1. Palmer, C., Sleevi, R.: Gradually sunsetting sha-1 (2017).
https://blog.chromium.org/2014/09/gradually-sunsetting-sha-1.html
2. Chaudhry, S.A.: A secure biometric based multi-server authentication scheme for social multimedia networks. Multimed. Tools Appl. 75, 12705–12725 (2015)
3. He, D., Kumar, N., Shen, H., Lee, J.H.: One-to-many authentication for access control in mobile pay-TV systems. Sci. China Inf. Sci. 59(5), 1–14 (2015)
4. He, D., Zeadally, S., Kumar, N., Lee, J.H.: Anonymous authentication for wireless body area networks with provable security. IEEE Syst. J. (2016).
https://doi.org/10.1109/JSYST.2016.2544805
5. Irshad, A., Ahmad, H.F., Alzahrani, B.A., Sher, M., Chaudhry, S.A.: An efficient and anonymous chaotic map based authenticated key agreement for multi-server architecture. KSII Trans. Internet Inf. Syst. (TIIS) 10(12), 5572–5595 (2016)