BL Chen, WC Kuo, LC Wuu - Information technology and control, 2012 - itc.ktu.lt
There are many remote user authentication schemes proposed in literatures for preventing
unauthorized parties from accessing resources in an insecure environment. Due to inherent …