共 50 条
- [33] Cryptanalysis of Two Improved Remote User Authentication Schemes Preserving User Anonymity PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 2235 - 2239
- [34] Further cryptanalysis of 'A user friendly remote user authentication scheme with smart cards' ICIET 2007: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATION AND EMERGING TECHNOLOGIES, 2007, : 101 - 105
- [35] Cryptanalysis of a remote user authentication scheme using smart cards 2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 4490 - 4493
- [36] Cryptanalysis and Improvement of a Two-Factor User Authentication Scheme INFOCOMMUNICATIONS JOURNAL, 2018, 10 (01): : 10 - 14
- [38] Cryptanalysis of a Chaotic Maps-based User Authentication and Key Agreement Protocol for Multi-server Environments INTERNATIONAL CONFERENCE ON ADVANCES IN MANAGEMENT SCIENCE AND ENGINEERING (AMSE 2015), 2015, : 155 - 159
- [39] CRYPTANALYSIS OF AN EFFICIENT REMOTE USER AUTHENTICATION SCHEME WITH SMART CARDS INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2010, 6 (06): : 2595 - 2608
- [40] Cryptanalysis and Improvement of User Authentication Scheme Based on Rabin Cryptosystem Proceedings of the 2020 14th International Conference on Ubiquitous Information Management and Communication, IMCOM 2020, 2020,