Exploiting hash functions to intensify the remote user authentication scheme.

WenBin HsiehJenq-Shiou Leu
Published in: Comput. Secur. (2012)
Keyphrases