Author:
Buccafurri Francesco,Lax Gianluca
Reference42 articles.
1. A. K. Awasthi and S. Lal. A remote user authentication scheme using smart cards with forward secrecy. IEEE Transactions on Consumer Electronics, 49(4):12461248, 2003.
2. L Blum, M Blum, and M Shub. A simple unpredictable pseudo random number generator. SIAM J. Comput., 15(2):364–383, 1986.
3. Nikita Borisov, Ian Goldberg, and David Wagner. Intercepting mobile communications: the insecurity of 802.11. In MobiCom ’01: Proceedings of the 7th annual international conference on Mobile computing and networking, pages 180–189, New York, NY, USA, 2001. ACM Press.
4. Bundesamt für Sicherheit in der Informationstechnik. http://www.bsi.de/english/index.htm .
5. Chien-Ming CHEN and Wei-Chi KU. Stolen-verifier attack on two new strong-password authentication protocols. IEICE transactions on communications, 85(11):2519–2521, 2002.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献