Skip to main content

and
  1. Chapter and Conference Paper

    Breaking a Robust Remote User Authentication Scheme Using Smart Cards

    Understanding security failures of cryptographic protocols is the key to both patching existing protocols and designing future schemes. Recently, Yeh et al. showed that Hsiang and Shih’s password-based remote ...

    Ding Wang, Chun-guang Ma, Sen-dong Zhao, Chang-li Zhou in Network and Parallel Computing (2012)