A password authentication scheme over insecure networks
Top Cited Papers
- 1 June 2006
- journal article
- Published by Elsevier in Journal of Computer and System Sciences
- Vol. 72 (4), 727-740
- https://doi.org/10.1016/j.jcss.2005.10.001
Abstract
No abstract availableKeywords
This publication has 23 references indexed in Scilit:
- Cryptanalysis of an enhanced timestamp-based password authentication schemeComputers & Security, 2003
- Security enhancement for the timestamp-based password authentication scheme using smart cardsComputers & Security, 2003
- An Efficient and Practical Solution to Remote Authentication: Smart CardComputers & Security, 2002
- Password authentication schemes with smart cardsComputers & Security, 1999
- Cryptanalysis of a remote login authentication schemeComputer Communications, 1999
- “Paramita wisdom” password authentication scheme without verification tablesJournal of Systems and Software, 1998
- Biometrics, is it a viable proposition for identity authentication and access control?Computers & Security, 1995
- Identity authentication based on keystroke latenciesCommunications of the ACM, 1990
- A high security log-in procedureCommunications of the ACM, 1974
- A user authentication scheme not requiring secrecy in the computerCommunications of the ACM, 1974