共 50 条
- [1] Cryptanalysis on Improved Remote User Authentication Scheme Preserving User Anonymity [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2008, 8 (10): : 21 - 24
- [2] Improved remote user authentication scheme preserving user anonymity [J]. CNSR 2007: PROCEEDINGS OF THE FIFTH ANNUAL CONFERENCE ON COMMUNICATION NETWORKS AND SERVICES RESEARCH, 2007, : 323 - +
- [3] Cryptanalysis of Two Dynamic ID-Based Remote User Authentication Schemes for Preserving User Privacy [J]. JOURNAL OF APPLIED SCIENCE AND ENGINEERING, 2013, 16 (03): : 277 - 286
- [4] Cryptanalysis of two user identification schemes with key distribution preserving anonymity [J]. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2005, 3783 : 315 - 322
- [5] A Remote User Authentication Scheme Preserving User Anonymity and Traceability [J]. 2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 5255 - 5258
- [6] A remote authentication scheme preserving user anonymity [J]. AINA 2005: 19th International Conference on Advanced Information Networking and Applications, Vol 2, 2005, : 245 - 248
- [7] Cryptanalysis of an Improved User Authentication Scheme with User Anonymity for Wireless Communications [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2012, E95D (06): : 1687 - 1689
- [8] An Energy Efficient Remote User Authentication Scheme Preserving User Anonymity [J]. 2014 INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING AND INFORMATICS (IC3I), 2014, : 1296 - 1301
- [9] Cryptanalysis of the User Authentication Scheme with Anonymity [J]. FUTURE GENERATION INFORMATION TECHNOLOGY, 2011, 7105 : 285 - +
- [10] Remote user authentication scheme with user anonymity [J]. SAM '05: Proceedings of the 2005 International Conference on Security and Management, 2005, : 412 - 417