Password authentications using triangles and straight lines
โ Scribed by Horng-Twu Liaw
- Publisher
- Elsevier Science
- Year
- 1995
- Tongue
- English
- Weight
- 500 KB
- Volume
- 30
- Category
- Article
- ISSN
- 0898-1221
No coin nor oath required. For personal study only.
โฆ Synopsis
In this paper, two password authentication schemes, based on triangle and straight line encoding, respectively, are proposed. In our schemes, a one-way function and a strong cryptographic operation such as DES (data encryption standard) are adopted. Besides, in each scheme, the system only needs to store a secret key pair, and each user can select his own password freely. Instead of storing a password verification table inside the computer system, both methods proposed only have to store a corresponding table of identities, which is used by the computer system for validating the submitted passwords. Owing to these two schemes quickly and efficiently responding to any log-in attempt, they are suitable for real-time applications. Furthermore, in each scheme, the system does not need to reconstruct any term of the existing key table when a new user is inserted into the system. Thus, these two schemes are suitable for practical implementation.
๐ SIMILAR VOLUMES
Pyrolysis mass spectrometry (PyMS) was used to produce biochemical fingerprints from replicate frozen cell cultures of mouse macrophage hybridoma 2C11-12, human leukaemia K562, baby hamster kidney BHK 21/C13, and mouse tumour BW-O, and a fresh culture of Chinese hamster ovary CHO cells. The dimensio
A model-based method for indoor mobile robot localization is presented herein; this method relies on monocular vision and uses straight-line correspondences. A classical four-step approach has been adopted (i.e. image acquisition, image feature extraction, image and model feature matching, and camer