Cited By
View all- Almuhaideb ASrinivasan B(2015)Authentication in Ubiquitous NetworkingInternational Journal of Information Security and Privacy10.4018/IJISP.20150701049:3(57-83)Online publication date: 1-Jul-2015
- Lee CLiao IHwang M(2011)An efficient authentication protocol for mobile communicationsTelecommunications Systems10.1007/s11235-009-9276-446:1(31-41)Online publication date: 1-Jan-2011
- Chang CTsai H(2010)An anonymous and self-verified mobile authentication with authenticated key agreement for large-scale wireless networksIEEE Transactions on Wireless Communications10.1109/TWC.2010.092410.0900229:11(3346-3353)Online publication date: 1-Nov-2010
- Show More Cited By