"Comments on two schemes of identity-based user authentication and key ..."

Runhua Shi, Hong Zhong, Shun Zhang (2015)

Details and statistics

DOI: 10.1007/S11227-015-1496-7

access: closed

type: Journal Article

metadata version: 2020-10-12

a service of  Schloss Dagstuhl - Leibniz Center for Informatics