Two-Factor Remote Authentication Protocol with User Anonymity Based on Elliptic Curve Cryptography
Crossref DOI link: https://doi.org/10.1007/s11277-014-2117-0
Published Online: 2014-10-16
Published Print: 2015-03
Update policy: https://doi.org/10.1007/springer_crossmark_policy
Zhang, Liping
Tang, Shanyu
Chen, Jing
Zhu, Shaohui
Text and Data Mining valid from 2014-10-16