共 28 条
[11]
Hwang M.-S.(2011)Cryptanalysis of a simple three-party password-based key exchange protocol Int. J. Commun. Syst. 24 532-542
[12]
Chu Y.-P(1987)Elliptic curve cryptosystem Math. Comput. 48 203-209
[13]
Lee T-F.(1995)Undetectable on-line password guessing attacks ACM Oper. Syst. Rev. 29 77-86
[14]
Hwang T(2011)Security analysis and enhancements of verifier-based password-authenticated key exchange protocols in the three-party setting J. Inf. Sci. Eng. 27 1059-1072
[15]
Chang T.-Y.(undefined)undefined undefined undefined undefined-undefined
[16]
Hwang M.-S.(undefined)undefined undefined undefined undefined-undefined
[17]
Yang W.-P(undefined)undefined undefined undefined undefined-undefined
[18]
Chien H.-Y.(undefined)undefined undefined undefined undefined-undefined
[19]
Lou D.-C.(undefined)undefined undefined undefined undefined-undefined
[20]
Huang H.-F(undefined)undefined undefined undefined undefined-undefined