Two-Factor Remote Authentication Protocol with User Anonymity Based on Elliptic Curve Cryptography

Liping Zhang, Shanyu Tang, Jing Chen, Shaohui Zhu. Two-Factor Remote Authentication Protocol with User Anonymity Based on Elliptic Curve Cryptography. Wireless Personal Communications, 81(1):53-75, 2015. [doi]

@article{ZhangTCZ15,
  title = {Two-Factor Remote Authentication Protocol with User Anonymity Based on Elliptic Curve Cryptography},
  author = {Liping Zhang and Shanyu Tang and Jing Chen and Shaohui Zhu},
  year = {2015},
  doi = {10.1007/s11277-014-2117-0},
  url = {http://dx.doi.org/10.1007/s11277-014-2117-0},
  researchr = {https://researchr.org/publication/ZhangTCZ15},
  cites = {0},
  citedby = {0},
  journal = {Wireless Personal Communications},
  volume = {81},
  number = {1},
  pages = {53-75},
}