Authenticating public terminals
- 1 April 1999
- journal article
- Published by Elsevier in Computer Networks
- Vol. 31 (8), 861-870
- https://doi.org/10.1016/s1389-1286(98)00020-6
Abstract
No abstract availableKeywords
This publication has 15 references indexed in Scilit:
- Distance-Bounding ProtocolsPublished by Springer Nature ,2001
- Human Identification Through Insecure ChannelPublished by Springer Nature ,2001
- Soft Tempest: Hidden Data Transmission Using Electromagnetic EmanationsLecture Notes in Computer Science, 1998
- Human-computer cryptographyPublished by Association for Computing Machinery (ACM) ,1996
- The S/KEY One-Time Password SystemPublished by RFC Editor ,1995
- Authentication of mobile usersIEEE Network, 1994
- Authentication and delegation with smart-cardsScience of Computer Programming, 1993
- The Kerberos Network Authentication Service (V5)Published by RFC Editor ,1993
- Systematic design of a family of attack-resistant authentication protocolsIEEE Journal on Selected Areas in Communications, 1993
- Why cryptosystems failPublished by Association for Computing Machinery (ACM) ,1993