Rational analysis of authentication protocols based on NGUYEN L H scheme
李兴华1,2,邓凌娟1,张渊1,马建峰1
Journal on Communications . 2013, (8): 3 -26 .