메뉴 건너뛰기




Volumn 70, Issue 4, 1999, Pages 657-666

A remote password authentication scheme based on the digital signature method

Author keywords

Cryptography; Digital signature; Password authentication; Security

Indexed keywords

COMPUTER SCIENCE; CRYPTOGRAPHY; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; MATHEMATICAL TECHNIQUES;

EID: 0000694693     PISSN: 00207160     EISSN: None     Source Type: Journal    
DOI: 10.1080/00207169908804781     Document Type: Article
Times cited : (43)

References (32)
  • 1
    • 84976752387 scopus 로고
    • Cryptographic solution to a problem of access control in a hierarchy
    • Akl, S. G. and Taylor, P. D. (1983). Cryptographic solution to a problem of access control in a hierarchy. ACM Transactions on Computer Systems, 1, 239-248.
    • (1983) ACM Transactions on Computer Systems , vol.1 , pp. 239-248
    • Akl, S.G.1    Taylor, P.D.2
  • 3
    • 0026153410 scopus 로고
    • Remote password authentication with smart cards
    • Chang, C. C. and Wu, T. C. (1991). Remote password authentication with smart cards. IEE Proceedings-E, 138, 165-168.
    • (1991) IEE Proceedings-E , vol.138 , pp. 165-168
    • Chang, C.C.1    Wu, T.C.2
  • 4
    • 0011869977 scopus 로고
    • Remote password authentication with smart cards (correspondence)
    • Chang, C. C. and Laih, C. S. (1992). Remote password authentication with smart cards (correspondence). IEE Proceedings-E, 139, 372.
    • (1992) IEE Proceedings-E , vol.139 , pp. 372
    • Chang, C.C.1    Laih, C.S.2
  • 7
    • 84874800178 scopus 로고
    • A public-key cryptosystem and a signature scheme based on discrete logarithms
    • ElGamal, T. (1985). A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, 31, 469-472.
    • (1985) IEEE Transactions on Information Theory , vol.31 , pp. 469-472
    • ElGamal, T.1
  • 8
    • 0016092372 scopus 로고
    • A user authentication scheme not requiring secrecy in the computer
    • Evans, A. Jr., Kantrowitz, W. and Weiss, E. (1974). A user authentication scheme not requiring secrecy in the computer. Communications of the ACM, 17, 437-442.
    • (1974) Communications of the ACM , vol.17 , pp. 437-442
    • Evans A., Jr.1    Kantrowitz, W.2    Weiss, E.3
  • 9
    • 84990731886 scopus 로고
    • How to prove yourself: Practical solutions to identification and signature problems
    • Fiat, A. and Shamir, A. (1986). How to prove yourself: practical solutions to identification and signature problems. Advances in Cryptology, CRYPTO'86, pp. 186-194.
    • (1986) Advances in Cryptology, CRYPTO'86 , pp. 186-194
    • Fiat, A.1    Shamir, A.2
  • 11
    • 0019057051 scopus 로고
    • The design of a cryptography based secure file system
    • Gudes, E. (1980). The design of a cryptography based secure file system. IEEE Transactions on Software Engineering, OSE-6, 411-420.
    • (1980) IEEE Transactions on Software Engineering , vol.OSE-6 , pp. 411-420
    • Gudes, E.1
  • 15
    • 0019550970 scopus 로고
    • A user authentication scheme for shared data based on trap-door one-way functions
    • Ingemarsson, I. and Wong, C. K. (1981). A user authentication scheme for shared data based on trap-door one-way functions. Information Processing Letters, 12, 63-67.
    • (1981) Information Processing Letters , vol.12 , pp. 63-67
    • Ingemarsson, I.1    Wong, C.K.2
  • 16
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • Lamport, L. (1981). Password authentication with insecure communication. Communications of the ACM, 24, 770-772.
    • (1981) Communications of the ACM , vol.24 , pp. 770-772
    • Lamport, L.1
  • 18
    • 0002586876 scopus 로고
    • A digital signature based on a conventional encryption function
    • Merkle, R. C. (1989). A digital signature based on a conventional encryption function. Advances in Cryptology, CRYPTO'89, pp. 218-238.
    • (1989) Advances in Cryptology, CRYPTO'89 , pp. 218-238
    • Merkle, R.C.1
  • 20
    • 0024867751 scopus 로고
    • Universal one-way hash functions and their cryptographic applications
    • Naor, M. and Yung, M. (1989). Universal one-way hash functions and their cryptographic applications. Proc. of the 21st STOC, pp. 33-43.
    • (1989) Proc. of the 21st STOC , pp. 33-43
    • Naor, M.1    Yung, M.2
  • 21
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • Needham, R. M. and Schroeder, M. D. (1978). Using encryption for authentication in large networks of computers. Communications of the ACM, 21, 993-999.
    • (1978) Communications of the ACM , vol.21 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2
  • 23
    • 0024613514 scopus 로고
    • Security issues in the use of smart cards
    • Reid, M. A. and Madari, M. S. (1989). Security issues in the use of smart cards. Computer Communications, 12, 25-30.
    • (1989) Computer Communications , vol.12 , pp. 25-30
    • Reid, M.A.1    Madari, M.S.2
  • 24
    • 0025152622 scopus 로고
    • One-way functions are necessary and sufficient for secure signatures
    • Rompel, J. (1990). One-way functions are necessary and sufficient for secure signatures. Proc. of the 22nd STOC, pp. 387-394.
    • (1990) Proc. of the 22nd STOC , pp. 387-394
    • Rompel, J.1
  • 25
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public key cryptosystems
    • Rivest, R. L., Shamir, A. and Adleman, L. (1978). A method for obtaining digital signatures and public key cryptosystems. Communications of the ACM, 21, 120-126.
    • (1978) Communications of the ACM , vol.21 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 26
    • 0023962708 scopus 로고
    • Cryptographic implementation of a tree hierarchy for access control
    • Sandhu, R. S. (1988). Cryptographic implementation of a tree hierarchy for access control. Information Processing Letters, 27, 95-98.
    • (1988) Information Processing Letters , vol.27 , pp. 95-98
    • Sandhu, R.S.1
  • 27
    • 85020598353 scopus 로고
    • Identity based cryptosystems & signature schemes
    • Shamir, A. (1984). Identity based cryptosystems & signature schemes. Advances in Cryptology, CRYPTO'84, pp. 47-53.
    • (1984) Advances in Cryptology, CRYPTO'84 , pp. 47-53
    • Shamir, A.1
  • 28
    • 0021939027 scopus 로고
    • On improvements to password security
    • Singh, K. (1985). On improvements to password security. Operating System Review, 19, 53-60.
    • (1985) Operating System Review , vol.19 , pp. 53-60
    • Singh, K.1
  • 29
    • 0040545605 scopus 로고
    • The future is in the PC cards
    • Sternglass, D. (1992). The future is in the PC cards. IEEE Spectrum, 29, 46-50.
    • (1992) IEEE Spectrum , vol.29 , pp. 46-50
    • Sternglass, D.1
  • 30
    • 0025496293 scopus 로고
    • When a password is not a password
    • Weiss, K. P. (1986). When a password is not a password. IEEE Comuter, pp. 100-108.
    • (1986) IEEE Comuter , pp. 100-108
    • Weiss, K.P.1
  • 32
    • 0347767593 scopus 로고
    • Smardcards: Smarter than passwords
    • Wood, L. (1991). Smardcards: smarter than passwords. Datamation, 37, 69-70.
    • (1991) Datamation , vol.37 , pp. 69-70
    • Wood, L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.