共 50 条
- [23] Weaknesses of the Yoon-Kim-Yoo Remote User Authentication Scheme Using Smart Cards [J]. 2014 IEEE WORKSHOP ON ELECTRONICS, COMPUTER AND APPLICATIONS, 2014, : 771 - 774
- [24] Improvements on Hsiang and Shih's Remote User Authentication Scheme Using Smart Cards [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2012, E95D (10): : 2393 - 2400
- [25] Security analysis of timestamp-based remote user authentication scheme using smart cards [J]. 2006 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1-4: VOL 1: SIGNAL PROCESSING, 2006, : 1580 - +
- [26] Security Enhancement on an Improvement on Two Remote User Authentication Scheme Using Smart Cards [J]. COMMUNICATION AND NETWORKING, 2009, 56 : 65 - +
- [27] Security Enhancement on the Efficient and Complete Remote User Authentication Scheme using smart Cards [J]. 2011 6TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND CONVERGENCE INFORMATION TECHNOLOGY (ICCIT), 2012, : 702 - 706
- [28] Security analysis and improvement of the remote user authentication scheme without using smart cards [J]. ICIC Express Letters, 2010, 4 (6 B): : 2431 - 2436
- [29] A New Remote User Authentication Scheme Using Smart Cards [J]. ICCSE 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION: ADVANCED COMPUTER TECHNOLOGY, NEW EDUCATION, 2008, : 205 - 208
- [30] An improvement of remote user authentication scheme using smart cards [J]. MOBILE AD-HOC AND SENSOR NETWORKS, PROCEEDINGS, 2006, 4325 : 416 - +