共 50 条
- [21] Weakness and simple improvement of a password authentication scheme based on geometric appraoch [J]. LCN 2005: 30TH CONFERENCE ON LOCAL COMPUTER NETWORKS, PROCEEDINGS, 2005, : 472 - 473
- [23] A Secure and Efficient TMIS-Based Authentication Scheme Improved Against Zhang et al.’s Scheme [J]. Arabian Journal for Science and Engineering, 2018, 43 : 8239 - 8253
- [24] An Improved Biometric Multi-Server Authentication Scheme for Chang et al.'s Protocol [J]. INFORMATION TECHNOLOGY AND CONTROL, 2019, 48 (02): : 211 - 224
- [26] Security Issues of Chen et al.'s Dynamic ID-based Authentication Scheme [J]. 2014 IEEE 12TH INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING (DASC)/2014 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED COMPUTING (EMBEDDEDCOM)/2014 IEEE 12TH INTERNATIONAL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING (PICOM), 2014, : 125 - +
- [27] Cryptanalysis and Improvement of Sood et al.'s Dynamic ID-Based Authentication Scheme [J]. DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, 2012, 7154 : 141 - 152
- [29] Cryptanalysis of Wang et al.'s remote user authentication scheme using smart cards [J]. PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, 2008, : 575 - +