CC Chang, HD Le, CY Lee… - … Conference on Intelligent …, 2011 - ieeexplore.ieee.org
Authentication and key agreement protocols are foundation for the security of distributed applications. In 2010, Yeh et al. proposed two authenticated key agreement protocols. The …
In recent years, several password authentication schemes for remote login and verification have been widely implemented for systems that control and access to Internet applications …