\relax 
\citation{1277870}
\citation{Juang2004167}
\citation{4531703}
\citation{Juang20081238}
\citation{4801688}
\citation{4531703}
\citation{4801688}
\@writefile{toc}{\contentsline {section}{\numberline {1}Introduction}{2}}
\@writefile{toc}{\contentsline {section}{\numberline {2}Related work}{4}}
\@writefile{toc}{\contentsline {subsection}{\numberline {2.1}Review of Li et al.'s scheme}{4}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.1.1}Parameter generation}{4}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.1.2}Registration phase}{5}}
\newlabel{1}{{{1}}{5}}
\newlabel{2}{{{2}}{5}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.1.3}Precomputation phase}{6}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.1.4}Log-in phase}{6}}
\newlabel{3}{{{3}}{6}}
\newlabel{4}{{{4}}{7}}
\newlabel{5}{{{5}}{8}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.1.5}Password changing phase}{8}}
\newlabel{6}{{{6}}{8}}
\newlabel{7}{{{7}}{9}}
\@writefile{toc}{\contentsline {subsection}{\numberline {2.2}Weaknesses of Li et al.'s scheme}{9}}
\citation{Kocher1999}
\citation{1004593}
\@writefile{toc}{\contentsline {section}{\numberline {3}The proposed scheme}{11}}
\@writefile{toc}{\contentsline {subsection}{\numberline {3.1}Registration phase}{12}}
\newlabel{1a}{{{1a}}{12}}
\newlabel{2a}{{{2a}}{12}}
\citation{1277863}
\@writefile{toc}{\contentsline {subsection}{\numberline {3.2} Login phase}{13}}
\newlabel{3a}{{{3a}}{13}}
\newlabel{4a}{{{4a}}{14}}
\citation{Burrows:1990:LA:77648.77649}
\newlabel{5a}{{{5a}}{15}}
\@writefile{toc}{\contentsline {subsection}{\numberline {3.3}Password changing phase}{15}}
\@writefile{toc}{\contentsline {section}{\numberline {4}Evaluations of the proposed scheme}{16}}
\@writefile{toc}{\contentsline {subsection}{\numberline {4.1}Security Analysis}{16}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {4.1.1}Authenticated key agreement}{16}}
\newlabel{4.1}{{{4.1}}{16}}
\newlabel{4.2}{{{4.2}}{17}}
\newlabel{4.3}{{{4.3}}{17}}
\newlabel{4.4}{{{4.4}}{17}}
\newlabel{4.5}{{{4.5}}{17}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {4.1.2}Known session key attack}{18}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {4.1.3}Forward secrecy}{18}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {4.1.4}Initiator anonymity and untraceability}{18}}
\@writefile{toc}{\contentsline {subsection}{\numberline {4.2}Performance and Functionality Concerns}{19}}
\@writefile{lot}{\contentsline {table}{\numberline {1}{\ignorespaces Comparing computation costs between ours and Li et al.'s}}{20}}
\newlabel{Table 1}{{1}{20}}
\@writefile{lot}{\contentsline {table}{\numberline {2}{\ignorespaces Comparing communication and storage costs between ours and Li et al.'s}}{21}}
\newlabel{Table 2}{{2}{21}}
\@writefile{lot}{\contentsline {table}{\numberline {3}{\ignorespaces Security Properties between ours and Li et al.'s}}{22}}
\newlabel{Table 3}{{3}{22}}
\@writefile{toc}{\contentsline {section}{\numberline {5}Conclusions}{22}}
\bibstyle{plain}
\bibdata{science}
\bibcite{Burrows:1990:LA:77648.77649}{1}
\bibcite{1277870}{2}
\bibcite{Juang2004167}{3}
\bibcite{4531703}{4}
\bibcite{Juang20081238}{5}
\bibcite{Kocher1999}{6}
\bibcite{1277863}{7}
\bibcite{4801688}{8}
\bibcite{1004593}{9}
