1. Sohn, Y., Cho, M., On, G., Chae, K.: A secure user authentication method in networked intelligent manufacturing systems. In: Proceedings of International Conference on Cyberworlds (CW 2005), pp. 122–129 (2005)
2. Fan, C.I., Ho, P.H., Hsu, R.H.: Provably secure nested one-time secret mechanisms for fast mutual authentication and key exchange in mobile communications. IEEE/ACM Trans. Networking 18(3), 996–1009 (2010)
3. Lecture Notes in Computer Science;M Bellare,1994
4. Bellare, M., Canetti, R., Krawczyk, H.: A modular approach to the design and analysis of authentication and key-exchange protocols. In: Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing, pp. 419–428 (1998)
5. Fan, C.I., Chan, Y.C., Zhang, Z.K.: Robust remote authentication scheme with smart cards. Comput. Secur. 24(8), 619–628 (2005)