메뉴 건너뛰기




Volumn 14, Issue 3, 2005, Pages 243-249

A user authentication system using back-propagation network

Author keywords

Back propagation network; Information security; Neural network; One way hash function; User authentication

Indexed keywords


EID: 28844488495     PISSN: 09410643     EISSN: None     Source Type: Journal    
DOI: 10.1007/s00521-004-0460-x     Document Type: Article
Times cited : (9)

References (26)
  • 1
    • 0026121425 scopus 로고
    • Dimensionality reduction and feature extraction applications in identifying computer users
    • Bleha S, Obaidat MS (1991) Dimensionality reduction and feature extraction applications in identifying computer users. IEEE Trans Syst Man Cybern 21:452-456
    • (1991) IEEE Trans Syst Man Cybern , vol.21 , pp. 452-456
    • Bleha, S.1    Obaidat, M.S.2
  • 3
    • 0001784609 scopus 로고
    • Using smart cards to authenticate remote passwords
    • Chang CC, Hwang SJ (1993) Using smart cards to authenticate remote passwords. Comput Math Appl 26(7):19-27
    • (1993) Comput Math Appl , vol.26 , Issue.7 , pp. 19-27
    • Chang, C.C.1    Hwang, S.J.2
  • 5
    • 0016092372 scopus 로고
    • A user authentication scheme not requiring secrecy in the computer
    • Evans A Jr, Kantrowitz W, Weiss E (1974) A user authentication scheme not requiring secrecy in the computer. Commun ACM 17:437-442
    • (1974) Commun ACM , vol.17 , pp. 437-442
    • Evans Jr., A.1    Kantrowitz, W.2    Weiss, E.3
  • 7
    • 0032669728 scopus 로고    scopus 로고
    • Cryptanalysis of remote login authentication scheme
    • Hwang MS (1999) Cryptanalysis of remote login authentication scheme. Comput Commun 22(8):742-744
    • (1999) Comput Commun , vol.22 , Issue.8 , pp. 742-744
    • Hwang, M.S.1
  • 8
    • 0000694693 scopus 로고    scopus 로고
    • A remote password authentication scheme based on the digital signature method
    • Hwang MS (1999) A remote password authentication scheme based on the digital signature method. Int J Comput Math 70:657-666
    • (1999) Int J Comput Math , vol.70 , pp. 657-666
    • Hwang, M.S.1
  • 9
    • 0000362936 scopus 로고    scopus 로고
    • An improvement of SPLICE/AS in WIDE against guessing attack
    • Hwang MS, Lee CC, Tang YL (2001) An improvement of SPLICE/AS in WIDE against guessing attack. Int J Inform 12(2):297-302
    • (2001) Int J Inform , vol.12 , Issue.2 , pp. 297-302
    • Hwang, M.S.1    Lee, C.C.2    Tang, Y.L.3
  • 10
    • 0034140374 scopus 로고    scopus 로고
    • A new remote user authentication scheme using smart cards
    • Hwang M-S, Li LH (2000) A new remote user authentication scheme using smart cards. IEEE Trans Consumer Electron 46(1):28-30
    • (2000) IEEE Trans Consumer Electron , vol.46 , Issue.1 , pp. 28-30
    • Hwang, M.-S.1    Li, L.H.2
  • 12
    • 0002063278 scopus 로고    scopus 로고
    • 'Paramita wisdom' password authentication scheme without verification tables
    • Jan JK, Chen YY (1998) 'Paramita wisdom' password authentication scheme without verification tables. J Syst Software 42:45-57
    • (1998) J Syst Software , vol.42 , pp. 45-57
    • Jan, J.K.1    Chen, Y.Y.2
  • 13
    • 0024771499 scopus 로고
    • A survey of password mechanisms; weakness and potential improvements
    • Jobush DL, Oldehoeft AE (1989) A survey of password mechanisms; weakness and potential improvements. Comput Security 8:587-604
    • (1989) Comput Security , vol.8 , pp. 587-604
    • Jobush, D.L.1    Oldehoeft, A.E.2
  • 14
    • 0035506864 scopus 로고    scopus 로고
    • A remote password authentication scheme for multiserver architecture using neurnal networks
    • Li LH, Lin IC, Hwang MS (2001) A remote password authentication scheme for multiserver architecture using neurnal networks. IEEE Trans on Neurnal Netw 12(6):1498-1504
    • (2001) IEEE Trans on Neurnal Netw , vol.12 , Issue.6 , pp. 1498-1504
    • Li, L.H.1    Lin, I.C.2    Hwang, M.S.3
  • 15
    • 0023331258 scopus 로고
    • An introduction to computing with neural nets
    • Lippman RP (1987) An introduction to computing with neural nets. IEEE ASSP Magazine, pp 4-22
    • (1987) IEEE ASSP Magazine , pp. 4-22
    • Lippman, R.P.1
  • 17
    • 0025545583 scopus 로고
    • A fast software one-way hash function
    • Merkle RC (1990) A fast software one-way hash function. J Cryptogr 3(1):43-58
    • (1990) J Cryptogr , vol.3 , Issue.1 , pp. 43-58
    • Merkle, R.C.1
  • 18
    • 0018543411 scopus 로고
    • Password security: A case history
    • Morris R, Thompson K (1979) Password security: a case history. Communi ACM 22:594-597
    • (1979) Communi ACM , vol.22 , pp. 594-597
    • Morris, R.1    Thompson, K.2
  • 19
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • Needham RM, Schroeder MD (1978) Using encryption for authentication in large networks of computers. Communi ACM 21:993-999
    • (1978) Communi ACM , vol.21 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2
  • 20
    • 0028514601 scopus 로고
    • Kerberos: An authentication service for computer networks
    • Neuman BC, Ts'o T (1994) Kerberos: an authentication service for computer networks. IEEE Communi Mag 32(9):33-38
    • (1994) IEEE Communi Mag , vol.32 , Issue.9 , pp. 33-38
    • Neuman, B.C.1    Ts'o, T.2
  • 21
    • 0028423041 scopus 로고
    • An multilayer neural network system for computer access security
    • Obaidat MS, Macchiarolo DT (1994) An multilayer neural network system for computer access security. IEEE Trans Syst Man Cybern 24:806-813
    • (1994) IEEE Trans Syst Man Cybern , vol.24 , pp. 806-813
    • Obaidat, M.S.1    Macchiarolo, D.T.2
  • 22
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public key cryptosystems
    • Rivest RL, Shamir A, Adleman L (1978) A method for obtaining digital signatures and public key cryptosystems. Communi ACM 21:120-126
    • (1978) Communi ACM , vol.21 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 23
    • 0025404523 scopus 로고
    • Survey of neural network technology for automatic target recognition
    • Roth M (1990) Survey of neural network technology for automatic target recognition. IEEE Trans Neural Netw 1:28-43
    • (1990) IEEE Trans Neural Netw , vol.1 , pp. 28-43
    • Roth, M.1
  • 24
    • 0029546542 scopus 로고
    • Setting optimal intrusion-detection thresholds
    • Soh BC, Dillon TS (1995) Setting optimal intrusion-detection thresholds. Computers & Security 14:621-631
    • (1995) Computers & Security , vol.14 , pp. 621-631
    • Soh, B.C.1    Dillon, T.S.2
  • 25
    • 0029696153 scopus 로고    scopus 로고
    • A simple scheme to make passwords based on one-way function much harder to crack
    • Manber U (1996) A simple scheme to make passwords based on one-way function much harder to crack. Comput Security 15(2):171-176
    • (1996) Comput Security , vol.15 , Issue.2 , pp. 171-176
    • Manber, U.1
  • 26
    • 33748196456 scopus 로고    scopus 로고
    • Man-in-the-middle attack on the authentication of the user from the remote autonomous object
    • Yang CY, Lee CC, Hsiao SY (2005) Man-in-the-middle attack on the authentication of the user from the remote autonomous object. Int J Network Security 1(1):22-24
    • (2005) Int J Network Security , vol.1 , Issue.1 , pp. 22-24
    • Yang, C.Y.1    Lee, C.C.2    Hsiao, S.Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.