메뉴 건너뛰기




Volumn 1, Issue , 2004, Pages 321-326

Using IC cards to remotely login passwords without verification tables

Author keywords

Discrete logarithms; One way function; Password authentication; Timestamp

Indexed keywords

COMPUTATIONAL METHODS; FINANCE; FUNCTIONS; INFORMATION ANALYSIS; RANDOM PROCESSES; SOCIETIES AND INSTITUTIONS;

EID: 3042536394     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (8)

References (12)
  • 1
    • 0028405583 scopus 로고
    • A remote password authentication scheme based upon ElGamal's signature scheme
    • C. C. Chang, and W. Y. Liao, "A Remote Password Authentication Scheme Based upon ElGamal's Signature Scheme", Computer & Security, Vol. 13, 1994, pp. 137-144.
    • (1994) Computer & Security , vol.13 , pp. 137-144
    • Chang, C.C.1    Liao, W.Y.2
  • 2
    • 0346596022 scopus 로고
    • A password authentication scheme based upon rabin's public-key cryptosystem
    • Hong Kong, Jun.
    • C. C. Chang, and L. H. Wu, "A Password Authentication Scheme Based upon Rabin's Public-Key Cryptosystem", Proc. Int. Conf. Systems Management '90, Hong Kong, Jun. 1990, pp. 425-429.
    • (1990) Proc. Int. Conf. Systems Management '90 , pp. 425-429
    • Chang, C.C.1    Wu, L.H.2
  • 3
    • 0026153410 scopus 로고
    • Remote password authentication with smart cards
    • C. C. Chang, and T. C. Wu, "Remote Password Authentication with Smart Cards", IEE Proceedings -E, Vol. 138, No 3, 1991, pp. 165-168.
    • (1991) IEE Proceedings -E , vol.138 , Issue.3 , pp. 165-168
    • Chang, C.C.1    Wu, T.C.2
  • 4
    • 0002063278 scopus 로고    scopus 로고
    • Paramita wisdom: Password authentication scheme without verification tables
    • J. K. Jan, and Y. Y. Chen, "Paramita Wisdom: Password Authentication Scheme without Verification Tables", The Journal of Systems and Software, 42 1998, pp. 45-57.
    • (1998) The Journal of Systems and Software , vol.42 , pp. 45-57
    • Jan, J.K.1    Chen, Y.Y.2
  • 7
    • 0017018484 scopus 로고
    • New directions in cryptography
    • H. Diffie, and M. E. Hellman, "New Directions in Cryptography", IEEE Trans. Inf. Theory, Vol. IT-22, No. 6, 1976, pp. 644-654.
    • (1976) IEEE Trans. Inf. Theory , vol.IT-22 , Issue.6 , pp. 644-654
    • Diffie, H.1    Hellman, M.E.2
  • 8
    • 84874800178 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • T. ElGamal, "A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms", IEEE Trans. Inf. Theory, Vol. IT-31, No. 4, 1985, pp. 469-472.
    • (1985) IEEE Trans. Inf. Theory , vol.IT-31 , Issue.4 , pp. 469-472
    • ElGamal, T.1
  • 9
    • 0016092372 scopus 로고
    • A user authentication scheme not requiring secrecy in the computer
    • A. J. Evans, W. Kantrowitz, and E. Weiss, "A User Authentication Scheme not Requiring Secrecy in the Computer", Comm. ACM, Vol. 17, No. 8, 1974, pp. 437-442.
    • (1974) Comm. ACM , vol.17 , Issue.8 , pp. 437-442
    • Evans, A.J.1    Kantrowitz, W.2    Weiss, E.3
  • 10
    • 0345964586 scopus 로고
    • Password authentication using public-key encryption
    • Zurich, Switzerland
    • T. Y. Hwang, "Password Authentication Using Public-Key Encryption", Proc. Int. Carnahan Conf. Security Technology, Zurich, Switzerland, 1983, pp. 35-38.
    • (1983) Proc. Int. Carnahan Conf. Security Technology , pp. 35-38
    • Hwang, T.Y.1
  • 11
    • 0038061940 scopus 로고
    • Password authentication using quadratic residues
    • Taipei, Taiwan, Dec.
    • C. S. Lain, L. Harn, and D. Huang, "Password Authentication Using Quadratic Residues", Proc. 1988 Int. Computer Symp., Taipei, Taiwan, Dec. 1988, pp. 1484-1489.
    • (1988) Proc. 1988 Int. Computer Symp. , pp. 1484-1489
    • Lain, C.S.1    Harn, L.2    Huang, D.3
  • 12
    • 3042631891 scopus 로고
    • A server-aided computation protocol for RSA enciphering algorithm
    • C. H. Lin, and C. C. Chang, "A Server-Aided Computation Protocol for RSA Enciphering Algorithm", Int. Journal Computer Math., Vol. 53, 1994, pp. 149-155.
    • (1994) Int. Journal Computer Math. , vol.53 , pp. 149-155
    • Lin, C.H.1    Chang, C.C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.