메뉴 건너뛰기




Volumn 15, Issue 3, 1996, Pages 231-237

Smart card based secure password authentication scheme

Author keywords

Password authentication; Public key; Signature; Smart card

Indexed keywords

COMPUTER NETWORKS; INFORMATION TECHNOLOGY; SMART CARDS; TELECOMMUNICATION NETWORKS;

EID: 0029710130     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/0167-4048(96)00005-3     Document Type: Article
Times cited : (98)

References (14)
  • 1
    • 0016092372 scopus 로고
    • A user authentication system not requiring secrecy in the computer
    • A. Jr Evans, W. Kantrowitz and E. Weiss, A user authentication system not requiring secrecy in the computer, Communications of the ACM, 17 (1974) 437-442.
    • (1974) Communications of the ACM , vol.17 , pp. 437-442
    • Evans A., Jr.1    Kantrowitz, W.2    Weiss, E.3
  • 3
    • 0026153410 scopus 로고
    • Remote password authenticated with smart cards
    • C.C. Chang and T.C. Wu, Remote password authenticated with smart cards. IEE Proceedings-E, 138 (3) (1991) 165-168.
    • (1991) IEE Proceedings-E , vol.138 , Issue.3 , pp. 165-168
    • Chang, C.C.1    Wu, T.C.2
  • 4
    • 0023995273 scopus 로고
    • Understanding the use of passwords
    • B. Menkus, Understanding the use of passwords, Computers and Security, 7 (1988) 132-136.
    • (1988) Computers and Security , vol.7 , pp. 132-136
    • Menkus, B.1
  • 5
    • 0011869977 scopus 로고
    • Comment on remote password authentication with smart cards
    • C.C. Chang and C.S. Laih, Comment on remote password authentication with smart cards, IEE Proceedings-E, 139 (4) (1992) 372-372.
    • (1992) IEE Proceedings-E , vol.139 , Issue.4 , pp. 372-372
    • Chang, C.C.1    Laih, C.S.2
  • 6
    • 84874800178 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • T. Elgamal, A public key cryptosystem and a signature scheme based on discrete logarithms, IEEE Transactions on Information Theory, IT-31 (4) (1985) 469-472.
    • (1985) IEEE Transactions on Information Theory , vol.IT-31 , Issue.4 , pp. 469-472
    • Elgamal, T.1
  • 7
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • Springer, Berlin
    • A. Shamir, Identity-based cryptosystems and signature schemes. Proceedings CRYPTO'84, pp. 47-53, Springer, Berlin, 1985.
    • (1985) Proceedings CRYPTO'84 , pp. 47-53
    • Shamir, A.1
  • 10
    • 0017930809 scopus 로고
    • A method for obtaining digital signature and public-key cryptosystem
    • R.L. Rivest, A. Shamir and L. Adleman, A method for obtaining digital signature and public-key cryptosystem. Communications of the ACM, 21 (2) (1978) 120-126.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 13
    • 0026837237 scopus 로고
    • Integration of user authentication and access control
    • L. Harn and H.Y. Lin, Integration of user authentication and access control, IEE Proceedings-E, 139 (2) (1992) 139-143.
    • (1992) IEE Proceedings-E , vol.139 , Issue.2 , pp. 139-143
    • Harn, L.1    Lin, H.Y.2
  • 14
    • 0025474612 scopus 로고
    • Smart cards provide very high security and flexibility in subscribers management
    • P. Peyret, G. Lisimaque and T.Y. Chua, Smart cards provide very high security and flexibility in subscribers management, IEEE Transactions on Consumer Electronics, 36 (3) (1990) 744-752.
    • (1990) IEEE Transactions on Consumer Electronics , vol.36 , Issue.3 , pp. 744-752
    • Peyret, P.1    Lisimaque, G.2    Chua, T.Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.