-
1
-
-
0037285263
-
Stolen-verifier attack on two new strong-password authentication protocols
-
Nov.
-
C. M. Chen and W. C. Ku, "Stolen-verifier attack on two new strong-password authentication protocols," IEICE Transactions on Communications, vol. E58-B, no. 11, pp. 2519-2521, Nov. 2002.
-
(2002)
IEICE Transactions on Communications
, vol.E58-B
, Issue.11
, pp. 2519-2521
-
-
Chen, C.M.1
Ku, W.C.2
-
2
-
-
0036556279
-
Improvement on Peyravian-Zunic's password authentication schemes
-
April
-
J. J. Hwang and T. C. Yeh, "Improvement on Peyravian-Zunic's password authentication schemes," IEICE Transactions on Communications, vol. E85-B, no. 4, pp. 823-825, April 2002.
-
(2002)
IEICE Transactions on Communications
, vol.E85-B
, Issue.4
, pp. 823-825
-
-
Hwang, J.J.1
Yeh, T.C.2
-
3
-
-
0142007776
-
Cryptanalysis of a variant of Peyravian-Zunic's password authentication scheme
-
May
-
W. C. Ku, C. M. Chen, and H. L. Lee, "Cryptanalysis of a variant of Peyravian-Zunic's password authentication scheme," IEICE Transactions on Communications, vol. E86-B, no. 5, pp. 1682-1684, May 2003.
-
(2003)
IEICE Transactions on Communications
, vol.E86-B
, Issue.5
, pp. 1682-1684
-
-
Ku, W.C.1
Chen, C.M.2
Lee, H.L.3
-
4
-
-
7644232640
-
Weaknesses of Lee-Li-Hwang's hash-based password authentication scheme
-
Oct.
-
W. C. Ku, C. M. Chen, and H. L. Lee, "Weaknesses of Lee-Li-Hwang's hash-based password authentication scheme," ACM Operating Systems Review, vol. 37, no. 4, pp. 19-25, Oct. 2003.
-
(2003)
ACM Operating Systems Review
, vol.37
, Issue.4
, pp. 19-25
-
-
Ku, W.C.1
Chen, C.M.2
Lee, H.L.3
-
5
-
-
0041698517
-
A remote user authentication scheme using hash functions,"
-
Oct.
-
C. C. Lee, L. H. Li, and M. S, Hwang, "A remote user authentication scheme using hash functions," ACM Operating Systems Review, vol. 36, no. 4, pp. 23-29, Oct. 2002.
-
(2002)
ACM Operating Systems Review
, vol.36
, Issue.4
, pp. 23-29
-
-
Lee, C.C.1
Li, L.H.2
Hwang, M.S.3
-
6
-
-
0035445093
-
Attacks and solutions on strong-password authentication
-
Sept.
-
C. L. Lin, H. M. Sun, and T. Hwang, "Attacks and solutions on strong-password authentication," IEICE Transactions on Communications, vol. E84-B, no. 9, pp. 2622-2627, Sept. 2001.
-
(2001)
IEICE Transactions on Communications
, vol.E84-B
, Issue.9
, pp. 2622-2627
-
-
Lin, C.L.1
Sun, H.M.2
Hwang, T.3
-
7
-
-
73249134721
-
Secure hash standard
-
National Institute of Standards and Technology, April
-
National Institute of Standards and Technology, "Secure hash standard," FIPS Publication 180-1, April 1995.
-
(1995)
FIPS Publication
, vol.180
, Issue.1
-
-
-
8
-
-
0033704170
-
Methods for protecting password transmission
-
July
-
M. Peyravian and N. Zunic, "Methods for protecting password transmission," Computers & Security, vol. 19, no. 5, pp. 466-469, July 2000.
-
(2000)
Computers & Security
, vol.19
, Issue.5
, pp. 466-469
-
-
Peyravian, M.1
Zunic, N.2
-
9
-
-
0003195066
-
The MD5 message-digest algorithm
-
April
-
R. Rivest, "The MD5 message-digest algorithm," RFC 1321, April 1992.
-
(1992)
RFC
, vol.1321
-
-
Rivest, R.1
-
10
-
-
33645790506
-
A secure user authentication scheme using hash functions
-
April
-
E. J. Yoon, E. K. Ryu, and K. Y. Yoo, "A secure user authentication scheme using hash functions," ACM Operating Systems Review, vol. 38, no. 2, pp. 62-68, April 2004.
-
(2004)
ACM Operating Systems Review
, vol.38
, Issue.2
, pp. 62-68
-
-
Yoon, E.J.1
Ryu, E.K.2
Yoo, K.Y.3
|