메뉴 건너뛰기




Volumn 1, Issue , 2007, Pages 623-626

User's authentication in media services by using one-time password authentication scheme

Author keywords

[No Author keywords available]

Indexed keywords

COPYRIGHT PROTECTIONS; DIGITAL CONTENTS; EXPLOSIVE GROWTH; INFORMATION HIDING; INTERNATIONAL (CO); INTERNATIONAL CONFERENCES; MEDIA SERVICING; MULTIMEDIA SIGNAL PROCESSING; ONE TIME PASSWORD (OTP); PASSWORD AUTHENTICATION; SECURITY REQUIREMENTS; SERVICE SYSTEMS; SMART CARD;

EID: 47349094785     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IIH-MSP.2007.317     Document Type: Conference Paper
Times cited : (5)

References (16)
  • 1
    • 0027741529 scopus 로고
    • Augmented encrypted key exchange: A password-based protocol secure against dictionary attacks and password file compromise
    • S. M. Bellovin and M. Merritt, "Augmented encrypted key exchange: A password-based protocol secure against dictionary attacks and password file compromise", ACM Conf. Comp. & Comm. Security, pp.244-250, 1993.
    • (1993) ACM Conf. Comp. & Comm. Security , pp. 244-250
    • Bellovin, S.M.1    Merritt, M.2
  • 2
    • 0027615231 scopus 로고
    • Protecting poorly chosen secrets from guessing attacks
    • L. Gong, M. Lomas, R. Needham, and J. Saltzer, " Protecting poorly chosen secrets from guessing attacks", IEEE J. Sel. Areas Commun., vol.11, no.5, pp.648-656, 1993.
    • (1993) IEEE J. Sel. Areas Commun , vol.11 , Issue.5 , pp. 648-656
    • Gong, L.1    Lomas, M.2    Needham, R.3    Saltzer, J.4
  • 3
    • 0002839106 scopus 로고
    • Refinement and extension of encrypted key exchange
    • M. Steiner, G. Tsudik, and M. Waidner, "Refinement and extension of encrypted key exchange", ACM Operating Systems Review, vol.29, no.3, pp.22-30, 1995.
    • (1995) ACM Operating Systems Review , vol.29 , Issue.3 , pp. 22-30
    • Steiner, M.1    Tsudik, G.2    Waidner, M.3
  • 4
    • 0030261758 scopus 로고    scopus 로고
    • Strong password-only authenticated key exchange
    • D. Jablon, "Strong password-only authenticated key exchange," ACM Computer Communications Review, vol.20,no.5, pp.5-26, 1996.
    • (1996) ACM Computer Communications Review , vol.20 , Issue.5 , pp. 5-26
    • Jablon, D.1
  • 5
    • 0031381717 scopus 로고    scopus 로고
    • An adaptable and reliable authentication protocol for communication networks
    • T. Kwon, M. Kang, and J. Song, "An adaptable and reliable authentication protocol for communication networks", Proc. IEEE INFOCOM' 97, pp.737-744, 1997.
    • (1997) Proc. IEEE INFOCOM' 97 , pp. 737-744
    • Kwon, T.1    Kang, M.2    Song, J.3
  • 6
    • 0032640752 scopus 로고    scopus 로고
    • xy via password authentication
    • May
    • xy via password authentication," Electron. Lett., vol.35, no.11,pp.892-893, May 1999.
    • (1999) Electron. Lett , vol.35 , Issue.11 , pp. 892-893
    • Kwon, T.1    Song, J.2
  • 7
    • 0019634370 scopus 로고
    • Password authentication with insecure communications
    • L. Lamport, "Password authentication with insecure communications, " Commun. ACM, vol.24, no. 11, pp.770-772, 1981.
    • (1981) Commun. ACM , vol.24 , Issue.11 , pp. 770-772
    • Lamport, L.1
  • 8
    • 47349100384 scopus 로고    scopus 로고
    • A. Shimizu, A dynamic password authentication method by one-way function, IEICE Trans Commun., J73-D-I, no.7, pp.630-636, July 1990.
    • A. Shimizu, " A dynamic password authentication method by one-way function," IEICE Trans Commun., Vol.J73-D-I, no.7, pp.630-636, July 1990.
  • 10
    • 0032137355 scopus 로고    scopus 로고
    • A password authentication method for contents communication on the internet
    • Aug
    • A. Shimizu, T. Horioka, and H. Inagaki, "A password authentication method for contents communication on the internet," IEICE Trans.Commun., vol.E81-B, no.8, pp.1666-1673, Aug. 1998.
    • (1998) IEICE Trans.Commun , vol.E81-B , Issue.8 , pp. 1666-1673
    • Shimizu, A.1    Horioka, T.2    Inagaki, H.3
  • 11
    • 0034204951 scopus 로고    scopus 로고
    • Simple and secure password authentication protocol (SAS)
    • June
    • M. Sandirigama, A. Shimizu, and M.T. Noda, "Simple and secure password authentication protocol (SAS)," IEICE Trans. Commun., vol.E83-B, no.6, pp.1363-1365, June 2000.
    • (2000) IEICE Trans. Commun , vol.E83-B , Issue.6 , pp. 1363-1365
    • Sandirigama, M.1    Shimizu, A.2    Noda, M.T.3
  • 12
    • 0035445093 scopus 로고    scopus 로고
    • Attacks and solutions on strong-password authentication
    • Step
    • C.L. Lin, H.M. Sun, and T. Hwang, "Attacks and solutions on strong-password authentication", IEICE Trans. Commun., vol.E84-B, no.9, pp.2622-2627, Step. 2001.
    • (2001) IEICE Trans. Commun , vol.E84-B , Issue.9 , pp. 2622-2627
    • Lin, C.L.1    Sun, H.M.2    Hwang, T.3
  • 13
    • 23444434098 scopus 로고    scopus 로고
    • Security enhancement for optimal strong password authentication protocol
    • April
    • C.W. Lin, J. J. Shen, and M. S. Hwang, "Security enhancement for optimal strong password authentication protocol," ACM Operating Systems Review, vol. 37, no. 2, pp. 7-12, April 2003.
    • (2003) ACM Operating Systems Review , vol.37 , Issue.2 , pp. 7-12
    • Lin, C.W.1    Shen, J.J.2    Hwang, M.S.3
  • 14
    • 33744725812 scopus 로고    scopus 로고
    • A hash-based strong-password authentication scheme without using smart card
    • Jan
    • W. C., Ku, "A hash-based strong-password authentication scheme without using smart card" ACM Operating Systems Review, vol. 38, no. 1, pp. 29-34, Jan. 2004.
    • (2004) ACM Operating Systems Review , vol.38 , Issue.1 , pp. 29-34
    • Ku, W.C.1
  • 15
    • 15244362289 scopus 로고    scopus 로고
    • Password-only authenticated key establishment protocol without public key cryptography
    • Feb
    • C.S. Laih, L. Ding and Y.M. Huang, "Password-only authenticated key establishment protocol without public key cryptography," Electronics Letters, Vol. 41, No. 4, pages 185-186, Feb. 2005.
    • (2005) Electronics Letters , vol.41 , Issue.4 , pp. 185-186
    • Laih, C.S.1    Ding, L.2    Huang, Y.M.3
  • 16
    • 47349089305 scopus 로고    scopus 로고
    • Richard E. Smith, The Strong Password Dilemma, published in CSI Computer Security Journal, 2002.
    • Richard E. Smith, "The Strong Password Dilemma," published in CSI Computer Security Journal, 2002.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.