Rational analysis of authentication protocols based on NGUYEN L H scheme
Papers|更新时间:2024-06-05
|
Rational analysis of authentication protocols based on NGUYEN L H scheme
Journal on CommunicationsVol. 34, Issue 8, Pages: 18-26(2013)
作者机构:
1. 西安电子科技大学 计算机学院,陕西 西安 710071
2. 南京大学 计算机软件新技术国家重点实验室,江苏 南京210032
作者简介:
基金信息:
The Major National Science and Technology Program(2011ZX03005-002);The Key Program of NSFC-Guangdong Union Foundation(U1135002);The National Natural Science Foundation of China(61072066);The Fundamental Research Funds for the Central Universities(JY10000903001);The Fundamental Research Funds for the Central Universities(JY10000901034)
Xing-hua LI, Ling-juan DENG, Yuan ZHANG, et al. Rational analysis of authentication protocols based on NGUYEN L H scheme[J]. Journal on Communications, 2013, 34(8): 18-26.
DOI:
Xing-hua LI, Ling-juan DENG, Yuan ZHANG, et al. Rational analysis of authentication protocols based on NGUYEN L H scheme[J]. Journal on Communications, 2013, 34(8): 18-26. DOI: 10.3969/j.issn.1000-436x.2013.08.003.
Rational analysis of authentication protocols based on NGUYEN L H scheme