Login / Signup
Weaknesses and improvement of Wang et al.'s remote user password authentication scheme for resource-limited environments.
Hao-Rung Chung
Wei-Chi Ku
Maw-Jinn Tsaur
Published in:
Comput. Stand. Interfaces (2009)
Keyphrases
</>
user authentication
authentication scheme
resource limited
security analysis
information security
authentication protocol
smart card
password guessing
real time
wireless sensor networks
web services
query processing
open source
distributed systems
biometric systems