메뉴 건너뛰기




Volumn 26, Issue 2, 2004, Pages 85-92

Remote table-based log-in authentication upon geometric triangle

Author keywords

Encryption; Password authentication; Secure analysis; Table based scheme

Indexed keywords

COMPUTATIONAL GEOMETRY; REMOTE CONSOLES; SECURITY OF DATA; SERVERS; TABLE LOOKUP;

EID: 0344943279     PISSN: 09205489     EISSN: None     Source Type: Journal    
DOI: 10.1016/S0920-5489(03)00064-3     Document Type: Article
Times cited : (5)

References (12)
  • 2
    • 0016092372 scopus 로고
    • A user authentication system not requiring secrecy in the computer
    • Evans A. Jr., Kantrowitz W., Weiss E. A user authentication system not requiring secrecy in the computer. Commun. ACM. 17:1974;437-442.
    • (1974) Commun. ACM , vol.17 , pp. 437-442
    • Evans Jr., A.1    Kantrowitz, W.2    Weiss, E.3
  • 4
    • 0019579253 scopus 로고
    • Cryptographic authentication of time-invariant quantities
    • Lennon R.E., Matyas S.M., Meyer C.H. Cryptographic authentication of time-invariant quantities. IEEE Trans. Commun. COM-29(6):1981;773-777.
    • (1981) IEEE Trans. Commun. , vol.COM-29 , Issue.6 , pp. 773-777
    • Lennon, R.E.1    Matyas, S.M.2    Meyer, C.H.3
  • 6
    • 0037724292 scopus 로고
    • An efficient password authentication scheme based on an unit circle
    • Liaw H.T., Lei C.L. An efficient password authentication scheme based on an unit circle. Cryptologia. XIX(2):1995;198-207.
    • (1995) Cryptologia , vol.19 , Issue.2 , pp. 198-207
    • Liaw, H.T.1    Lei, C.L.2
  • 7
    • 58149326626 scopus 로고
    • Password authentications using triangles and straight lines
    • Liaw H.T. Password authentications using triangles and straight lines. Comput. Math. Appl. 30(9):1995;63-71.
    • (1995) Comput. Math. Appl. , vol.30 , Issue.9 , pp. 63-71
    • Liaw, H.T.1
  • 8
    • 0024867460 scopus 로고
    • A study of password security
    • Luby M., Rackoff C. A study of password security. J. Cryptol. 1:1989;151-158.
    • (1989) J. Cryptol. , vol.1 , pp. 151-158
    • Luby, M.1    Rackoff, C.2
  • 9
    • 0023995273 scopus 로고
    • Understanding the use of passwords
    • Menkus B. Understanding the use of passwords. Comput. Secur. 7:1988;132-136.
    • (1988) Comput. Secur. , vol.7 , pp. 132-136
    • Menkus, B.1
  • 10
    • 0017930809 scopus 로고
    • A method for obtaining digital signature and public-key cryptosystem
    • Rivest R.L., Shamir A., Adleman L. A method for obtaining digital signature and public-key cryptosystem. Commun. ACM. 21(2):1978;120-126.
    • (1978) Commun. ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 11
    • 0029710130 scopus 로고    scopus 로고
    • Smart card based secure password authentication scheme
    • Wang S.J., Chang J.F. Smart card based secure password authentication scheme. Comput. Secur. 15(3):1996;231-237.
    • (1996) Comput. Secur. , vol.15 , Issue.3 , pp. 231-237
    • Wang, S.J.1    Chang, J.F.2
  • 12
    • 0033350090 scopus 로고    scopus 로고
    • Password authentication schemes with smart cards
    • Yang W.H., Shieh S.P. Password authentication schemes with smart cards. Comput. Secur. 18(8):1999;727-733.
    • (1999) Comput. Secur. , vol.18 , Issue.8 , pp. 727-733
    • Yang, W.H.1    Shieh, S.P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.