共 50 条
- [31] Remark on Yu et al.'s Online/Offline signature scheme in CT-RSA 2008 [J]. FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 719 - 720
- [32] Reducing Computations in Chang et al.'s on-line Electronic Check [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (10): : 271 - 288
- [33] New convertible undeniable signature scheme's and attack models [J]. 6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL XV, PROCEEDINGS: MOBILE/WIRELESS COMPUTING AND COMMUNICATION SYSTEMS III, 2002, : 107 - 112
- [34] Detailed Cost Estimation of CNTW Forgery Attack against EMV Signature Scheme [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2011, E94D (11): : 2111 - 2118
- [37] Drawbacks of Liao et al.'s password authentication scheme [J]. INTERNATIONAL CONFERENCE ON NEXT GENERATION WEB SERVICES PRACTICES, PROCEEDINGS, 2006, : 101 - +
- [38] The Weakness of Moon et al.'s Password Authentication Scheme [J]. 3RD ANNUAL INTERNATIONAL CONFERENCE ON INFORMATION SYSTEM AND ARTIFICIAL INTELLIGENCE (ISAI2018), 2018, 1069