[1]
P. Kumaraswamy, C. G. Rao, V. Janaki, and K. Prashanth, “Key Authentication Scheme-based on Discrete Logarithms and Chinese Remainder Theorem”, Def. Sc. J., vol. 66, no. 6, pp. 590–593, Oct. 2016.