-
1
-
-
0028405583
-
A remote password authentication scheme based upon ElGamal's signature scheme
-
C. C. Chang, and W. Y. Liao, "A Remote Password Authentication Scheme Based upon ElGamal's Signature Scheme", Computer & Security, Vol. 13, 1994, pp. 137-144.
-
(1994)
Computer & Security
, vol.13
, pp. 137-144
-
-
Chang, C.C.1
Liao, W.Y.2
-
2
-
-
0346596022
-
A password authentication scheme based upon rabin's public-key cryptosystem
-
Hong Kong, Jun.
-
C. C. Chang, and L. H. Wu, "A Password Authentication Scheme Based upon Rabin's Public-Key Cryptosystem", Proc. Int. Conf. Systems Management '90, Hong Kong, Jun. 1990, pp. 425-429.
-
(1990)
Proc. Int. Conf. Systems Management '90
, pp. 425-429
-
-
Chang, C.C.1
Wu, L.H.2
-
3
-
-
0026153410
-
Remote password authentication with smart cards
-
C. C. Chang, and T. C. Wu, "Remote Password Authentication with Smart Cards", IEE Proceedings -E, Vol. 138, No 3, 1991, pp. 165-168.
-
(1991)
IEE Proceedings -E
, vol.138
, Issue.3
, pp. 165-168
-
-
Chang, C.C.1
Wu, T.C.2
-
4
-
-
0002063278
-
Paramita wisdom: Password authentication scheme without verification tables
-
J. K. Jan, and Y. Y. Chen, "Paramita Wisdom: Password Authentication Scheme without Verification Tables", The Journal of Systems and Software, 42 1998, pp. 45-57.
-
(1998)
The Journal of Systems and Software
, vol.42
, pp. 45-57
-
-
Jan, J.K.1
Chen, Y.Y.2
-
5
-
-
0004189288
-
-
John Wiley and Sons, Ltd., Chichester, New York, Brisbane, Toronto
-
G. I. Davies, and W. L. Price, Security for Computer Network: Wiley-Interscience Publication, John Wiley and Sons, Ltd., Chichester, New York, Brisbane, Toronto, 1984.
-
(1984)
Security for Computer Network: Wiley-interscience Publication
-
-
Davies, G.I.1
Price, W.L.2
-
7
-
-
0017018484
-
New directions in cryptography
-
H. Diffie, and M. E. Hellman, "New Directions in Cryptography", IEEE Trans. Inf. Theory, Vol. IT-22, No. 6, 1976, pp. 644-654.
-
(1976)
IEEE Trans. Inf. Theory
, vol.IT-22
, Issue.6
, pp. 644-654
-
-
Diffie, H.1
Hellman, M.E.2
-
8
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
T. ElGamal, "A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms", IEEE Trans. Inf. Theory, Vol. IT-31, No. 4, 1985, pp. 469-472.
-
(1985)
IEEE Trans. Inf. Theory
, vol.IT-31
, Issue.4
, pp. 469-472
-
-
ElGamal, T.1
-
9
-
-
0016092372
-
A user authentication scheme not requiring secrecy in the computer
-
A. J. Evans, W. Kantrowitz, and E. Weiss, "A User Authentication Scheme not Requiring Secrecy in the Computer", Comm. ACM, Vol. 17, No. 8, 1974, pp. 437-442.
-
(1974)
Comm. ACM
, vol.17
, Issue.8
, pp. 437-442
-
-
Evans, A.J.1
Kantrowitz, W.2
Weiss, E.3
-
10
-
-
0345964586
-
Password authentication using public-key encryption
-
Zurich, Switzerland
-
T. Y. Hwang, "Password Authentication Using Public-Key Encryption", Proc. Int. Carnahan Conf. Security Technology, Zurich, Switzerland, 1983, pp. 35-38.
-
(1983)
Proc. Int. Carnahan Conf. Security Technology
, pp. 35-38
-
-
Hwang, T.Y.1
-
11
-
-
0038061940
-
Password authentication using quadratic residues
-
Taipei, Taiwan, Dec.
-
C. S. Lain, L. Harn, and D. Huang, "Password Authentication Using Quadratic Residues", Proc. 1988 Int. Computer Symp., Taipei, Taiwan, Dec. 1988, pp. 1484-1489.
-
(1988)
Proc. 1988 Int. Computer Symp.
, pp. 1484-1489
-
-
Lain, C.S.1
Harn, L.2
Huang, D.3
-
12
-
-
3042631891
-
A server-aided computation protocol for RSA enciphering algorithm
-
C. H. Lin, and C. C. Chang, "A Server-Aided Computation Protocol for RSA Enciphering Algorithm", Int. Journal Computer Math., Vol. 53, 1994, pp. 149-155.
-
(1994)
Int. Journal Computer Math.
, vol.53
, pp. 149-155
-
-
Lin, C.H.1
Chang, C.C.2
|