The following publications are possibly variants of this publication:
- Weaknesses of Lee-Li-Hwang s hash-based password authentication schemeWei-Chi Ku, Chien-Ming Chen, Hui-Lung Lee. sigops, 37(4):19-25, 2003. [doi]
- Weaknesses of Yoon-Ryu-Yoo s hash-based password authentication schemeWei-Chi Ku, Min-Hung Chiang, Shen-Tien Chang. sigops, 39(1):85-89, 2005. [doi]
- A Simple Password Authentication Scheme Based on Geometric Hashing FunctionXu Zhuang, Chin-Chen Chang, Zhi-Hui Wang, Yan Zhu 0001. ijnsec, 16(4):271-277, 2014. [doi]
- A Simple Password Authentication Scheme Based on Geometric Hashing FunctionXu Zhuang, Chin-Chen Chang, Zhi-Hui Wang, Yan Zhu. ijnsec, 16(4):237-243, 2014. [doi]
- Weaknesses and Improvements of Yang-Chang-Hwang s Password Authentication SchemeWei-Chi Ku, Hao-Chuan Tsai. informaticaLT, 16(2):203-212, 2005. [doi]
- Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cardsWei-Chi Ku, Shuai-Min Chen. tce, 50(1):204-207, 2004. [doi]