|
Volumn 170, Issue 2, 2005, Pages 1185-1193
|
Weakness and improvement on Wang-Li-Tie's user-friendly remote authentication scheme
|
Author keywords
Cryptology; Impersonation; Network security; Password; Remote authentication; Smart card loss assumption
|
Indexed keywords
CRYPTOGRAPHY;
SECURITY OF DATA;
SMART CARDS;
IMPERSONATION;
NETWORK SECURITY;
PASSWORDS;
REMOTE AUTHENTICATION;
SMART CARD LOSS ASSUMPTIONS;
COMPUTATIONAL METHODS;
|
EID: 27144545000
PISSN: 00963003
EISSN: None
Source Type: Journal
DOI: 10.1016/j.amc.2005.01.013 Document Type: Article |
Times cited : (8)
|
References (4)
|