1. Boneh, D., & Franklin, M. (2001). Identity-based encryption from the weil pairing. Advances in Cryptology Crypto’01, 2139, 213–229.
2. Chan, C. K., & Cheng, L. M. (2002). Cryptanalysis of a timestamp-based password authentication scheme. Computers and Security, 21(1), 74–76.
3. Chang, C. C., & Wu, T. C. (1993). Remote password authentication with smart cards. IEE Proceedings-E, 138(3), 165–168.
4. Chien, H. Y., Jan, J. K., & Tseng, Y. H. (2002). An efficient and practical solution to remote authentication: Smart card. Computers and Security, 21(4), 372–375.
5. Chou, J. S., Chen, Y., Lin, J. Y. (2005). Improvement of Manik et al.'s remote user authentication scheme. From: http://eprint.iacr.org/2005/450