Exploiting hash functions to intensify the remote user authentication scheme

WenBin Hsieh, Jenq-Shiou Leu. Exploiting hash functions to intensify the remote user authentication scheme. Computers & Security, 31(6):791-798, 2012. [doi]

@article{HsiehL12-5,
  title = {Exploiting hash functions to intensify the remote user authentication scheme},
  author = {WenBin Hsieh and Jenq-Shiou Leu},
  year = {2012},
  doi = {10.1016/j.cose.2012.06.001},
  url = {http://dx.doi.org/10.1016/j.cose.2012.06.001},
  researchr = {https://researchr.org/publication/HsiehL12-5},
  cites = {0},
  citedby = {0},
  journal = {Computers & Security},
  volume = {31},
  number = {6},
  pages = {791-798},
}