Related articles 5
Attacks and Solutions of Yang et al.’s Protected Password Changing Scheme

Order by:   
Select:   All  None    Download:  

Similar articles
   
Pub. online: 1 Jan 2010      Type: Research Article     
Journal:  Informatica Volume 21, Issue 4 (2010), pp. 627–637
   Abstract
   
Pub. online: 1 Jan 2003      Type: Research Article     
Journal:  Informatica Volume 14, Issue 4 (2003), pp. 551–558
   Abstract
   
Pub. online: 1 Jan 2003      Type: Research Article     
Journal:  Informatica Volume 14, Issue 3 (2003), pp. 289–294
   Abstract
   
Pub. online: 1 Jan 2003      Type: Research Article     
Journal:  Informatica Volume 14, Issue 2 (2003), pp. 195–204
   Abstract
   
Pub. online: 1 Jan 2001      Type: Research Article     
Journal:  Informatica Volume 12, Issue 3 (2001), pp. 469–476
   Abstract