WenBin Hsieh, Jenq-Shiou Leu. Exploiting hash functions to intensify the remote user authentication scheme. Computers & Security, 31(6):791-798, 2012. [doi]
@article{HsiehL12-5, title = {Exploiting hash functions to intensify the remote user authentication scheme}, author = {WenBin Hsieh and Jenq-Shiou Leu}, year = {2012}, doi = {10.1016/j.cose.2012.06.001}, url = {http://dx.doi.org/10.1016/j.cose.2012.06.001}, researchr = {https://researchr.org/publication/HsiehL12-5}, cites = {0}, citedby = {0}, journal = {Computers & Security}, volume = {31}, number = {6}, pages = {791-798}, }