\relax 
\@writefile{toc}{\contentsline {section}{\numberline {1}Introduction}{1}}
\@writefile{toc}{\contentsline {section}{\numberline {2}Related work}{1}}
\@writefile{toc}{\contentsline {subsection}{\numberline {2.1}Review of Yeh et al.'s scheme}{1}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.1.1}Registration phase}{1}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.1.2}Login and authentication phase}{2}}
\newlabel{1}{{{1}}{2}}
\bibstyle{plain}
\bibdata{science}
\newlabel{2}{{{2}}{3}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.1.3}Password Changing Phase}{3}}
\@writefile{toc}{\contentsline {subsection}{\numberline {2.2}Vulnerabilities of Yeh et al.'s scheme}{3}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.1}Replay attack}{4}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.2}Masquerade attack}{4}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.3}Off-line password attack}{4}}
\@writefile{toc}{\contentsline {section}{\numberline {3}The proposed scheme}{4}}
\@writefile{toc}{\contentsline {section}{\numberline {4}Security Analysis}{4}}
\@writefile{toc}{\contentsline {section}{\numberline {5}Performance Analysis}{4}}
\@writefile{toc}{\contentsline {section}{\numberline {6}Conclusions}{4}}
