<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Kuo-Hui Yeh</style></author><author><style face="normal" font="default" size="100%">Nai Wei Lo</style></author><author><style face="normal" font="default" size="100%">Enrico Winata</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Cryptanalysis of an Efficient Remote User Authentication Scheme with Smart Cards</style></title><secondary-title><style face="normal" font="default" size="100%">International Journal of Innovative Computing, Information and Control</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2010</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2010</style></date></pub-dates></dates><urls><web-urls><url><style face="normal" font="default" size="100%">http://www.ijicic.org/08-1246-1.pdf</style></url></web-urls></urls><volume><style face="normal" font="default" size="100%">6</style></volume><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">6</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Kuo-Hui Yeh</style></author><author><style face="normal" font="default" size="100%">Chunhua Su</style></author><author><style face="normal" font="default" size="100%">Nai Wei Lo</style></author><author><style face="normal" font="default" size="100%">Yingjiu Li</style></author><author><style face="normal" font="default" size="100%">Yi-Xiang Hung</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Two Robust Remote User Authentication Protocols Using Smart Cards</style></title><secondary-title><style face="normal" font="default" size="100%">The Journal of Systems and Software</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2010</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2010</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">83</style></volume><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">12</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Nai Wei Lo</style></author><author><style face="normal" font="default" size="100%">Kuo-Hui Yeh</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Cryptanalysis of Two Three-Party Encrypted Key Exchange Protocols</style></title><secondary-title><style face="normal" font="default" size="100%">Computer Standards &amp; Interfaces</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2009</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2009</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">31</style></volume><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">6</style></issue></record></records></xml>