Weakness in a User Identification Scheme with Key Distribution Preserving User Anonymity
Keyword(s):
2005 ◽
Vol E88-B
(5)
◽
pp. 2171-2172
1995 ◽
Vol 3
(4)
◽
pp. 309-322
◽
2006 ◽
Vol 9
(3)
◽
pp. 537-548
◽
Keyword(s):
1993 ◽
Vol 11
(5)
◽
pp. 757-760
◽