Password authentication schemes with smart cards
- 31 December 1999
- journal article
- Published by Elsevier in Computers & Security
- Vol. 18 (8), 727-733
- https://doi.org/10.1016/s0167-4048(99)80136-9
Abstract
No abstract availableKeywords
This publication has 16 references indexed in Scilit:
- Using smart cards to authenticate remote passwordsComputers & Mathematics with Applications, 1993
- A note on the use of timestamps as noncesACM SIGOPS Operating Systems Review, 1993
- A nonce-based protocol for multiple authenticationsACM SIGOPS Operating Systems Review, 1992
- A security risk of depending on synchronized clocksACM SIGOPS Operating Systems Review, 1992
- Identity-based information security management system for personal computer networksIEEE Journal on Selected Areas in Communications, 1989
- Efficient and timely mutual authenticationACM SIGOPS Operating Systems Review, 1987
- A public key cryptosystem and a signature scheme based on discrete logarithmsIEEE Transactions on Information Theory, 1985
- Timestamps in key distribution protocolsCommunications of the ACM, 1981
- Cryptographic Authentication of Time-Invariant QuantitiesIEEE Transactions on Communications, 1981
- A user authentication scheme not requiring secrecy in the computerCommunications of the ACM, 1974