- Publication venue
- Publication date
- Field of study
No full text<p>The communication overhead and storage requirement comparison.</p
- Publication venue
- Publication date
- Field of study
No full text<p>Algorithm .</p
- Publication venue
- Publication date
- Field of study
No full text<p>The user registration phase.</p
- Publication venue
- Publication date
- Field of study
No full text<p>Symbols and corresponding notions in the BAN logic.</p
- Publication venue
- Publication date
- Field of study
No full text<p>The security comparison.</p
- Publication venue
- Publication date
- Field of study
No full text<p>The computation cost comparison.</p
- Publication venue
- Publication date
- Field of study
No full text<p>The mechanism of fuzzy extractor.</p
- Publication venue
- Publication date
- Field of study
No full text<p>The authentication phase.</p
- Publication venue
- Publication date
- Field of study
No full text<p>The login phase.</p
- Publication venue
- Publication date
- Field of study
No full text<p>The server registration phase.</p