## Recently, Hwang and Yeh proposed an improvement on the Peyravian-Zunic password scheme. The Hwang-Yeh scheme comprises a password authentication protocol, a password change protocol, and can also provide key distribution. Though the Hwang-Yeh scheme repaired several security problems of the Peyra
โฆ LIBER โฆ
Password authentication without using a password table
โ Scribed by Horng Gwoboa
- Book ID
- 107766260
- Publisher
- Elsevier Science
- Year
- 1995
- Tongue
- English
- Weight
- 328 KB
- Volume
- 55
- Category
- Article
- ISSN
- 0020-0190
No coin nor oath required. For personal study only.
๐ SIMILAR VOLUMES
A password authentication scheme with se
โ
Chun-Li Lin; Tzonelih Hwang
๐
Article
๐
2003
๐
Elsevier Science
๐
English
โ 109 KB
Password authentication using Newton's i
โ
C.H. Lin; C.C. Chang; T.C. Wu; R.C.T. Lee
๐
Article
๐
1991
๐
Elsevier Science
๐
English
โ 532 KB
nPAKE+: A Tree-Based Group Password-Auth
โ
Zhiguo Wan; Robert H. Deng; Feng Bao; Bart Preneel; Ming Gu
๐
Article
๐
2009
๐
Springer
๐
English
โ 719 KB
Using smart cards to authenticate remote
โ
C.-C. Chang; S.-J. Hwang
๐
Article
๐
1993
๐
Elsevier Science
๐
English
โ 725 KB
Password authentications using triangles
โ
Horng-Twu Liaw
๐
Article
๐
1995
๐
Elsevier Science
๐
English
โ 500 KB
In this paper, two password authentication schemes, based on triangle and straight line encoding, respectively, are proposed. In our schemes, a one-way function and a strong cryptographic operation such as DES (data encryption standard) are adopted. Besides, in each scheme, the system only needs to
Cryptanalysis of a password authenticati
โ
Chin-Chen Chang; Tzong-Chen Wu; Chi-Sung Laih
๐
Article
๐
1995
๐
Elsevier Science
๐
English
โ 258 KB