共 50 条
- [21] Comment on Xu et al.'s Key Agreement and Password Authentication Protocol FRONTIERS OF MANUFACTURING AND DESIGN SCIENCE II, PTS 1-6, 2012, 121-126 : 3847 - +
- [22] Cryptanalysis of Vaidya et al.'s User Authentication Scheme with Key Agreement in Wireless Sensor Networks PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON MATERIALS ENGINEERING AND INFORMATION TECHNOLOGY APPLICATIONS, 2015, 28 : 619 - 623
- [23] Cryptanalysis of Xinyu et al.'s NTRU-lattice based key exchange protocol JOURNAL OF INFORMATION & OPTIMIZATION SCIENCES, 2018, 39 (02): : 475 - 479
- [25] Cryptanalysis of Yeh et al.'s Security-Enhanced Remote User Authentication Scheme with Smart Cards JOURNAL OF APPLIED SCIENCE AND ENGINEERING, 2013, 16 (03): : 319 - 328
- [27] Revisiting Yasuda et al.'s Biometric Authentication Protocol: Are You Private Enough? CRYPTOLOGY AND NETWORK SECURITY (CANS 2017), 2018, 11261 : 161 - 178
- [28] Cryptanalysis and security enhancement of Chen et al.'s remote user authentication scheme using smart card OPEN COMPUTER SCIENCE, 2012, 2 (01): : 60 - 75
- [29] Security Analysis of Wu et al.'s Authentication Protocol for Distributed Cloud Computing 2019 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS - TAIWAN (ICCE-TW), 2019,