"Weakness of remote authentication scheme of Chen et al."

Hong-bin Tang, Xin-song Liu, Jian-ying Chen (2014)

Details and statistics

DOI: 10.1002/DAC.2534

access: closed

type: Journal Article

metadata version: 2020-07-30

a service of  Schloss Dagstuhl - Leibniz Center for Informatics