Rational analysis of authentication protocols based on NGUYEN L H scheme
Xing-hua LI,Ling-juan DENG,Yuan ZHANG,Jian-feng MA
Journal on Communications . 2013, (8): 18 -26 .  DOI: 10.3969/j.issn.1000-436x.2013.08.003