[1] W. Ford and B. S. Kaliski, “Server-Assisted Generation of a Strong Secret from a Password,” Proceedings of IEEE 9th International Workshop Enabling Technologies, June 2000, pp. 176-180.
[2] D. P. Jablon, “Password Authentication Using Multiple Servers,” Proceedings of RSA Security Conference, April 2001, pp. 344-360.
[3] I. C. Lin, M. S. Hwang and L. H. Li, “A New Remote User Authentication Scheme for Multi-Server Architecture,” Future Generation Computer System, Vol. 19, No. 1, 2003, pp. 13-22.
[4] W. S. Juang, “Efficient Multi-Server Password Authenticated Key Agreement using Smart Cards,” IEEE Transactions on Consumer Electronics, Vol. 50, No. 1, 2004, pp. 251-255.
[5] C. C. Chang and J. S. Lee, “An Efficient and Secure Multi-Server Password Authentication Scheme Using Smart Cards,” Proceedings of International Conference on Cyber Worlds, November 2004, pp. 417-422.
[6] L. Hu, X. Niu and Y. Yang, “An Efficient Multi-Server Password Authenticated Key Agreement Scheme Using Smart Cards,” Proceedings of International Conference on Multimedia and Ubiquitous Engineering (MUE’07), April 2007, pp. 903-907.
[7] Y. Yang, R. H. Deng and F. Bao, “A Practical Password-Based Two-Server Authentication and Key Exchange System,” IEEE Transactions on Dependable and Secure Computing, Vol. 3, No. 2, 2006, pp. 105-114.
[8] J. L. Tsai, “Efficient Multi-Server Authentication Scheme Based on One-Way Hash Function without Verification Table,” Computers & Security, Vol. 27, No. 3-4, 2008, pp. 115-121.
[9] Y. P. Liao and S. S. Wang, “A Secure Dynamic ID-Based Remote User Authentication Scheme for Multi-Server Environment,” Computer Standards & Interface, Vol. 31, No. 1, 2009, pp. 24-29.
[10] H. C. Hsiang and W. K. Shih, “Improvement of the Secure Dynamic ID Based Remote User Authentication Scheme for Multi-Server Environment,” Computer Standards & Interface, Vol. 31, No. 6, 2009, pp. 1118-1123.
[11] S. K. Sood, A. K. Sarje and K. Singh, “A Secure Dynamic Identity Based Authentication Protocol for Multi-Server Architecture,” Journal of Network and Computer Applications, Vol. 34, No. 2, 2011, pp. 609-618.
[12] P. Kocher, J. Jaffe and B. Jun, “Differential Power Analysis,” Proceedings of CRYPTO 99, Springer-Verlag, August 1999, pp. 388-397.
[13] T. S. Messerges, E. A. Dabbish and R. H. Sloan, “Examining Smart-Card Security under the Threat of Power Analysis Attacks,” IEEE Transactions on Computers, Vol. 51, No. 5, 2002, pp. 541-552.