Login
Register
Home
Issues
Volume 16, Issue 2 (2005)
Attacks and Solutions of Yang et al.’s P ...
Informatica
Information
Submit your article
For Referees
Help
ATTENTION!
Article info
Related articles
Cited by
More
Article info
Related articles
Cited by
Cited by
3
Attacks and Solutions of Yang
et al.
’s Protected Password Changing Scheme
G. Sudha Sadasivam, K. Anitha Kumari, S. Rubika
https://doi.org/10.1109/CCEM.2012.6354591
Journal:
(2012), p. 1
A Novel Triangle Centroid Authentication Protocol for Cloud Environment
K. Anitha Kumari, G. Sudha Sadasivam, Bhandari Chetna, S. Rubika
https://doi.org/10.1007/978-3-642-31513-8_25
Book:
Advances in Intelligent Systems and Computing (Advances in Computing and Information Technology)
Volume 176 (2012), p. 245
Cryptanalysis and Improvement of an Improved Two Factor Authentication Protocol for Telecare Medical Information Systems
Shehzad Ashraf Chaudhry, Husnain Naqvi, Taeshik Shon, Muhammad Sher, Mohammad Sabzinejad Farash
https://doi.org/10.1007/s10916-015-0244-0
Journal:
Journal of Medical Systems
Volume 39, Issue 6 (2015)
Export citation
Copy and paste formatted citation
Formatted citation
Placeholder
Citation style
AMS -- Americal Mathematical Society
APA -- American Psychological Association 6th ed.
Chicago -- The Chicago Manual of Style 17th ed.
Download citation in file
Export format
BibTeX
RIS
Authors
Placeholder
Share
RSS
To top