共 50 条
[1]
Abdalla M, 2005, LECT NOTES COMPUT SC, V3570, P341
[2]
Aumasson JP, 2010, LECT NOTES COMPUT SC, V6225, P1, DOI 10.1007/978-3-642-15031-9_1
[3]
Bellare M., 1996, Advances in Cryptology - CRYPTO'96. 16th Annual International Cryptology Conference. Proceedings, P1
[4]
Bellare M, 1997, LECT NOTES COMPUT SC, V1294, P470
[5]
Boyd C., 1994, Advances in Cryptology - EUROCRYPT '93. Workshop on the Theory and Application of Cryptographic Techniques Proceedings, P240
[6]
Boyd Colin., 2003, INF SECUR CRYTOGR
[7]
A LOGIC OF AUTHENTICATION
[J].
PROCEEDINGS OF THE ROYAL SOCIETY OF LONDON SERIES A-MATHEMATICAL PHYSICAL AND ENGINEERING SCIENCES,
1989, 426 (1871)
:233-271
[9]
An efficient and secure multi-server password authentication scheme using smart cards
[J].
2004 INTERNATIONAL CONFERENCE ON CYBERWORLDS, PROCEEDINGS,
2004,
:417-422
[10]
Chaturvedi Ankita, 2013, Information Systems Security. 9th International Conference, ICISS 2013. Proceedings: LNCS 8303, P63, DOI 10.1007/978-3-642-45204-8_5