@article{Fan2005619,
title = "Robust remote authentication scheme with smart cards",
journal = "Computers \& Security",
volume = "24",
number = "8",
pages = "619 - 628",
year = "2005",
note = "",
issn = "0167-4048",
doi = "DOI: 10.1016/j.cose.2005.03.006",
url = "http://www.sciencedirect.com/science/article/B6V8G-4G65C08-1/2/0cbc3df4219dff1adbda12ea943f424b",
author = "Chun-I Fan and Yung-Cheng Chan and Zhi-Kai Zhang",
keywords = "Remote authentication",
keywords = "Login",
keywords = "Smart cards",
keywords = "Information security",
keywords = "Cryptology"
}
@ARTICLE{1277863,
author={Wei-Chi Ku and Shuai-Min Chen},
journal={Consumer Electronics, IEEE Transactions on}, title={Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards},
year={2004},
month=feb,
volume={50},
number={1},
pages={ 204 - 207},
keywords={ insider attack; password; reflection attack; remote user authentication; smart cards; message authentication; smart cards;},
doi={10.1109/TCE.2004.1277863},
ISSN={0098-3063},}

@article{Lamport:1981:PAI:358790.358797,
 author = {Lamport, Leslie},
 title = {Password authentication with insecure communication},
 journal = {Commun. ACM},
 volume = {24},
 issue = {11},
 month = {November},
 year = {1981},
 issn = {0001-0782},
 pages = {770--772},
 numpages = {3},
 url = {http://doi.acm.org/10.1145/358790.358797},
 doi = {http://doi.acm.org/10.1145/358790.358797},
 acmid = {358797},
 publisher = {ACM},
 address = {New York, NY, USA},
 keywords = {authentication, one-way function, passwords, security},
} 

@article{Yang1999727,
title = "Password authentication schemes with smart cards",
journal = "Computers & Security",
volume = "18",
number = "8",
pages = "727 - 733",
year = "1999",
note = "",
issn = "0167-4048",
doi = "DOI: 10.1016/S0167-4048(99)80136-9",
url = "http://www.sciencedirect.com/science/article/B6V8G-3YF468B-8/2/f6a3b5fd3ada7b03b820b538cfbe5a77",
author = "Wen-Her Yang and Shiuh-Pyng Shieh",
keywords = "password authentication",
keywords = "smart card",
keywords = "ID-based scheme",
keywords = "clock synchronization"
}

@article{Chang2009611,
title = "Enhanced authentication scheme with anonymity for roaming service in global mobility networks",
journal = "Computer Communications",
volume = "32",
number = "4",
pages = "611 - 618",
year = "2009",
note = "",
issn = "0140-3664",
doi = "DOI: 10.1016/j.comcom.2008.11.032",
url = "http://www.sciencedirect.com/science/article/B6TYP-4V34D8G-1/2/7bc7da137c14198e9e81874143ac77db",
author = "Chin-Chen Chang and Chia-Yin Lee and Yen-Chang Chiu",
keywords = "Authentication",
keywords = "Roaming",
keywords = "Key agreement",
keywords = "The forgery attack",
keywords = "Energy consumption"
}

@article{10.1109/RISP.1992.213269,
author = {Steven M. Bellovin and Michael Merritt},
title = {Encrypted Key Exchange: Password-Based Protocols SecureAgainst Dictionary Attacks},
journal ={Security and Privacy, IEEE Symposium on},
volume = {0},
issn = {1540-7993},
year = {1992},
pages = {72},
doi = {http://doi.ieeecomputersociety.org/10.1109/RISP.1992.213269},
publisher = {IEEE Computer Society},
address = {Los Alamitos, CA, USA},
}

@ARTICLE{75504, 
author={Chang, C.-C. and Wu, T.-C.}, 
journal={Computers and Digital Techniques, IEE Proceedings E}, title={Remote password authentication with smart cards}, 
year={1991}, 
month=may, 
volume={138}, 
number={3}, 
pages={ 165 - 168}, 
keywords={ Chinese remainder theorem; communication timestamps; password generation; remote password authentication; signature scheme; smart cards; cryptography; smart cards;}, 
doi={}, 
ISSN={0143-7062},}

@ARTICLE{920446, 
author={Hung-Min Sun}, 
journal={Consumer Electronics, IEEE Transactions on}, title={An efficient remote use authentication scheme using smart cards}, 
year={2000}, 
month=nov, 
volume={46}, 
number={4}, 
pages={958 -961}, 
keywords={communication cost reduction;computation cost reduction;cryptography;discrete logarithm;remote use authentication;smart cards;cryptography;message authentication;smart cards;telecommunication security;}, 
doi={10.1109/30.920446}, 
ISSN={0098-3063},}

@ARTICLE{826377, 
author={Min-Shiang Hwang and Li-Hua Li}, 
journal={Consumer Electronics, IEEE Transactions on}, title={A new remote user authentication scheme using smart cards}, 
year={2000}, 
month=feb, 
volume={46}, 
number={1}, 
pages={28 -30}, 
keywords={message replaying attack;public key cryptosystem;remote user authentication;smart cards;message authentication;public key cryptography;smart cards;}, 
doi={10.1109/30.826377}, 
ISSN={0098-3063},}

@article{Chien2002372,
title = "An Efficient and Practical Solution to Remote Authentication: Smart Card",
journal = "Computers \& Security",
volume = "21",
number = "4",
pages = "372 - 375",
year = "2002",
note = "",
issn = "0167-4048",
doi = "DOI: 10.1016/S0167-4048(02)00415-7",
url = "http://www.sciencedirect.com/science/article/B6V8G-46692F5-H/2/7d18d38475b475aa9205893e7248ad4f",
author = "Hung-Yu Chien and Jinn-Ke Jan and Yuh-Min Tseng",
keywords = "authentication",
keywords = "password",
keywords = "smart card"
}


@ARTICLE{1277870, 
author={Wen-Shenq Juang}, 
journal={Consumer Electronics, IEEE Transactions on}, title={Efficient multi-server password authenticated key agreement using smart cards}, 
year={2004}, 
month=feb, 
volume={50}, 
number={1}, 
pages={ 251 - 255}, 
keywords={ authenticated key agreement; communication cost; information technology; multiserver environments; multiserver password; nonce-bayed scheme; remote user authentication; smart cards; message authentication; network servers; smart cards; telecommunication security; telecommunication services;}, 
doi={10.1109/TCE.2004.1277870}, 
ISSN={0098-3063},}

@article{Juang2004167,
title = "Efficient password authenticated key agreement using smart cards",
journal = "Computers \& Security",
volume = "23",
number = "2",
pages = "167 - 173",
year = "2004",
note = "",
issn = "0167-4048",
doi = "DOI: 10.1016/j.cose.2003.11.005",
url = "http://www.sciencedirect.com/science/article/B6V8G-4BT8GR5-2/2/e5bef7f5c45958e8751b726d62bf40f4",
author = "Wen-Shenq Juang",
keywords = "Password",
keywords = "Authentication",
keywords = "Session key",
keywords = "Smart card",
keywords = "Network security",
keywords = "Data security"
}

@ARTICLE{1309439, 
author={Wen-Sheng Jaung}, 
journal={Consumer Electronics, IEEE Transactions on}, title={Efficient three-party key exchange using smart cards}, 
year={2004}, 
month=may, 
volume={50}, 
number={2}, 
pages={ 619 - 624}, 
keywords={ authentication; encrypted key exchange protocols; passwords; smart cards; three-party key exchange scheme; time-synchronization problem; cryptography; message authentication; smart cards; synchronisation;}, 
doi={10.1109/TCE.2004.1309439}, 
ISSN={0098-3063},}

@article{Fan2005619,
title = "Robust remote authentication scheme with smart cards",
journal = "Computers & Security",
volume = "24",
number = "8",
pages = "619 - 628",
year = "2005",
note = "",
issn = "0167-4048",
doi = "DOI: 10.1016/j.cose.2005.03.006",
url = "http://www.sciencedirect.com/science/article/B6V8G-4G65C08-1/2/0cbc3df4219dff1adbda12ea943f424b",
author = "Chun-I Fan and Yung-Cheng Chan and Zhi-Kai Zhang",
keywords = "Remote authentication",
keywords = "Login",
keywords = "Smart cards",
keywords = "Information security",
keywords = "Cryptology"
}

@incollection {springerlink:10.1007/11540007_73,
   author = {Sun, Da-Zhi and Cao, Zhen-Fu},
   affiliation = {Department of Computer Science and Technology, Shanghai Jiao Tong University, Shanghai 200030 P.R. China},
   title = {Improvement of Lee-Kim-Yoo’s Remote User Authentication Scheme Using Smart Cards},
   booktitle = {Fuzzy Systems and Knowledge Discovery},
   series = {Lecture Notes in Computer Science},
   editor = {Wang, Lipo and Jin, Yaochu},
   publisher = {Springer Berlin / Heidelberg},
   isbn = {},
   pages = {596-599},
   volume = {3614},
   url = {http://dx.doi.org/10.1007/11540007_73},
   note = {10.1007/11540007_73},
   year = {2005}
}

@article{Sun20051185,
title = "Weakness and improvement on Wang-Li-Tie's user-friendly remote authentication scheme",
journal = "Applied Mathematics and Computation",
volume = "170",
number = "2",
pages = "1185 - 1193",
year = "2005",
note = "",
issn = "0096-3003",
doi = "DOI: 10.1016/j.amc.2005.01.013",
url = "http://www.sciencedirect.com/science/article/B6TY8-4FJ5XPC-7/2/752b328ba46bf4045c19ac15b723346f",
author = "Da-Zhi Sun and Ji-Dong Zhong and Yu Sun",
keywords = "Network security",
keywords = "Cryptology",
keywords = "Remote authentication",
keywords = "Smart card loss assumption",
keywords = "Password",
keywords = "Impersonation"
}

@article{Peyravian2000466,
title = "Methods for Protecting Password Transmission",
journal = "Computers & Security",
volume = "19",
number = "5",
pages = "466 - 469",
year = "2000",
note = "",
issn = "0167-4048",
doi = "DOI: 10.1016/S0167-4048(00)05032-X",
url = "http://www.sciencedirect.com/science/article/B6V8G-4118JYH-14/2/595ec42f66dbace7215b08520aea45b1",
author = "Mohammad Peyravian and Nevenko Zunic",
keywords = "password",
keywords = "protection",
keywords = "exchange",
keywords = "hash",
keywords = "cryptography"
}

@article{Cheng20072280,
title = "Security enhancement of an IC-card-based remote login mechanism",
journal = "Computer Networks",
volume = "51",
number = "9",
pages = "2280 - 2287",
year = "2007",
note = "(1) Advances in Smart Cards and (2) Topics in Wireless Broadband Systems",
issn = "1389-1286",
doi = "DOI: 10.1016/j.comnet.2007.01.013",
url = "http://www.sciencedirect.com/science/article/B6VRG-4MY0MRS-6/2/55b067bae25f9897edc475cf29f2496c",
author = "Ting-Fang Cheng and Jung-San Lee and Chin-Chen Chang",
keywords = "IC card",
keywords = "Remote authentication",
keywords = "Key distribution",
keywords = "One-way hash function"
}

@article{Liu20082205,
title = "A new mutual authentication scheme based on nonce and smart cards",
journal = "Computer Communications",
volume = "31",
number = "10",
pages = "2205 - 2209",
year = "2008",
note = "",
issn = "0140-3664",
doi = "DOI: 10.1016/j.comcom.2008.02.002",
url = "http://www.sciencedirect.com/science/article/B6TYP-4RVG3M2-1/2/10647240f1794daee0f80a35631df8d3",
author = "Jia-Yong Liu and An-Min Zhou and Min-Xu Gao",
keywords = "Authentication",
keywords = "Personate attack",
keywords = "Smart card",
keywords = "Security improvement"
}

@ARTICLE{4531703, 
author={Wen-Shenq Juang and Sian-Teng Chen and Horng-Twu Liaw}, 
journal={Industrial Electronics, IEEE Transactions on}, title={Robust and Efficient Password-Authenticated Key Agreement Using Smart Cards}, 
year={2008}, 
month=jun, 
volume={55}, 
number={6}, 
pages={2551 -2556}, 
keywords={client-server system;elliptic curve cryptosystem;password-authenticated key agreement;securely distributed information system;smart cards;user identity privacy;client-server systems;message authentication;public key cryptography;smart cards;}, 
doi={10.1109/TIE.2008.921677}, 
ISSN={0278-0046},}

@ARTICLE{4711235, 
author={Da-Zhi Sun and Jin-Peng Huai and Ji-Zhou Sun and Jia-Wan Zhang and Zhi-Yong Feng}, 
journal={Consumer Electronics, IEEE Transactions on}, title={A new design of wearable token system for mobile device security}, 
year={2008}, 
month=november , 
volume={54}, 
number={4}, 
pages={1784 -1789}, 
keywords={mobile device security;performance enhancements;transient authentication;wearable token system;wireless link;message authentication;mobile handsets;mobility management (mobile radio);radio links;telecommunication security;wearable computers;}, 
doi={10.1109/TCE.2008.4711235}, 
ISSN={0098-3063},}

@article{Juang20081238,
title = "Efficient password authenticated key agreement using bilinear pairings",
journal = "Mathematical and Computer Modelling",
volume = "47",
number = "11-12",
pages = "1238 - 1245",
year = "2008",
note = "",
issn = "0895-7177",
doi = "DOI: 10.1016/j.mcm.2007.08.001",
url = "http://www.sciencedirect.com/science/article/B6V0V-4PP774P-6/2/5a93e645af87dd2e0117cf219a7b9d2d",
author = "Wen-Shenq Juang and Wei-Ken Nien",
keywords = "User authentication",
keywords = "Session key agreement",
keywords = "Identity protection",
keywords = "Bilinear pairings",
keywords = "Smart cards"
}

@article{Wang2009583,
title = "A more efficient and secure dynamic ID-based remote user authentication scheme",
journal = "Computer Communications",
volume = "32",
number = "4",
pages = "583 - 585",
year = "2009",
note = "",
issn = "0140-3664",
doi = "DOI: 10.1016/j.comcom.2008.11.008",
url = "http://www.sciencedirect.com/science/article/B6TYP-4TY9MRK-3/2/a089d86f56f5471b0abbca42698936f2",
author = "Yan-yan Wang and Jia-yong Liu and Feng-xia Xiao and Jing Dan",
keywords = "Authentication",
keywords = "Password",
keywords = "Smart cards",
keywords = "Security analysis"
}

@article{Hsiang2009649,
title = "Weaknesses and improvements of the Yoon-Ryu-Yoo remote user authentication scheme using smart cards",
journal = "Computer Communications",
volume = "32",
number = "4",
pages = "649 - 652",
year = "2009",
note = "",
issn = "0140-3664",
doi = "DOI: 10.1016/j.comcom.2008.11.019",
url = "http://www.sciencedirect.com/science/article/B6TYP-4V17CRC-3/2/7b4d2fe35863bc554fd8937f80a237a6",
author = "Han-Cheng Hsiang and Wei-Kuan Shih",
keywords = "Authentication",
keywords = "Cryptography",
keywords = "Password guessing attack",
keywords = "Parallel session attack"
}

@article{Kim20091018,
title = "More secure remote user authentication scheme",
journal = "Computer Communications",
volume = "32",
number = "6",
pages = "1018 - 1021",
year = "2009",
note = "",
issn = "0140-3664",
doi = "DOI: 10.1016/j.comcom.2008.11.026",
url = "http://www.sciencedirect.com/science/article/B6TYP-4V2NKF2-5/2/cc163e4d8a76e15dac820e430adb9b5e",
author = "Sang-Kyun Kim and Min Gyo Chung",
keywords = "Authentication",
keywords = "Information security",
keywords = "Smart card"
}

@ARTICLE{4801688, 
author={Xiangxue Li and Weidong Qiu and Dong Zheng and Kefei Chen and Jianhua Li}, 
journal={Industrial Electronics, IEEE Transactions on}, title={Anonymity Enhancement on Robust and Efficient Password-Authenticated Key Agreement Using Smart Cards}, 
year={2010}, 
month=feb, 
volume={57}, 
number={2}, 
pages={793 -800}, 
keywords={anonymity enhancement;communication channel;denial of service attack;password-authenticated key agreement;smart cards;untraceability property;message authentication;smart cards;telecommunication security;}, 
doi={10.1109/TIE.2009.2028351}, 
ISSN={0278-0046},}

@incollection {springerlink:10.1007/3-540-48329-2_21,
   author = {Bellare, Mihir and Rogaway, Phillip},
   affiliation = {IBM T.J. Watson Research Center High Performance Computing and Communications PO Box 704 Yorktown Heights NY 10598 USA},
   title = {Entity Authentication and Key Distribution},
   booktitle = {Advances in Cryptology — CRYPTO’ 93},
   series = {Lecture Notes in Computer Science},
   editor = {Stinson, Douglas},
   publisher = {Springer Berlin / Heidelberg},
   isbn = {},
   pages = {232-249},
   volume = {773},
   url = {http://dx.doi.org/10.1007/3-540-48329-2_21},
   note = {10.1007/3-540-48329-2_21},
   year = {1994}
}

@inproceedings{Bellare:1995:PSS:225058.225084,
 author = {Bellare, Mihir and Rogaway, Phillip},
 title = {Provably secure session key distribution: the three party case},
 booktitle = {Proceedings of the twenty-seventh annual ACM symposium on Theory of computing},
 series = {STOC '95},
 year = {1995},
 isbn = {0-89791-718-9},
 location = {Las Vegas, Nevada, United States},
 pages = {57--66},
 numpages = {10},
 url = {http://doi.acm.org/10.1145/225058.225084},
 doi = {http://doi.acm.org/10.1145/225058.225084},
 acmid = {225084},
 publisher = {ACM},
 address = {New York, NY, USA},
} 

@article{Wang2007507,
title = "Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards",
journal = "Computer Standards & Interfaces",
volume = "29",
number = "5",
pages = "507 - 512",
year = "2007",
note = "",
issn = "0920-5489",
doi = "DOI: 10.1016/j.csi.2006.11.005",
url = "http://www.sciencedirect.com/science/article/B6TYV-4MV19X4-1/2/cb86ec274b142b6c33e706f17eb9eef9",
author = "Xiao-Min Wang and Wen-Fang Zhang and Jia-Shu Zhang and Muhammad Khurram Khan",
keywords = "Authentication",
keywords = "Smart card",
keywords = "Session key",
keywords = "Password"
}

@article{Halevi:1999:PCP:322510.322514,
 author = {Halevi, Shai and Krawczyk, Hugo},
 title = {Public-key cryptography and password protocols},
 journal = {ACM Trans. Inf. Syst. Secur.},
 volume = {2},
 issue = {3},
 month = {August},
 year = {1999},
 issn = {1094-9224},
 pages = {230--268},
 numpages = {39},
 url = {http://doi.acm.org/10.1145/322510.322514},
 doi = {http://doi.acm.org/10.1145/322510.322514},
 acmid = {322514},
 publisher = {ACM},
 address = {New York, NY, USA},
 keywords = {dictionary attacks, hand-held certificates, key exchange, passwords, public passwords, public-key protocols},
} 

@incollection {springerlink:10.1007/3-540-48892-8_26,
   author = {Blake-Wilson, Simon and Menezes, Alfred},
   affiliation = {Certicom Research 200 Matheson Blvd. W., Suite 103 Mississauga Ontario Canada L5R 3L7},
   title = {Authenticated Diffe-Hellman Key Agreement Protocols},
   booktitle = {Selected Areas in Cryptography},
   series = {Lecture Notes in Computer Science},
   editor = {Tavares, Stafford and Meijer, Henk},
   publisher = {Springer Berlin / Heidelberg},
   isbn = {},
   pages = {630-630},
   volume = {1556},
   url = {http://dx.doi.org/10.1007/3-540-48892-8_26},
   note = {10.1007/3-540-48892-8_26},
   year = {1999}
}

@ARTICLE{1004593, 
author={Messerges, T.S. and Dabbish, E.A. and Sloan, R.H.}, 
journal={Computers, IEEE Transactions on}, title={Examining smart-card security under the threat of power analysis attacks}, 
year={2002}, 
month=may, 
volume={51}, 
number={5}, 
pages={541 -552}, 
keywords={DES;Data Encryption Standard;SNR;implementation attack;power analysis attacks;power analysis theory;power consumption signals;signal-to-noise ratio;smart card;smart-card security;cryptography;power consumption;security of data;smart cards;}, 
doi={10.1109/TC.2002.1004593}, 
ISSN={0018-9340},}

@ARTICLE{Kocher1999, 
author={Kocher, P. and  Jaffe, J. and Jun, B.}, 
journal={Advances in Cryptology: Proceeding of CRYPTO 99}, title={Differential power analysis}, 
year={1999}, 
pages={388-397}, 
keywords={DES;Data Encryption Standard;SNR;implementation attack;power analysis attacks;power analysis theory;power consumption signals;signal-to-noise ratio;smart card;smart-card security;cryptography;power consumption;security of data;smart cards;},}

@ARTICLE{4429275, 
author={Da-Zhi Sun and Jin-Peng Huai and Ji-Zhou Sun and Zhen-Fu Cao}, 
journal={Consumer Electronic, IEEE Transactions on}, title={An Efficient Modular Exponentiation Algorithm against Simple Power Analysis Attacks}, 
year={2007}, 
month=nov. , 
volume={53}, 
number={4}, 
pages={1718 -1723}, 
keywords={modular exponentiation algorithm;power analysis attacks;side-channel attack;single-chip device;cryptography;}, 
doi={10.1109/TCE.2007.4429275}, 
ISSN={0098-3063},}

@INPROCEEDINGS{1471550, 
author={ Tiri, K. and Akmal, M. and Verbauwhede, I.}, 
booktitle={Solid-State Circuits Conference, 2002. ESSCIRC 2002. Proceedings of the 28th European}, title={A dynamic and differential CMOS logic with signal independent power consumption to withstand differential power analysis on smart cards}, 
year={2002}, 
month=sept., 
volume={}, 
number={}, 
pages={ 403 - 406}, 
keywords={}, 
doi={10.1109/ESSCIR.2002.186793}, 
ISSN={},}

@INPROCEEDINGS{1356679, 
author={Pramstaller, N. and Gurkaynak, F.K. and Haene, S. and Kaeslin, H. and Felber, N. and Fichtner, W.}, 
booktitle={Solid-State Circuits Conference, 2004. ESSCIRC 2004. Proceeding of the 30th European}, title={Towards an AES crypto-chip resistant to differential power analysis}, 
year={2004}, 
month=sept., 
volume={}, 
number={}, 
pages={ 307 - 310}, 
keywords={ AES block cipher; AES crypto-chip; ASIC implementation; DPA; VLSI; cipher-circuit supply current measurement; cipher-key; circuit power model; correlation methods; cryptographic security; datapath operations masking; differential power analysis resistance; hardware implementation; masking countermeasures; performance penalty; reversible random bits masking; VLSI; block codes; correlation methods; cryptography; data privacy;}, 
doi={10.1109/ESSCIR.2004.1356679}, 
ISSN={ },}

@INPROCEEDINGS{1598556, 
author={ Nadeem, A. and Javed, M.Y.}, 
booktitle={Information and Communication Technologies, 2005. ICICT 2005. First International Conference on}, title={A Performance Comparison of Data Encryption Algorithms}, 
year={2005}, 
month=aug., 
volume={}, 
number={}, 
pages={ 84 - 89}, 
keywords={ Cryptography algorithms ; Data encryption ; Performance analysis;}, 
doi={10.1109/ICICT.2005.1598556}, 
ISSN={},}

@article{Rivest:1978:MOD:359340.359342,
 author = {Rivest, R. L. and Shamir, A. and Adleman, L.},
 title = {A method for obtaining digital signatures and public-key cryptosystems},
 journal = {Commun. ACM},
 volume = {21},
 issue = {2},
 month = {February},
 year = {1978},
 issn = {0001-0782},
 pages = {120--126},
 numpages = {7},
 url = {http://doi.acm.org/10.1145/359340.359342},
 doi = {http://doi.acm.org/10.1145/359340.359342},
 acmid = {359342},
 publisher = {ACM},
 address = {New York, NY, USA},
 keywords = {authentication, cryptography, digital signatures, electronic funds transfer, electronic mail, factorization, message-passing, prime number, privacy, public-key cryptosystems, security},
} 

@ARTICLE{4640932, 
author={Chia-Chun Wu and Wei-Bin Lee and Woei-Jiunn Tsaur}, 
journal={Communications Letters, IEEE}, title={A Secure Authentication Scheme with Anonymity for Wireless Communications}, 
year={2008}, 
month=october , 
volume={12}, 
number={10}, 
pages={722 -723}, 
keywords={anonymity secrecy;backward secrecy;secure authentication scheme;wireless communications;message authentication;radiocommunication;telecommunication security;}, 
doi={10.1109/LCOMM.2008.080283}, 
ISSN={1089-7798},}

@ARTICLE{4471983, 
author={Caimu Tang and Wu, D.O.}, 
journal={Wireless Communications, IEEE Transactions on}, title={Mobile Privacy in Wireless Networks-Revisited}, 
year={2008}, 
month=march , 
volume={7}, 
number={3}, 
pages={1035 -1042}, 
keywords={authentication efficiency;key agreement;mobile devices;mobile location information;mobile privacy;security vulnerability;third generation partnership project;wireless networks;data privacy;mobile handsets;telecommunication security;}, 
doi={10.1109/TWC.2008.060802}, 
ISSN={1536-1276},}

@ARTICLE{4640932, 
author={Chia-Chun Wu and Wei-Bin Lee and Woei-Jiunn Tsaur}, 
journal={Communications Letters, IEEE}, title={A Secure Authentication Scheme with Anonymity for Wireless Communications}, 
year={2008}, 
month=october , 
volume={12}, 
number={10}, 
pages={722 -723}, 
keywords={anonymity secrecy;backward secrecy;secure authentication scheme;wireless communications;message authentication;radiocommunication;telecommunication security;}, 
doi={10.1109/LCOMM.2008.080283}, 
ISSN={1089-7798},}

@INPROCEEDINGS{4076128, 
author={Yong-Zhen Li and Young-Bok Cho and Nam-Kyoung Um and Sang-Ho Lee}, 
booktitle={Computational Intelligence and Security, 2006 International Conference on}, title={Security and Privacy on Authentication Protocol for Low-cost RFID}, 
year={2006}, 
month=nov., 
volume={2}, 
number={}, 
pages={1101 -1104}, 
keywords={RFID tag;authentication protocol;automatic identification system;data privacy;data retrieval;data security;data storage;eavesdropping;location privacy exposure;low-cost RFID;radio frequency identification;reply attacking;spoofing attacking;authorisation;data privacy;radiofrequency identification;}, 
doi={10.1109/ICCIAS.2006.295432}, 
ISSN={},}

@ARTICLE{4939329, 
author={Ji-seon Lee and Jik Chang and Dong Lee}, 
journal={Communications Letters, IEEE}, title={Security flaw of authentication scheme with anonymity for wireless communications}, 
year={2009}, 
month=may , 
volume={13}, 
number={5}, 
pages={292 -293}, 
keywords={anonymity;authentication scheme;backward secrecy;security flaw;wireless communication;message authentication;mobile communication;telecommunication security;}, 
doi={10.1109/LCOMM.2009.090074}, 
ISSN={1089-7798},}

@ARTICLE{1202990, 
author={Weaver, A.C. and Condry, M.W.}, 
journal={Industrial Electronics, IEEE Transactions on}, title={Distributing Internet services to the network's edge}, 
year={2003}, 
month=june, 
volume={50}, 
number={3}, 
pages={ 404 - 411}, 
keywords={ Internet services distribution; Internet-enabled IT infrastructure; Java; NetEdge; Web server; World Wide Web; access device adaptation; caching; callout engine; client/edge server/origin server architecture; complex data types; content assembly; device interface tasks; encryption; image transcoding; incompatible display formats; industrial environment; language translation; latency characteristics; local content insertion; multimedia streams sourcing; multiple languages; privacy; proxylet interface; real-time response requirements; security; virus scanning; Internet; client-server systems; image coding; information resources; information services; language translation; multimedia systems;}, 
doi={10.1109/TIE.2003.812278}, 
ISSN={0278-0046},}

@ARTICLE{1589392, 
author={Colombo, A.W. and Schoop, R. and Neubert, R.}, 
journal={Industrial Electronics, IEEE Transactions on}, title={An agent-based intelligent control platform for industrial holonic manufacturing systems}, 
year={2005}, 
month=feb., 
volume={53}, 
number={1}, 
pages={ 322 - 337}, 
keywords={ Ethernet; Windows NT services; agent-based intelligent control; agent-oriented manufacturing system; collaborative factory automation; distributed component object model; embedded control agent; emerging mechatronics; industrial holonic manufacturing system; intelligent industrial control; intelligent manufacturing system; logic control program; revolutionary manufacturing paradigm; software component; distributed object management; flexible manufacturing systems; industrial control; intelligent manufacturing systems; mobile agents;}, 
doi={10.1109/TIE.2005.862210}, 
ISSN={0278-0046},}

@ARTICLE{1705659, 
author={Kyung Chang Lee and Suk Lee and Man Hyung Lee}, 
journal={Industrial Electronics, IEEE Transactions on}, title={Worst Case Communication Delay of Real-Time Industrial Switched Ethernet With Multiple Levels}, 
year={2006}, 
month=oct. , 
volume={53}, 
number={5}, 
pages={1669 -1676}, 
keywords={communication delay;fieldbus protocol;industrial switched ethernet;intelligent manufacturing system;multivendor products;networked control system;performance evaluation;real-time requirement;switched Ethernet technology;technical obstacle;timing diagram analysis;delays;field buses;intelligent manufacturing systems;local area networks;performance evaluation;real-time systems;telecommunication switching;}, 
doi={10.1109/TIE.2006.881986}, 
ISSN={0278-0046},}

@ARTICLE{1705659, 
author={Kyung Chang Lee and Suk Lee and Man Hyung Lee}, 
journal={Industrial Electronics, IEEE Transactions on}, title={Worst Case Communication Delay of Real-Time Industrial Switched Ethernet With Multiple Levels}, 
year={2006}, 
month=oct. , 
volume={53}, 
number={5}, 
pages={1669 -1676}, 
keywords={communication delay;fieldbus protocol;industrial switched ethernet;intelligent manufacturing system;multivendor products;networked control system;performance evaluation;real-time requirement;switched Ethernet technology;technical obstacle;timing diagram analysis;delays;field buses;intelligent manufacturing systems;local area networks;performance evaluation;real-time systems;telecommunication switching;}, 
doi={10.1109/TIE.2006.881986}, 
ISSN={0278-0046},}

@ARTICLE{4084666, 
author={Chih-Lyang Hwang and Li-Jui Chang and Yuan-Sheng Yu}, 
journal={Industrial Electronics, IEEE Transactions on}, title={Network-Based Fuzzy Decentralized Sliding-Mode Control for Car-Like Mobile Robots}, 
year={2007}, 
month=feb. , 
volume={54}, 
number={1}, 
pages={574 -585}, 
keywords={CLMR;Internet;car-like mobile robots;closed-loop system stability;decentralized sliding-mode control;forward-backward velocity control;motor control;network-based fuzzy control;quality-of-service;scaling factors;signal delay transmission;steering angle control;time-varying delay;trajectory tracking;wireless module;closed loop systems;decentralised control;delays;fuzzy control;mobile robots;time-varying systems;tracking;variable structure systems;velocity control;}, 
doi={10.1109/TIE.2006.888806}, 
ISSN={0278-0046},}

@ARTICLE{4148044, 
author={Guo-Ping Liu and Yuanqing Xia and Jie Chen and Rees, D. and Hu, W.}, 
journal={Industrial Electronics, IEEE Transactions on}, title={Networked Predictive Control of Systems With Random Network Delays in Both Forward and Feedback Channels}, 
year={2007}, 
month=june , 
volume={54}, 
number={3}, 
pages={1282 -1297}, 
keywords={NPC;closed-loop stability;constant time delay;feedback channel;forward channel;networked predictive control;random network delay;closed loop systems;control system synthesis;delays;feedback;feedforward;predictive control;stability;}, 
doi={10.1109/TIE.2007.893073}, 
ISSN={0278-0046},}

@ARTICLE{4470595, 
author={Lazar, C. and Carari, S.}, 
journal={Industrial Electronics, IEEE Transactions on}, title={A Remote-Control Engineering Laboratory}, 
year={2008}, 
month=june , 
volume={55}, 
number={6}, 
pages={2368 -2375}, 
keywords={Internet;intranet;networked control-system laboratory;remote-control engineering laboratory;server-client applications;supervisory control and data acquisition;Internet;SCADA systems;client-server systems;control engineering computing;control engineering education;distributed control;intranets;laboratories;telecontrol;}, 
doi={10.1109/TIE.2008.920650}, 
ISSN={0278-0046},}

@ARTICLE{4510864, 
author={Dondi, D. and Bertacchini, A. and Brunelli, D. and Larcher, L. and Benini, L.}, 
journal={Industrial Electronics, IEEE Transactions on}, title={Modeling and Optimization of a Solar Energy Harvester System for Self-Powered Wireless Sensor Networks}, 
year={2008}, 
month=july , 
volume={55}, 
number={7}, 
pages={2759 -2766}, 
keywords={maximum power point tracking;optimization;photovoltaic panel analytical model;self-powered wireless sensor networks;solar energy harvester system;optimisation;photovoltaic power systems;wireless sensor networks;}, 
doi={10.1109/TIE.2008.924449}, 
ISSN={0278-0046},}

@ARTICLE{4558159, 
author={Gil-Castineira, F. and Gonzalez-Castano, F.J. and Franck, L.}, 
journal={Industrial Electronics, IEEE Transactions on}, title={Extending Vehicular CAN Fieldbuses With Delay-Tolerant Networks}, 
year={2008}, 
month=sept. , 
volume={55}, 
number={9}, 
pages={3307 -3314}, 
keywords={controller-area network;delay-tolerant networks;single-hop wireless communications;standard diagnostics interface;vehicular CAN fieldbuses;controller area networks;mobile radio;}, 
doi={10.1109/TIE.2008.927972}, 
ISSN={0278-0046},}

@ARTICLE{4601474, 
author={Marino, P. and Poza, F. and Dominguez, M.A. and Otero, S.}, 
journal={Industrial Electronics, IEEE Transactions on}, title={Electronics in Automotive Engineering: A Top #x2013;Down Approach for Implementing Industrial Fieldbus Technologies in City Buses and Coaches}, 
year={2009}, 
month=feb. , 
volume={56}, 
number={2}, 
pages={589 -600}, 
keywords={automotive electronics;automotive engineering;city buses;coaches;electrical circuits;electronic control units;industrial communication networks;industrial fieldbus technologies;intelligent transportation systems;networked control systems;public transport buses;top-down approach;automated highways;automotive electronics;distributed control;field buses;road vehicles;}, 
doi={10.1109/TIE.2008.2002723}, 
ISSN={0278-0046},}

@inproceedings{Atasu:2004:EAI:967900.968073,
 author = {Atasu, Kubilay and Breveglieri, Luca and Macchetti, Marco},
 title = {Efficient AES implementations for ARM based platforms},
 booktitle = {Proceedings of the 2004 ACM symposium on Applied computing},
 series = {SAC '04},
 year = {2004},
 isbn = {1-58113-812-1},
 location = {Nicosia, Cyprus},
 pages = {841--845},
 numpages = {5},
 url = {http://doi.acm.org/10.1145/967900.968073},
 doi = {http://doi.acm.org/10.1145/967900.968073},
 acmid = {968073},
 publisher = {ACM},
 address = {New York, NY, USA},
 keywords = {AES, ARM microprocessor, cache memories, code optimisation},
} 

@incollection {springerlink:10.1007/11941378_30,
   author = {Darnall, Matthew and Kuhlman, Doug},
   affiliation = {Department of Mathematics, University of Wisconsin, Madison, 480 Lincoln Drive Madison, WI 53706  },
   title = {AES Software Implementations on ARM7TDMI},
   booktitle = {Progress in Cryptology - INDOCRYPT 2006},
   series = {Lecture Notes in Computer Science},
   editor = {Barua, Rana and Lange, Tanja},
   publisher = {Springer Berlin / Heidelberg},
   isbn = {},
   pages = {424-435},
   volume = {4329},
   url = {http://dx.doi.org/10.1007/11941378_30},
   note = {10.1007/11941378_30},
   year = {2006}
}

@article{Burrows:1990:LA:77648.77649,
 author = {Burrows, Michael and Abadi, Martin and Needham, Roger},
 title = {A logic of authentication},
 journal = {ACM Trans. Comput. Syst.},
 volume = {8},
 issue = {1},
 month = {February},
 year = {1990},
 issn = {0734-2071},
 pages = {18--36},
 numpages = {19},
 url = {http://doi.acm.org/10.1145/77648.77649},
 doi = {http://doi.acm.org/10.1145/77648.77649},
 acmid = {77649},
 publisher = {ACM},
 address = {New York, NY, USA},
} 

@incollection {springerlink:10.1007/BFb0024447,
   author = {Blake-Wilson, Simon and Johnson, Don and Menezes, Alfred},
   affiliation = {University of London Dept. of Mathematics, Royal Holloway TW20 0EX Egham Surrey UK TW20 0EX Egham Surrey UK},
   title = {Key agreement protocols and their security analysis},
   booktitle = {Crytography and Coding},
   series = {Lecture Notes in Computer Science},
   editor = {Darnell, Michael},
   publisher = {Springer Berlin / Heidelberg},
   isbn = {},
   pages = {30-45},
   volume = {1355},
   url = {http://dx.doi.org/10.1007/BFb0024447},
   note = {10.1007/BFb0024447},
   year = {1997}
}

@article {springerlink:10.1023/A:1022595222606,
   author = {Law, Laurie and Menezes, Alfred and Qu, Minghua and Solinas, Jerry and Vanstone, Scott},
   title = {An Efficient Protocol for Authenticated Key Agreement},
   journal = {Designs, Codes and Cryptography},
   publisher = {Springer Netherlands},
   issn = {0925-1022},
   keyword = {Mathematics and Statistics},
   pages = {119-134},
   volume = {28},
   issue = {2},
   url = {http://dx.doi.org/10.1023/A:1022595222606},
   note = {10.1023/A:1022595222606},
   year = {2003}
}

@article{Lee:2004:CUA:974104.974106,
 author = {Lee, Sung-Woon and Kim, Hyun-Sung and Yoo, Kee-Young},
 title = {Cryptanalysis of a user authentication scheme using hash functions},
 journal = {SIGOPS Oper. Syst. Rev.},
 volume = {38},
 issue = {1},
 month = {January},
 year = {2004},
 issn = {0163-5980},
 pages = {24--28},
 numpages = {5},
 url = {http://doi.acm.org/10.1145/974104.974106},
 doi = {http://doi.acm.org/10.1145/974104.974106},
 acmid = {974106},
 publisher = {ACM},
 address = {New York, NY, USA},
 keywords = {authentication, cryptography, guessing attack, hash function, password},
} 