共 50 条
- [41] Cryptanalysis of Guo et al.'s three-party password-based authenticated key exchange (G-3PAKE) protocol INTERNATIONAL CONFERENCE ON ADVANCES IN ENGINEERING 2011, 2011, 24 : 187 - 191
- [43] Cryptanalysis of Aydos et al.'s ECC-based wireless authentication protocol 2004 IEEE INTERNATIONAL CONFERNECE ON E-TECHNOLOGY, E-COMMERE AND E-SERVICE, PROCEEDINGS, 2004, : 563 - 566
- [44] Cryptanalysis of Yang et al.'s Handover Authentication Scheme For Mobile Network Environment 2017 INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND INTELLIGENT CONTROLS (ISCSIC), 2017, : 152 - 157
- [45] Cryptanalysis of Yeh et al.'s timestamp based scheme using smart card PROCEEDINGS OF 2016 INTERNATIONAL CONFERENCE ON APPLIED SYSTEM INNOVATION (ICASI), 2016,
- [46] Cryptanalysis of Zheng et al.'s Pairing-free Secure IBE Scheme 2015 14TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY (ICIT 2015), 2015, : 101 - 106
- [47] Cryptanalysis and improvement of barman et al.’s secure remote user authentication scheme International Journal of Circuits, Systems and Signal Processing, 2019, 13 : 604 - 610
- [48] Cryptanalysis of Chen et al.'s multi-secret visual cryptography scheme IMAGING SCIENCE JOURNAL, 2013, 61 (03): : 334 - 340
- [49] Cryptanalysis of Li et al.'s Identity-Based Threshold Signcryption Scheme EUC 2008: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING, VOL 2, WORKSHOPS, 2008, : 127 - +