1. Cryptanalysis of a remote user authentication scheme using smart cards;Chan;IEEE Trans. Consumer Electron.,2000
2. Remote password authentication with smart cards;Chang;IEE Proceedings-E,1991
3. Stolen-verifier attack on two new strong-password authentication protocols;Chen;IEICE Trans. Commun. E85-B,2002
4. An efficient and practical solution to remote authentication: Smart card;Chien;Computers & Security,2002
5. Revisit of McCullagh–Barreto two-party id-based authenticated key agreement protocols;Choo;Internat. J. Network Security,2005