication scheme using smart cards for multi-server architecture" E88-B (E88-B): 3451-3454, 2005
3 Youngsook Lee, "Weakness of Tan’s Two-Factor User Authentication Scheme in Wireless Sensor Networks" 203 : 707-714, 2012
4 Das, M. L, "Two-factor user authentication in wireless sensor networks" 8 : 1086-1090, 2009
5 Rathod, V, "Security in wireless sensor network: a survey" 1 (1): 35-44, 2011
6 이영숙, "Security Improvement to a Remote User Authentication Scheme for Multi-Server Environment" (사)디지털산업정보학회 7 (7): 23-30, 2011
7 이영숙, "Security Analysis of a Biometric-Based User Authentication Scheme" (사)디지털산업정보학회 10 (10): 81-87, 2014
8 T. S. Messergers, "Examining smart card security under the threat of power analysis attacks" 51 (51): 541-552, 2002
9 Tsai, J. -L, "Efficient multi-server authentication scheme based on one-way hash function without verification table" 27 : 115-121, 2008
10 P. Kocher, "Differential power analysis" 388-397, 1999
1 Z. Cheng, "novel biometric-based remote user authentication scheme using Quadratic Residues" 3 (3): 419-422, 2013
2 Ku, W. -C, "Weaknesses of a remote user authentication scheme using smart cards for multi-server architecture" E88-B (E88-B): 3451-3454, 2005
3 Youngsook Lee, "Weakness of Tan’s Two-Factor User Authentication Scheme in Wireless Sensor Networks" 203 : 707-714, 2012
4 Das, M. L, "Two-factor user authentication in wireless sensor networks" 8 : 1086-1090, 2009
5 Rathod, V, "Security in wireless sensor network: a survey" 1 (1): 35-44, 2011
6 이영숙, "Security Improvement to a Remote User Authentication Scheme for Multi-Server Environment" (사)디지털산업정보학회 7 (7): 23-30, 2011
7 이영숙, "Security Analysis of a Biometric-Based User Authentication Scheme" (사)디지털산업정보학회 10 (10): 81-87, 2014
8 T. S. Messergers, "Examining smart card security under the threat of power analysis attacks" 51 (51): 541-552, 2002
9 Tsai, J. -L, "Efficient multi-server authentication scheme based on one-way hash function without verification table" 27 : 115-121, 2008
10 P. Kocher, "Differential power analysis" 388-397, 1999
11 Tsuar, W. -J, "An enhanced user authentication scheme for multi-server internet services" 170 : 258-266, 2005
12 O. Althobaiti, "An Efficient Biometric Authentication Protocol for Wireless Sensor Networks" 2013 : 13-, 2013
13 A. Al-Hussain, "Abiometric-based authentication system for web services mobile user" 447-452, 2010
14 Akyildiz, I. F, "A survey on sensor networks" 40 (40): 102-114,
15 Li, L. -H, "A remote password authentication scheme for multiserver architecture using neural networks" 12 (12): 1498-1504, 2001
16 E. -J. Yoon, "A new biometric-based user authentication scheme without using password for wireless sensor networks" 279-284, 2011
17 Tsuar, W. -J, "A flexible user authentication for multi-server internet services" LNCS 2093 : 174-183, 2001
18 J. Yuan, "A biometric-based User Authentication for wireless Sensor Networks" 5 (5): 272-276, 2010