D Alrababah, E Al-Shammari… - … Conference on New …, 2017 - ieeexplore.ieee.org
… environment highlighted, by providing a description of some … attack, Replay attack, Guessing
attack, Stolen-verifier attack … ] uses asymmetric encryption to prevent the replay attack, by …