Cited by 3
Attacks and Solutions of Yang et al.’s Protected Password Changing Scheme

G. Sudha Sadasivam, K. Anitha Kumari, S. Rubika
Journal:  (2012), p. 1
A Novel Triangle Centroid Authentication Protocol for Cloud Environment
K. Anitha Kumari, G. Sudha Sadasivam, Bhandari Chetna, S. Rubika
Book:  Advances in Intelligent Systems and Computing (Advances in Computing and Information Technology) Volume 176 (2012), p. 245
Cryptanalysis and Improvement of an Improved Two Factor Authentication Protocol for Telecare Medical Information Systems
Shehzad Ashraf Chaudhry, Husnain Naqvi, Taeshik Shon, Muhammad Sher, Mohammad Sabzinejad Farash
Journal:  Journal of Medical Systems Volume 39, Issue 6 (2015)