共 50 条
- [3] Identity Based Encryption and Biometric Authentication Scheme for Secure Data Access in Cloud Computing CHINESE JOURNAL OF ELECTRONICS, 2012, 21 (02): : 254 - 259
- [5] On the security of AUTH, a provably secure authentication protocol based on the subspace LPN problem International Journal of Information Security, 2013, 12 : 151 - 154
- [9] An enhanced and provably secure authentication protocol using Chebyshev chaotic maps for multi-server environment Multimedia Tools and Applications, 2021, 80 : 14163 - 14189