3Purdy G B. A high security log- in procedure[J]. Communications of the ACM, 1974, 17(8): 442 -445.
4Lamport L. Password authentication with insecure communication[J ]. Communications of the ACM, 1981, 24( 11): 770 -772.
5William Stallings. Crytography and network security principles and practice:second edition[M]. Beijing: publishing house of electronics industry, 2001.