메뉴 건너뛰기




Volumn , Issue , 2006, Pages 31-36

Johnny can obfuscate; beyond mother's maiden name

Author keywords

[No Author keywords available]

Indexed keywords

BASEBALL;

EID: 70450252840     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (10)

References (18)
  • 3
    • 84990731886 scopus 로고
    • How to prove yourself: Practical solutions to identification and signature problems
    • Fiat, A., and Shamir, A. How to prove yourself: Practical solutions to identification and signature problems. In CRYPTO (1986), pp. 186-194.
    • (1986) CRYPTO , pp. 186-194
    • Fiat, A.1    Shamir, A.2
  • 4
    • 0021481768 scopus 로고
    • Pass-algorithms: A user validation scheme based on knowledge of secret algorithms
    • Haskett, J. A. Pass-algorithms: A user validation scheme based on knowledge of secret algorithms. Communications of the ACM 8, 27 (1984), 777-781.
    • (1984) Communications of the ACM , vol.8 , Issue.27 , pp. 777-781
    • Haskett, J. A.1
  • 5
    • 34547336952 scopus 로고
    • Computers and privacy: A survey
    • Hoffman, L. J. Computers and privacy: A survey. ACM Comput. Surv. 1, 2 (1969), 85-103.
    • (1969) ACM Comput. Surv , vol.1 , Issue.2 , pp. 85-103
    • Hoffman, L. J.1
  • 8
    • 33751034055 scopus 로고    scopus 로고
    • Secure human-computer identification (interface) systems against peeping attacks: Sechci
    • Report 2005/268
    • Li, S., and Shum, H.-Y. Secure human-computer identification (interface) systems against peeping attacks: Sechci. Cryptology ePrint Archive, Report 2005/268, 2005. http://eprint.iacr.org/.
    • (2005) Cryptology ePrint Archive
    • Li, S.1    Shum, H.-Y.2
  • 9
    • 0042044284 scopus 로고    scopus 로고
    • Practical human-machine identification over insecure channels
    • Li, X.-Y., and Teng, S.-H. Practical human-machine identification over insecure channels. J. Comb. Optim. 3, 4 (1999), 347-361.
    • (1999) J. Comb. Optim , vol.3 , Issue.4 , pp. 347-361
    • Li, X.-Y.1    Teng, S.-H.2
  • 10
    • 84909753781 scopus 로고
    • Logical authentication method
    • Lipton, D. Logical authentication method. SIGSAC Rev. 4, 2 (1986), 9-20.
    • (1986) SIGSAC Rev , vol.4 , Issue.2 , pp. 9-20
    • Lipton, D.1
  • 12
    • 84995399871 scopus 로고
    • Human identification through insecure channel
    • Matsumoto, T., and Imai, H. Human identification through insecure channel. In EUROCRYPT (1991), pp. 409-421.
    • (1991) EUROCRYPT , pp. 409-421
    • Matsumoto, T.1    Imai, H.2
  • 13
    • 84976815513 scopus 로고
    • Security considerations in a multiprogrammed computer system
    • (Washington, D.C), Thompson Book Co
    • Peters, B. Security considerations in a multiprogrammed computer system. In Proc. AFIPS 1967 Spring Joint Comput. Conf. (Washington, D.C., 1967), Thompson Book Co.
    • (1967) Proc. AFIPS 1967 Spring Joint Comput. Conf
    • Peters, B.1
  • 18
    • 84957372142 scopus 로고
    • On the matsumoto and imai's human identification scheme
    • Wang, C.-H., Hwang, T., and Tsai, J.-J. On the matsumoto and imai's human identification scheme. In EUROCRYPT (1995), pp. 382-392.
    • (1995) EUROCRYPT , pp. 382-392
    • Wang, C.-H.1    Hwang, T.2    Tsai, J.-J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.