2Federal Information Processing Standards Publication 180- 1, SECURE HASH STANDARD [M]. 1995.
3Newman C, The One - Time - Password SASI Mechanism [EB/OL]. http:∥www.faqs.org/rfcs/ffc244.html, 1998.10.
4Halevi S, Krawczyk H, Public key cryptography and password protocols[J]. Proceedings of 5th ACM Conference on Computer and Communications Security, 1997:122- 131.
5Botting J, Security on the Intemet: Authenticating the User[J]. Telecommunications, 1997,31(12): 77-80.
6Schneier B, Applied Cryptography[M], 2nd Edition, John Wiley & Sons Inc, 1996.20-40.
7Jablon D P, Strong Password Only Authenticated Key Exchange[J]. Computer Communicafion Review, 1996, 26 (5): 5 - 26.
8Homg T L, Password Authentication Using Triangles and Straight Lines[J], Computer and Mathematics Applications, 1995,30(9): 63-71.