Author: Shi Wenbo He Debiao Wu Shuhua
Publisher: Inderscience Publishers
ISSN: 1466-6642
Source: International Journal of Information and Communication Technology, Vol.6, Iss.1, 2014-11, pp. : 39-48
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content
Cryptanalysis of an enhanced timestamp-based password authentication scheme
By Wang B. Li J.-H. Tong Z.-P.
Computers and Security, Vol. 22, Iss. 7, 2003-10 ,pp. :