메뉴 건너뛰기




Volumn , Issue , 2008, Pages 603-608

EARS: Efficient Entity Authentication in Remote Systems

Author keywords

Authentication; Hash function; Password; Smart card

Indexed keywords

ENTITY AUTHENTICATION; HASH FUNCTIONS; PASSWORDS; REMOTE SYSTEMS;

EID: 44049089569     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ITNG.2008.139     Document Type: Conference Paper
Times cited : (1)

References (19)
  • 1
    • 0019634370 scopus 로고
    • Password Authentication with Insecure Communication
    • L. Lamport. Password Authentication with Insecure Communication. Communications of the ACM, 24(11), pp.770-772, 1981.
    • (1981) Communications of the ACM , vol.24 , Issue.11 , pp. 770-772
    • Lamport, L.1
  • 4
    • 0032137355 scopus 로고    scopus 로고
    • A Password Authentication Methods for Contents Communication on the Internet
    • A. Shimizu, T. Horioka and H. Inagaki. A Password Authentication Methods for Contents Communication on the Internet. IEICE Transactions on Communications, E81-B(8), pp.1666-1673, 1998.
    • (1998) IEICE Transactions on Communications , vol.E81-B , Issue.8 , pp. 1666-1673
    • Shimizu, A.1    Horioka, T.2    Inagaki, H.3
  • 5
    • 0033704170 scopus 로고    scopus 로고
    • Methods for Protecting Password Transmission
    • M. Peyravian and N. Zunic. Methods for Protecting Password Transmission. Computers & Security, 19(5), pp.466-469, 2000.
    • (2000) Computers & Security , vol.19 , Issue.5 , pp. 466-469
    • Peyravian, M.1    Zunic, N.2
  • 6
    • 0036556279 scopus 로고    scopus 로고
    • Improvement on Peyravian-Zunic's Password Authentication Schemes
    • J. J. Hwang and T. C. Yeh. Improvement on Peyravian-Zunic's Password Authentication Schemes. IEICE Transactions on Communications, E85-B(4), pp.823-825, 2002.
    • (2002) IEICE Transactions on Communications , vol.E85-B , Issue.4 , pp. 823-825
    • Hwang, J.J.1    Yeh, T.C.2
  • 9
    • 44049095283 scopus 로고    scopus 로고
    • Draft D12. Standard Specifications for Password-based Public Key Cryptographic Techniques. IEEE P1363 working group,
    • IEEE P1363.2
    • IEEE P1363.2 Draft D12. Standard Specifications for Password-based Public Key Cryptographic Techniques. IEEE P1363 working group, 2003.
    • (2003)
  • 10
    • 0028405583 scopus 로고
    • A Remote Password Authentication Scheme Based Upon ElGamal's Signature Scheme
    • C. C. Chang and W. Y. Liao. A Remote Password Authentication Scheme Based Upon ElGamal's Signature Scheme. Computers & Security, 13(2), pp.137-144, 1994.
    • (1994) Computers & Security , vol.13 , Issue.2 , pp. 137-144
    • Chang, C.C.1    Liao, W.Y.2
  • 12
    • 62949179479 scopus 로고    scopus 로고
    • RSA SecureID. Secure Identity. http://www.rsa.com/node.aspx?id=1156.
    • Secure Identity
  • 13
    • 0034140374 scopus 로고    scopus 로고
    • A new Remote User Authentication Scheme Using Smart Cards
    • M. S. Hwang and L. H. Li. A new Remote User Authentication Scheme Using Smart Cards. IEEE Transactions on Consumer Electronics, 46(1), pp.28-30, 2000.
    • (2000) IEEE Transactions on Consumer Electronics , vol.46 , Issue.1 , pp. 28-30
    • Hwang, M.S.1    Li, L.H.2
  • 14
    • 0142007144 scopus 로고    scopus 로고
    • A User Friendly Remote Authentication Scheme with Smart Cards
    • S T. Wu, B. C. Chieu. A User Friendly Remote Authentication Scheme with Smart Cards. Computers & Security, 22(6), pp.547-550, 2003.
    • (2003) Computers & Security , vol.22 , Issue.6 , pp. 547-550
    • Wu, S.T.1    Chieu, B.C.2
  • 15
    • 33744776672 scopus 로고    scopus 로고
    • M. L. Das, A. Saxena, V. P. Gulati and D. B. Phatak. A Novel Remote User Authentication Scheme using Bilinear Pairings. Computers & Security, 25(3), pp.184-189, 2006.
    • M. L. Das, A. Saxena, V. P. Gulati and D. B. Phatak. A Novel Remote User Authentication Scheme using Bilinear Pairings. Computers & Security, 25(3), pp.184-189, 2006.
  • 19
    • 84939573910 scopus 로고
    • Differential Power Analysis: Leaking Secrets
    • Proceedings of Advances in Cryptology-CRYPTO'99, Springer-Verlag, pp
    • P. C. Kocher, J. Jaffe and B. Jun. Differential Power Analysis: Leaking Secrets. In: Proceedings of Advances in Cryptology-CRYPTO'99, LNCS 1666, Springer-Verlag, pp.388-397, 1999.
    • (1666) LNCS , pp. 388-397
    • Kocher, P.C.1    Jaffe, J.2    Jun, B.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.