Login
Register
Home
Issues
Volume 16, Issue 2 (2005)
Attacks and Solutions of Yang et al.’s P ...
Informatica
Information
Submit your article
For Referees
Help
ATTENTION!
Article info
Related articles
Cited by
More
Article info
Related articles
Cited by
Cited by
1
Attacks and Solutions of Yang
et al.
’s Protected Password Changing Scheme
A Novel Triangle Centroid Authentication Protocol for Cloud Environment
K. Anitha Kumari, G. Sudha Sadasivam, Bhandari Chetna, S. Rubika
https://doi.org/10.1007/978-3-642-31513-8_25
Book:
Advances in Intelligent Systems and Computing (Advances in Computing and Information Technology)
Volume 176 (2012), p. 245
Export citation
Copy and paste formatted citation
Formatted citation
Placeholder
Citation style
AMS -- Americal Mathematical Society
APA -- American Psychological Association 6th ed.
Chicago -- The Chicago Manual of Style 17th ed.
Download citation in file
Export format
BibTeX
RIS
Authors
Placeholder
Share
RSS
To top