共 50 条
- [1] Cryptanalysis of Two Improved Remote User Authentication Schemes Preserving User Anonymity [J]. PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 2235 - 2239
- [4] Security on efficient user identification scheme with key distribution preserving anonymity for distributed computer networks [J]. ICCC2004: Proceedings of the 16th International Conference on Computer Communication Vol 1and 2, 2004, : 1584 - 1586
- [5] Cryptanalysis on Improved Remote User Authentication Scheme Preserving User Anonymity [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2008, 8 (10): : 21 - 24
- [6] Cryptanalysis of Two Identification Schemes [J]. 2015 2ND INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND SECURITY (ICISS), 2015, : 33 - 36
- [7] Cryptanalysis of Two Dynamic ID-Based Remote User Authentication Schemes for Preserving User Privacy [J]. JOURNAL OF APPLIED SCIENCE AND ENGINEERING, 2013, 16 (03): : 277 - 286
- [8] User identification and key distribution maintaining anonymity for distributed computer networks [J]. COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2000, 15 (04): : 211 - 214
- [10] A lightweight authentication and key agreement protocol preserving user anonymity [J]. Multimedia Tools and Applications, 2017, 76 : 13401 - 13423