共 50 条
- [1] Cryptoanalysis on Zhou et al.s' User Authentication Scheme [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (8B): : 112 - 115
- [2] Security of Shen et al.'s timestamp-based password authentication scheme [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2004, PT 4, 2004, 3046 : 665 - 671
- [3] Security Issues of Chen et al.'s Dynamic ID-based Authentication Scheme [J]. 2014 IEEE 12TH INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING (DASC)/2014 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED COMPUTING (EMBEDDEDCOM)/2014 IEEE 12TH INTERNATIONAL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING (PICOM), 2014, : 125 - +
- [5] Drawbacks of Liao et al.'s password authentication scheme [J]. INTERNATIONAL CONFERENCE ON NEXT GENERATION WEB SERVICES PRACTICES, PROCEEDINGS, 2006, : 101 - +
- [6] The Weakness of Moon et al.'s Password Authentication Scheme [J]. 3RD ANNUAL INTERNATIONAL CONFERENCE ON INFORMATION SYSTEM AND ARTIFICIAL INTELLIGENCE (ISAI2018), 2018, 1069
- [7] Security improvement on Chien et al.'s remote user authentication scheme using smart cards [J]. 2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 1133 - 1135