2LEE C C,LI C T,HSU C W.A three-party passwordbased authenticated key exchange protocol with user anonymity using extended chaotic maps[J].Nonlinear Dynamics,2013,73(1):125-132.
3DAVID D B,RAJAPPA M,KARUPUSWAMY T,et al.Secure mutual authentication and Key-Agreement protocol for IP Multimedia Server-Client[J].Journal of Computational&Theoretical Nanoscience,2014,20(11):1856-1863.
4WONG D S,CHAN A H.Mutual authentication and key exchange for low power wireless communications[C]//Proceeding of Military Communications Conference,2001.MILCOM 2001.Communications for Network-Centric Operations:Creating the Information Force,IEEE,Boston,USA,October 28-31,2001(1):39-43.
5SHIM K.Cryptanalysis of mutual authentication and key exchange for low power wireless communications[J].IEEE Communications Letters,2003,7(5):248-250.
6YANG F Y,CHEN R C.On the security of mutual authentication and key exchange for low power wireless communications[J].Chien-Kuo Journal,2003,22:611-615.
7LIU C L,CHEN S S,SUN S L.Security analysis of mutual authentication and key exchange for low power wireless communications[J].Energy Procedia,2012,17:644-649.
8SIAW L N,CHRIS M.Comments on mutual authentication and key exchange protocols for low power wireless communications[J].IEEE communications letters,2004,8(4):262-263.
9LEE C C,LI C T,CHEN C T,et al.A new key exchange protocol with anonymity between STB and Smart Card in IPTV Broadcasting[C]//Proceeding of 7th International Conference on Wireless communications,Networking and Mobile Computing,IEEE,Wuhan,China,September 23-25,2011:1-4.
10JUN E A,RHEE H S,JIM J G,et al.Fingerprint-based access control using smart cards in IPTV[J].Multimedia Tools and Applications,2014,73(2):647-661.