메뉴 건너뛰기




Volumn 38, Issue 2, 2008, Pages 265-268

Password authentication using Hopfield neural networks

Author keywords

Hopfield networks; Pattern matching; Security

Indexed keywords

CRYPTOGRAPHY; HOPFIELD NEURAL NETWORKS; NETWORK SECURITY; PATTERN MATCHING;

EID: 40949151655     PISSN: 10946977     EISSN: None     Source Type: Journal    
DOI: 10.1109/TSMCC.2007.913901     Document Type: Article
Times cited : (25)

References (16)
  • 1
    • 0016092372 scopus 로고
    • A user authentication scheme not requiring secrecy in the computer
    • A. J. Evans, W. Kantrowiz, and E. Weiss, "A user authentication scheme not requiring secrecy in the computer," Commun. ACM, vol. 17, pp. 437-442, 1974.
    • (1974) Commun. ACM , vol.17 , pp. 437-442
    • Evans, A.J.1    Kantrowiz, W.2    Weiss, E.3
  • 2
    • 0031194343 scopus 로고    scopus 로고
    • Informational capacity and recall quality in sparsely encoded Hopfield-like neural network: Analytical approaches and computer simulation
    • A. A. Frolov, D. Husek, and I. P. Muraviev, "Informational capacity and recall quality in sparsely encoded Hopfield-like neural network: Analytical approaches and computer simulation," Neural Netw., vol. 10, no. 5, pp. 845-855, 1997.
    • (1997) Neural Netw , vol.10 , Issue.5 , pp. 845-855
    • Frolov, A.A.1    Husek, D.2    Muraviev, I.P.3
  • 5
    • 0020118274 scopus 로고
    • Neural networks and physical systems with emergent collective computational abilities
    • J. J. Hopfield, "Neural networks and physical systems with emergent collective computational abilities," in Proc. Natl. Acad. Sci. USA vol. 79, pp. 2554-2558, 1982.
    • (1982) Proc. Natl. Acad. Sci. USA , vol.79 , pp. 2554-2558
    • Hopfield, J.J.1
  • 6
    • 0004469897 scopus 로고
    • Neurons with graded response have collective computational properties like those of two-state neurons
    • J. J. Hopfield, "Neurons with graded response have collective computational properties like those of two-state neurons," in Proc. Natl. Acad. Sci. USA, vol. 81, pp. 3088-3092, 1984.
    • (1984) Proc. Natl. Acad. Sci. USA , vol.81 , pp. 3088-3092
    • Hopfield, J.J.1
  • 7
    • 0022504321 scopus 로고
    • Computing with neural circuits
    • J. J. Hopfield and D. W. Tank, "Computing with neural circuits," Science, vol. 233, pp. 625-633, 1986.
    • (1986) Science , vol.233 , pp. 625-633
    • Hopfield, J.J.1    Tank, D.W.2
  • 8
    • 4243096135 scopus 로고    scopus 로고
    • The domino effect of password reuse
    • Apr
    • B. Ives, K. R. Walsh, and H. Schneider, "The domino effect of password reuse," Commun. ACM, vol. 47, no. 4, pp. 75-79, Apr. 2004.
    • (2004) Commun. ACM , vol.47 , Issue.4 , pp. 75-79
    • Ives, B.1    Walsh, K.R.2    Schneider, H.3
  • 9
    • 0035506864 scopus 로고    scopus 로고
    • A remote password authentication scheme for multiserver architecture using neural networks
    • Nov
    • L. H. Li, I. C. Lin, and M. S. Hwang, "A remote password authentication scheme for multiserver architecture using neural networks," IEEE Trans. Neural Netw., vol. 12, no. 6, pp. 1498-1504, Nov. 2001.
    • (2001) IEEE Trans. Neural Netw , vol.12 , Issue.6 , pp. 1498-1504
    • Li, L.H.1    Lin, I.C.2    Hwang, M.S.3
  • 10
    • 0030085144 scopus 로고    scopus 로고
    • An automatic indexing and neural network approach to concept retrieval and classification of multilingual (Chinese-English) documents
    • Feb
    • C. H. Lin and H. Chen, "An automatic indexing and neural network approach to concept retrieval and classification of multilingual (Chinese-English) documents," IEEE Trans. Syst., Man, Cybern. B, Cybern., vol. 26, no. 1, pp. 1-14, Feb. 1996.
    • (1996) IEEE Trans. Syst., Man, Cybern. B, Cybern , vol.26 , Issue.1 , pp. 1-14
    • Lin, C.H.1    Chen, H.2
  • 11
    • 0001174154 scopus 로고
    • Polynomial codes over certain finite fields
    • I. S. Reed and G. Solomon, "Polynomial codes over certain finite fields," SIAM J. Appl. Math., vol. 8, no. 2, pp. 200-304, 1960.
    • (1960) SIAM J. Appl. Math , vol.8 , Issue.2 , pp. 200-304
    • Reed, I.S.1    Solomon, G.2
  • 12
    • 0030086382 scopus 로고    scopus 로고
    • Role-based access control models
    • Feb
    • R. Sandhu, E. Coyne, H. Feinstein, and C. Youman, "Role-based access control models," IEEE Comput., vol. 29, no. 2, pp. 38-47, Feb. 1996.
    • (1996) IEEE Comput , vol.29 , Issue.2 , pp. 38-47
    • Sandhu, R.1    Coyne, E.2    Feinstein, H.3    Youman, C.4
  • 13
    • 0023493211 scopus 로고
    • Collective computation in neuronlike circuits
    • D. W. Tank and J. J. Hopfield, "Collective computation in neuronlike circuits," Sci. Amer., vol. 257, no. 6, pp. 104-114, 1987.
    • (1987) Sci. Amer , vol.257 , Issue.6 , pp. 104-114
    • Tank, D.W.1    Hopfield, J.J.2
  • 14
    • 40949152760 scopus 로고    scopus 로고
    • Password authentication schemes: Current status and key issues
    • C. S. Tsai, C. C. Lee, and M. S. Hwang, "Password authentication schemes: Current status and key issues," Int. J. Netw. Secur., vol. 3, no. 2, pp. 101-115, 2006.
    • (2006) Int. J. Netw. Secur , vol.3 , Issue.2 , pp. 101-115
    • Tsai, C.S.1    Lee, C.C.2    Hwang, M.S.3
  • 15
    • 0029696153 scopus 로고    scopus 로고
    • A simple scheme to make passwords based on one-way function much harder to crack
    • M. Udi, "A simple scheme to make passwords based on one-way function much harder to crack," Comput. Secur., vol. 15, no. 2, pp. 171-176, 1996.
    • (1996) Comput. Secur , vol.15 , Issue.2 , pp. 171-176
    • Udi, M.1
  • 16
    • 0036880613 scopus 로고    scopus 로고
    • A LP-RR principle based admission control for a mobile network
    • Nov
    • B. P. V. Kumar and P. Venkataram, "A LP-RR principle based admission control for a mobile network," IEEE Trans. Syst., Man, Cybern. C, Appl. Rev., vol. 32, no. 4, pp. 293-306, Nov. 2002.
    • (2002) IEEE Trans. Syst., Man, Cybern. C, Appl. Rev , vol.32 , Issue.4 , pp. 293-306
    • Kumar, B.P.V.1    Venkataram, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.