共 20 条
[1]
Blake-Wilson S, 1997, LECT NOTES COMPUT SC, V1355, P30, DOI 10.1007/BFb0024447
[2]
Boyko V, 2000, LECT NOTES COMPUT SC, V1807, P156
[4]
HIDEKI I, 2005, IEEE WIRL COMM NETW, P1180
[5]
Extended password key exchange protocols immune to dictionary attack
[J].
SIXTH IEEE WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS,
1997,
:248-255
[6]
Jung J. K. K., 2003, P ICICSPCM 2003 SING
[7]
KOBLITZ N, 1987, MATH COMPUT, V48, P203, DOI 10.1090/S0025-5718-1987-0866109-5
[8]
KOBLITZ N, 1992, P CRYPT 91 SANT BARB
[9]
KWON T, ULTIMATE SOLUTION AU
[10]
Law M. Q. J. S. L., DESIGNS CODES CRYPTO, V28