共 50 条
- [1] Cryptanalysis and the improvement of Kim et al.'s password authentication schemes [J]. INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2007, 4812 : 156 - 166
- [3] Drawbacks of Liao et al.'s password authentication scheme [J]. INTERNATIONAL CONFERENCE ON NEXT GENERATION WEB SERVICES PRACTICES, PROCEEDINGS, 2006, : 101 - +
- [4] The Weakness of Moon et al.'s Password Authentication Scheme [J]. 3RD ANNUAL INTERNATIONAL CONFERENCE ON INFORMATION SYSTEM AND ARTIFICIAL INTELLIGENCE (ISAI2018), 2018, 1069
- [7] Comment on Xu et al.'s Key Agreement and Password Authentication Protocol [J]. FRONTIERS OF MANUFACTURING AND DESIGN SCIENCE II, PTS 1-6, 2012, 121-126 : 3847 - +
- [9] Security of Shen et al.'s timestamp-based password authentication scheme [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2004, PT 4, 2004, 3046 : 665 - 671