\relax 
\citation{1277870}
\citation{Juang2004167}
\citation{4531703}
\citation{Juang20081238}
\citation{4801688}
\citation{4531703}
\citation{4801688}
\@writefile{toc}{\contentsline {section}{\numberline {1}Introduction}{1}}
\citation{Lamport:1981:PAI:358790.358797}
\citation{Lee:2004:CUA:974104.974106}
\@writefile{toc}{\contentsline {section}{\numberline {2}Cryptanalysis of Li et al's scheme}{2}}
\@writefile{toc}{\contentsline {subsection}{\numberline {2.1}Review of Li et al's scheme}{2}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.1.1}Parameter generation}{3}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.1.2}Registration phase}{3}}
\newlabel{1}{{{1}}{3}}
\newlabel{2}{{{2}}{4}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.1.3}Precomputation phase}{4}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.1.4}Log-in phase}{4}}
\newlabel{3}{{{3}}{4}}
\newlabel{4}{{{4}}{5}}
\newlabel{5}{{{5}}{5}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.1.5}Password changing phase}{5}}
\newlabel{6}{{{6}}{5}}
\citation{Kocher1999}
\citation{1004593}
\newlabel{7}{{{7}}{6}}
\@writefile{toc}{\contentsline {subsection}{\numberline {2.2}Weakness of Li et al's scheme}{6}}
\citation{1277863}
\@writefile{toc}{\contentsline {section}{\numberline {3}The proposed scheme}{7}}
\@writefile{toc}{\contentsline {subsection}{\numberline {3.1}Registration phase}{7}}
\newlabel{1a}{{{1a}}{7}}
\newlabel{2a}{{{2a}}{7}}
\@writefile{toc}{\contentsline {subsection}{\numberline {3.2} Login phase}{8}}
\newlabel{3a}{{{3a}}{8}}
\newlabel{4a}{{{4a}}{8}}
\citation{Burrows:1990:LA:77648.77649}
\newlabel{5a}{{{5a}}{9}}
\@writefile{toc}{\contentsline {subsection}{\numberline {3.3}Password changing phase}{9}}
\@writefile{toc}{\contentsline {section}{\numberline {4}Evaluations of the proposed scheme}{10}}
\@writefile{toc}{\contentsline {subsection}{\numberline {4.1}Security Analysis}{10}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {4.1.1}Authenticated key agreement}{10}}
\newlabel{4.1}{{{4.1}}{10}}
\newlabel{4.2}{{{4.2}}{10}}
\newlabel{4.3}{{{4.3}}{10}}
\bibstyle{plain}
\bibdata{science}
\bibcite{Burrows:1990:LA:77648.77649}{1}
\bibcite{1277870}{2}
\bibcite{Juang2004167}{3}
\bibcite{4531703}{4}
\bibcite{Juang20081238}{5}
\bibcite{Kocher1999}{6}
\bibcite{1277863}{7}
\newlabel{4.4}{{{4.4}}{11}}
\newlabel{4.5}{{{4.5}}{11}}
\@writefile{toc}{\contentsline {subsection}{\numberline {4.2}Functionality Concerns}{11}}
\@writefile{toc}{\contentsline {section}{\numberline {5}Conclusion}{11}}
\bibcite{Lamport:1981:PAI:358790.358797}{8}
\bibcite{Lee:2004:CUA:974104.974106}{9}
\bibcite{1004593}{10}
\bibcite{4801688}{11}
