共 39 条
[2]
Al-Fayoumi M, 2016, INT J ADV COMPUT SC, V7, P52
[3]
Security Analysis and Enhancements of an Effective Biometric-Based Remote User Authentication Scheme Using Smart Cards
[J].
JOURNAL OF BIOMEDICINE AND BIOTECHNOLOGY,
2012,
[5]
Bindu CS, 2008, INT J COMPUT SCI NET, V8, P62
[6]
Biswas S., 2015, Int. J. Comput. Appl., V131, P28
[7]
An efficient cryptographic protocol verifier based on prolog rules
[J].
14TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS,
2001,
:82-96
[9]
Chang C.C., 2010, INT J INTELLIGENT IN, V1, P41