\relax 
\citation{RefJ03,RefJ05,RefJ08,RefJ02,RefJ04}
\citation{RefJ04}
\citation{RefJ08}
\@writefile{toc}{\contentsline {section}{\numberline {1}Introduction}{2}}
\newlabel{intro}{{1}{2}}
\@writefile{toc}{\contentsline {section}{\numberline {2}Related work}{3}}
\newlabel{sec:1}{{2}{3}}
\@writefile{toc}{\contentsline {subsection}{\numberline {2.1}Review of Li et al.'s scheme}{3}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.1.1}Parameter generation}{3}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.1.2}Registration phase}{3}}
\newlabel{1}{{{1}}{3}}
\newlabel{2}{{{2}}{3}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.1.3}Precomputation phase}{4}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.1.4}Log-in phase}{4}}
\newlabel{3}{{{3}}{4}}
\newlabel{4}{{{4}}{4}}
\newlabel{5}{{{5}}{5}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.1.5}Password changing phase}{5}}
\newlabel{6}{{{6}}{5}}
\newlabel{7}{{{7}}{5}}
\citation{RefJ06,RefJ09}
\@writefile{toc}{\contentsline {subsection}{\numberline {2.2}Weaknesses of Li et al.'s scheme}{6}}
\citation{RefJ07}
\@writefile{toc}{\contentsline {section}{\numberline {3}The proposed scheme}{7}}
\@writefile{toc}{\contentsline {subsection}{\numberline {3.1}Registration phase}{7}}
\newlabel{1a}{{{1a}}{7}}
\newlabel{2a}{{{2a}}{7}}
\@writefile{toc}{\contentsline {subsection}{\numberline {3.2} Login phase}{7}}
\newlabel{3a}{{{3a}}{8}}
\newlabel{4a}{{{4a}}{8}}
\newlabel{5a}{{{5a}}{8}}
\citation{RefJ01}
\@writefile{toc}{\contentsline {subsection}{\numberline {3.3}Password changing phase}{9}}
\@writefile{toc}{\contentsline {section}{\numberline {4}Evaluations of the proposed scheme}{9}}
\@writefile{toc}{\contentsline {subsection}{\numberline {4.1}Security Analysis}{9}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {4.1.1}Authenticated key agreement}{9}}
\newlabel{4.1}{{{4.1}}{9}}
\newlabel{4.2}{{{4.2}}{9}}
\newlabel{4.3}{{{4.3}}{9}}
\newlabel{4.4}{{{4.4}}{10}}
\newlabel{4.5}{{{4.5}}{10}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {4.1.2}Known session key attack}{10}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {4.1.3}Forward secrecy}{10}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {4.1.4}Initiator anonymity and untraceability}{10}}
\@writefile{lot}{\contentsline {table}{\numberline {1}{\ignorespaces Comparing computation costs between ours and Li et al.'s}}{11}}
\newlabel{tab:1}{{1}{11}}
\@writefile{toc}{\contentsline {subsection}{\numberline {4.2}Performance and Functionality Concerns}{11}}
\@writefile{lot}{\contentsline {table}{\numberline {2}{\ignorespaces Comparing communication and storage costs between ours and Li et al.'s}}{12}}
\newlabel{tab:2}{{2}{12}}
\@writefile{lot}{\contentsline {table}{\numberline {3}{\ignorespaces Security Properties between ours and Li et al.'s}}{12}}
\newlabel{tab:3}{{3}{12}}
\@writefile{toc}{\contentsline {section}{\numberline {5}Conclusions}{12}}
\bibcite{RefJ01}{1}
\bibcite{RefJ03}{2}
\bibcite{RefJ05}{3}
\bibcite{RefJ06}{4}
\bibcite{RefJ07}{5}
\bibcite{RefJ08}{6}
\bibcite{RefJ02}{7}
\bibcite{RefJ09}{8}
\bibcite{RefJ04}{9}
