메뉴 건너뛰기




Volumn 19, Issue 12, 1996, Pages 954-961

Towards a formal system-to-system authentication protocol

Author keywords

Authentication; Passwords; Probabilistic protocols; Zero knowledge protocols

Indexed keywords

COMPUTER NETWORKS; IDENTIFICATION (CONTROL SYSTEMS); PROBABILITY;

EID: 0030265092     PISSN: 01403664     EISSN: None     Source Type: Journal    
DOI: 10.1016/S0140-3664(96)01139-5     Document Type: Article
Times cited : (6)

References (14)
  • 2
    • 0026630927 scopus 로고
    • Authentication for distributed systems
    • January
    • Y.T. Woo and S.S. Lam, Authentication for distributed systems, Computer (January 1977) 39-59.
    • (1977) Computer , pp. 39-59
    • Woo, Y.T.1    Lam, S.S.2
  • 3
    • 30244503334 scopus 로고
    • A zero-knowledge probabilistic login protocol
    • December
    • S. Gritzalis, S. Katsikas and D. Gritzalis, A zero-knowledge probabilistic login protocol, Computers & Security, 11(7) (December 1992) 733-745.
    • (1992) Computers & Security , vol.11 , Issue.7 , pp. 733-745
    • Gritzalis, S.1    Katsikas, S.2    Gritzalis, D.3
  • 5
    • 0024771630 scopus 로고
    • A simple way of improving the login security
    • November
    • K. Dehnad, A simple way of improving the login security, Computers & Security, 8(7) (November 1989) 607-611.
    • (1989) Computers & Security , vol.8 , Issue.7 , pp. 607-611
    • Dehnad, K.1
  • 6
    • 33144467492 scopus 로고
    • Computer Security Centre, CSC-STD-0020985, USA
    • US. Dept. of Defence, Password Management Guidelines, Computer Security Centre, CSC-STD-0020985, USA, 1985.
    • (1985) Password Management Guidelines
  • 9
  • 10
    • 0042064785 scopus 로고
    • An efficient identification scheme based on permuted kernels
    • Springer-Verlag
    • A. Shamir, An efficient identification scheme based on permuted kernels, Proc. Crypto '89, Springer-Verlag, 1990.
    • (1990) Proc. Crypto '89
    • Shamir, A.1
  • 11
    • 30244498478 scopus 로고
    • Accessibility vs. Security: A look at the demand for computer security
    • June
    • G. Post and K. Kievit, Accessibility vs. security: a look at the demand for computer security, Computers & Security, 10(4) (June 1991) 331-344.
    • (1991) Computers & Security , vol.10 , Issue.4 , pp. 331-344
    • Post, G.1    Kievit, K.2
  • 13
    • 30244499964 scopus 로고
    • Letter on the key size of RSA
    • R. Rivest, Letter on the key size of RSA, ACM SIGACT News, 22(4) (1991) 43-47.
    • (1991) ACM SIGACT News , vol.22 , Issue.4 , pp. 43-47
    • Rivest, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.