-
1
-
-
0016092372
-
A user authentication system not requiring secrecy in the computer
-
A. Jr Evans, W. Kantrowitz and E. Weiss, A user authentication system not requiring secrecy in the computer, Communications of the ACM, 17 (1974) 437-442.
-
(1974)
Communications of the ACM
, vol.17
, pp. 437-442
-
-
Evans A., Jr.1
Kantrowitz, W.2
Weiss, E.3
-
2
-
-
0019579253
-
Cryptographic authentication of time-invariant quantities
-
R.E. Lennon, S.M. Matyas and C.H. Meyer, Cryptographic authentication of time-invariant quantities, IEEE Transactions on Communications, COM-29, 6 (1981) 773-777.
-
(1981)
IEEE Transactions on Communications
, vol.6 COM-29
, pp. 773-777
-
-
Lennon, R.E.1
Matyas, S.M.2
Meyer, C.H.3
-
3
-
-
0026153410
-
Remote password authenticated with smart cards
-
C.C. Chang and T.C. Wu, Remote password authenticated with smart cards. IEE Proceedings-E, 138 (3) (1991) 165-168.
-
(1991)
IEE Proceedings-E
, vol.138
, Issue.3
, pp. 165-168
-
-
Chang, C.C.1
Wu, T.C.2
-
4
-
-
0023995273
-
Understanding the use of passwords
-
B. Menkus, Understanding the use of passwords, Computers and Security, 7 (1988) 132-136.
-
(1988)
Computers and Security
, vol.7
, pp. 132-136
-
-
Menkus, B.1
-
5
-
-
0011869977
-
Comment on remote password authentication with smart cards
-
C.C. Chang and C.S. Laih, Comment on remote password authentication with smart cards, IEE Proceedings-E, 139 (4) (1992) 372-372.
-
(1992)
IEE Proceedings-E
, vol.139
, Issue.4
, pp. 372-372
-
-
Chang, C.C.1
Laih, C.S.2
-
6
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
T. Elgamal, A public key cryptosystem and a signature scheme based on discrete logarithms, IEEE Transactions on Information Theory, IT-31 (4) (1985) 469-472.
-
(1985)
IEEE Transactions on Information Theory
, vol.IT-31
, Issue.4
, pp. 469-472
-
-
Elgamal, T.1
-
7
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Springer, Berlin
-
A. Shamir, Identity-based cryptosystems and signature schemes. Proceedings CRYPTO'84, pp. 47-53, Springer, Berlin, 1985.
-
(1985)
Proceedings CRYPTO'84
, pp. 47-53
-
-
Shamir, A.1
-
10
-
-
0017930809
-
A method for obtaining digital signature and public-key cryptosystem
-
R.L. Rivest, A. Shamir and L. Adleman, A method for obtaining digital signature and public-key cryptosystem. Communications of the ACM, 21 (2) (1978) 120-126.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
13
-
-
0026837237
-
Integration of user authentication and access control
-
L. Harn and H.Y. Lin, Integration of user authentication and access control, IEE Proceedings-E, 139 (2) (1992) 139-143.
-
(1992)
IEE Proceedings-E
, vol.139
, Issue.2
, pp. 139-143
-
-
Harn, L.1
Lin, H.Y.2
-
14
-
-
0025474612
-
Smart cards provide very high security and flexibility in subscribers management
-
P. Peyret, G. Lisimaque and T.Y. Chua, Smart cards provide very high security and flexibility in subscribers management, IEEE Transactions on Consumer Electronics, 36 (3) (1990) 744-752.
-
(1990)
IEEE Transactions on Consumer Electronics
, vol.36
, Issue.3
, pp. 744-752
-
-
Peyret, P.1
Lisimaque, G.2
Chua, T.Y.3
|