共 50 条
- [3] Drawbacks of Liao et al.'s password authentication scheme [J]. INTERNATIONAL CONFERENCE ON NEXT GENERATION WEB SERVICES PRACTICES, PROCEEDINGS, 2006, : 101 - +
- [4] The Weakness of Moon et al.'s Password Authentication Scheme [J]. 3RD ANNUAL INTERNATIONAL CONFERENCE ON INFORMATION SYSTEM AND ARTIFICIAL INTELLIGENCE (ISAI2018), 2018, 1069
- [7] Security of Shen et al.'s timestamp-based password authentication scheme [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2004, PT 4, 2004, 3046 : 665 - 671
- [9] Attacks to Li et al.'s Billing Service User Authentication Scheme [J]. MATERIALS, MECHANICAL ENGINEERING AND MANUFACTURE, PTS 1-3, 2013, 268-270 : 1762 - 1767
- [10] Cryptanalysis of Yang et al.'s Handover Authentication Scheme For Mobile Network Environment [J]. 2017 INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND INTELLIGENT CONTROLS (ISCSIC), 2017, : 152 - 157