메뉴 건너뛰기




Volumn 33, Issue 10, 2000, Pages 54-60

Parasitic authentication to protect your e-wallet

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER SYSTEMS PROGRAMMING; DATA COMMUNICATION SYSTEMS; DIGITAL ARITHMETIC; FINANCIAL DATA PROCESSING; INDUSTRIAL ECONOMICS; NETWORK PROTOCOLS; RESPONSE TIME (COMPUTER SYSTEMS); SECURITY OF DATA; SMART CARDS; TRANSPONDERS;

EID: 0034298976     PISSN: 00189162     EISSN: None     Source Type: Journal    
DOI: 10.1109/2.876293     Document Type: Article
Times cited : (13)

References (11)
  • 2
    • 0003727003 scopus 로고
    • MacMillan Publishing Co., New York
    • D. Kahn, The Codebreakers, MacMillan Publishing Co., New York, 1967.
    • (1967) The Codebreakers
    • Kahn, D.1
  • 3
    • 0040231044 scopus 로고
    • Foiling the cracker: A survey of, and implications to, password security
    • Usenix, Berkeley, Calif
    • D.V. Klein, "Foiling the Cracker: A Survey of, and Implications to, Password Security," Proc. Usenix Security Workshop, Usenix, Berkeley, Calif., 1990, pp. 5-14.
    • (1990) Proc. Usenix Security Workshop , pp. 5-14
    • Klein, D.V.1
  • 6
    • 0022793132 scopus 로고
    • How to construct random functions
    • Oct
    • O. Goldreich, S. Goldwasser, and S. Micali, "How to Construct Random Functions," J. ACM, Oct. 1986, pp. 792-807.
    • (1986) J. ACM , pp. 792-807
    • Goldreich, O.1    Goldwasser, S.2    Micali, S.3
  • 8
  • 11
    • 0026973508 scopus 로고
    • Message authentication with one-way hash functions
    • IEEE CS Press, Los Alamitos, Calif
    • G. Tsudik, "Message Authentication with One-Way Hash Functions," Proc. Infocom 92, 11th Conf. Computer Communications, IEEE CS Press, Los Alamitos, Calif., 1992, pp. 2055-2059.
    • (1992) Proc. Infocom 92, 11th Conf. Computer Communications , pp. 2055-2059
    • Tsudik, G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.