

Author: Shen J.-J. Lin C.-W. Hwang M.-S.
Publisher: Elsevier
ISSN: 0167-4048
Source: Computers and Security, Vol.22, Iss.7, 2003-10, pp. : 591-595
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Related content


Cryptanalysis of an enhanced timestamp-based password authentication scheme
By Wang B. Li J.-H. Tong Z.-P.
Computers and Security, Vol. 22, Iss. 7, 2003-10 ,pp. :


By Shi Wenbo He Debiao Wu Shuhua
International Journal of Information and Communication Technology, Vol. 6, Iss. 1, 2014-11 ,pp. :



