Subject
Law,General Computer Science
Reference23 articles.
1. Password authentication with insecure communication;Lamport;Commun. ACM,1981
2. A privacy preserving authentication scheme in an edge-fog environment;Amor,2017
3. Analysis of key-exchange protocols and their use for building secure channels;Canetti,2001
4. Robust smart-card-based remote user password authentication scheme;Chen;Int. J. Commun. Syst.,2014
5. Robust smart-card-based remote user password authentication scheme;Chen;Int. J. Commun. Syst.,2014
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献