메뉴 건너뛰기




Volumn E86-B, Issue 7, 2003, Pages 2178-2181

Security Enhancement for Protecting Password Transmission

Author keywords

Authentication; Cryptography; Password; Security

Indexed keywords

COMPUTER NETWORKS; DATA COMMUNICATION SYSTEMS; SERVERS;

EID: 0142007845     PISSN: 09168516     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (23)

References (17)
  • 1
    • 0141946906 scopus 로고    scopus 로고
    • Security on the Internet: Authenticating the user
    • J. Botting, "Security on the Internet: Authenticating the user," Telecommunications, vol.31, no.12, pp.77-80, 1997.
    • (1997) Telecommunications , vol.31 , Issue.12 , pp. 77-80
    • Botting, J.1
  • 3
    • 0017018484 scopus 로고
    • New directions in cryptography
    • Nov.
    • W. Diffie and M.E. Hellman, "New directions in cryptography," IEEE Trans. Inf. Theory, vol.IT-22, no.6, pp.644-654, Nov. 1976.
    • (1976) IEEE Trans. Inf. Theory , vol.IT-22 , Issue.6 , pp. 644-654
    • Diffie, W.1    Hellman, M.E.2
  • 4
    • 84874800178 scopus 로고
    • A public-key cryptosystem and a signature scheme based on discrete logarithms
    • July
    • T. ElGamal, "A public-key cryptosystem and a signature scheme based on discrete logarithms," IEEE Trans. Inf. Theory, vol.IT-31, no.4, pp.469-472, July 1985.
    • (1985) IEEE Trans. Inf. Theory , vol.IT-31 , Issue.4 , pp. 469-472
    • Elgamal, T.1
  • 5
    • 0000270009 scopus 로고
    • Password authentication without using password table
    • G. Horng, "Password authentication without using password table," Inf. Process. Lett., vol.55, pp.247-250, 1995.
    • (1995) Inf. Process. Lett. , vol.55 , pp. 247-250
    • Horng, G.1
  • 6
    • 0036556279 scopus 로고    scopus 로고
    • Improvement on Peyravian-Zunic's password authentication schemes
    • April
    • J.-J. Hwang and T.-C. Yeh, "Improvement on Peyravian-Zunic's password authentication schemes," IEICE Trans. Commun., vol.E85-B, no.4, pp.823-825, April 2002.
    • (2002) IEICE Trans. Commun. , vol.E85-B , Issue.4 , pp. 823-825
    • Hwang, J.-J.1    Yeh, T.-C.2
  • 7
    • 0000694693 scopus 로고    scopus 로고
    • A remote password authentication scheme based on the digital signature method
    • M.-S. Hwang, "A remote password authentication scheme based on the digital signature method," Int. J. Comput. Math., vol.70, pp.657-666, 1999.
    • (1999) Int. J. Comput. Math. , vol.70 , pp. 657-666
    • Hwang, M.-S.1
  • 9
    • 0000362936 scopus 로고    scopus 로고
    • An improvement of SPLICE/AS in WIDE against guessing attack
    • M.-S. Hwang, C.-C. Lee, and Y.-L. Tang, "An improvement of SPLICE/ AS in WIDE against guessing attack," International Journal of Informatica, vol.12, no.2, pp.297-302, 2001.
    • (2001) International Journal of Informatica , vol.12 , Issue.2 , pp. 297-302
    • Hwang, M.-S.1    Lee, C.-C.2    Tang, Y.-L.3
  • 10
    • 0038564821 scopus 로고    scopus 로고
    • Cryptanalysis of the batch verifying multiple RSA digital signatures
    • M.-S. Hwang, I.-C. Lin, and K.-F. Hwang, "Cryptanalysis of the batch verifying multiple RSA digital signatures," Informatica, vol.11, no.1, pp.15-19, 2000.
    • (2000) Informatica , vol.11 , Issue.1 , pp. 15-19
    • Hwang, M.-S.1    Lin, I.-C.2    Hwang, K.-F.3
  • 11
    • 0030261758 scopus 로고    scopus 로고
    • Strong password only authenticated key exchange
    • Oct.
    • D.P. Jablon, "Strong password only authenticated key exchange, " Computer Communication Review, vol.26, pp.5-26, Oct. 1996.
    • (1996) Computer Communication Review , vol.26 , pp. 5-26
    • Jablon, D.P.1
  • 12
    • 0041698518 scopus 로고    scopus 로고
    • A flexible remote user authentication scheme using smart cards
    • C.-C. Lee, M.-S. Hwang, and W.-P. Yang, "A flexible remote user authentication scheme using smart cards," ACM Operating Systems Review, vol.36, no.3, pp.46-52, 2002.
    • (2002) ACM Operating Systems Review , vol.36 , Issue.3 , pp. 46-52
    • Lee, C.-C.1    Hwang, M.-S.2    Yang, W.-P.3
  • 13
    • 0035506864 scopus 로고    scopus 로고
    • A remote password authentication scheme for multi-server architecture using neural networks
    • L.-H. Li, I.-C. Lin, and M.-S. Hwang, "A remote password authentication scheme for multi-server architecture using neural networks, " IEEE Trans. Neural Netw., vol.12, no.6, pp.1498-1504, 2001.
    • (2001) IEEE Trans. Neural Netw. , vol.12 , Issue.6 , pp. 1498-1504
    • Li, L.-H.1    Lin, I.-C.2    Hwang, M.-S.3
  • 14
    • 0033704170 scopus 로고    scopus 로고
    • Methods for protecting password transmission
    • M. Peyravian and N. Zunic, "Methods for protecting password transmission," Computers & Security, vol.19, no.5, pp.466-469, 2000.
    • (2000) Computers & Security , vol.19 , Issue.5 , pp. 466-469
    • Peyravian, M.1    Zunic, N.2
  • 15
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public key cryptosystems
    • Feb.
    • R.L. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public key cryptosystems," Commun. ACM, vol.21, pp.120-126, Feb. 1978.
    • (1978) Commun. ACM , vol.21 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 17
    • 0141518232 scopus 로고    scopus 로고
    • On the security of methods for protecting password transmission
    • Y.-M. Tseng, J.-K. Jan, and H.-Y. Chien, "On the security of methods for protecting password transmission," International Journal of Informatica, vol.12, no.2, pp.469-476, 2001.
    • (2001) International Journal of Informatica , vol.12 , Issue.2 , pp. 469-476
    • Tseng, Y.-M.1    Jan, J.-K.2    Chien, H.-Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.