2005 | ||
---|---|---|
4 | EE | Wei-Chi Ku, Shen-Tien Chang, Hsi-Hung Chen, Maw-Jinn Tsaur: Weakness and Simple Improvement of a Password Authentication Scheme Based on Geometric Approach. LCN 2005: 472-473 |
3 | EE | Wei-Chi Ku, Shen-Tien Chang: Impersonation Attack on a Dynamic ID-Based Remote User Authentication Scheme Using Smart Cards. IEICE Transactions 88-B(5): 2165-2167 (2005) |
2 | EE | Wei-Chi Ku, Shen-Tien Chang, Min-Hung Chiang: Weaknesses of a Remote User Authentication Scheme Using Smart Cards for Multi-Server Architecture. IEICE Transactions 88-B(8): 3451-3454 (2005) |
1 | EE | Wei-Chi Ku, Min-Hung Chiang, Shen-Tien Chang: Weaknesses of Yoon-Ryu-Yoo's hash-based password authentication scheme. Operating Systems Review 39(1): 85-89 (2005) |
1 | Hsi-Hung Chen | [4] |
2 | Min-Hung Chiang | [1] [2] |
3 | Wei-Chi Ku | [1] [2] [3] [4] |
4 | Maw-Jinn Tsaur | [4] |