Comments on two schemes of identity-based user authentication and key agreement for mobile client–server networks
Crossref DOI link: https://doi.org/10.1007/s11227-015-1496-7
Published Online: 2015-07-31
Published Print: 2015-11
Update policy: https://doi.org/10.1007/springer_crossmark_policy
Shi, Run-hua
Zhong, Hong
Zhang, Shun
Funding for this research was provided by:
National Natural Science Foundation of China (61173187)
Text and Data Mining valid from 2015-07-31