![]() | ![]() |
2006 | ||
---|---|---|
2 | EE | Wei-Chi Ku, Hui-Lung Lee: Authentication Protocols Using Hoover-Kausik's Software Token. J. Inf. Sci. Eng. 22(3): 691-699 (2006) |
2003 | ||
1 | EE | Wei-Chi Ku, Chien-Ming Chen, Hui-Lung Lee: Weaknesses of Lee-Li-Hwang's hash-based password authentication scheme. Operating Systems Review 37(4): 19-25 (2003) |
1 | Chien-Ming Chen | [1] |
2 | Wei-Chi Ku | [1] [2] |