Exploiting hash functions to intensify the remote user authentication scheme

WenBin Hsieh, Jenq-Shiou Leu. Exploiting hash functions to intensify the remote user authentication scheme. Computers & Security, 31(6):791-798, 2012. [doi]

Abstract

Abstract is missing.