1. Provably secure password-authenticated key exchange using Diffie–Hellman;Boyko,2000
2. Analysis of key-exchange protocols and their use for building secure channels;Canetti;Advances in cryptology – EUROCRY,2001
3. Analysis and improvement of a multi-factor biometric authentication scheme;Cao;Security and Communication Networks,2015
4. Cryptanalysis of a remote user authentication scheme using smart cards;Chan;IEEE Transactions on Consumer Electronics,2000
5. Untraceable dynamic-identity-based remote user authentication scheme with verifiable password update;Chang;International Journal of Communication Systems,2014