Login
Register
Home
Issues
Volume 16, Issue 2 (2005)
Attacks and Solutions of Yang et al.’s P ...
Informatica
Information
Submit your article
For Referees
Help
ATTENTION!
Article info
Related articles
Cited by
More
Article info
Related articles
Cited by
Cited by
1
Attacks and Solutions of Yang
et al.
’s Protected Password Changing Scheme
A Novel Triangle Centroid Authentication Protocol for Cloud Environment
K. Anitha Kumari, G. Sudha Sadasivam, Bhandari Chetna, S. Rubika
https://doi.org/10.1007/978-3-642-31513-8_25
Book
Advances in Intelligent Systems and Computing (Advances in Computing and Information Technology)
Volume 176 (2012), p. 245
Export citation
Copy and paste formatted citation
Formatted citation
Placeholder
Citation style
AMS -- Americal Mathematical Society
APA -- American Psychological Association 6th ed.
Chicago -- The Chicago Manual of Style 17th ed.
Download citation in file
Export format
BibTeX
RIS
Authors
Placeholder
Share
RSS
To top