A remote password authentication scheme based on the digital signature method
From MaRDI portal
Publication:4240622
DOI10.1080/00207169908804781zbMATH Open0923.68049OpenAlexW2086324082WikidataQ114643079 ScholiaQ114643079MaRDI QIDQ4240622FDOQ4240622
Authors: Min-Shiang Hwang
Publication date: 29 April 1999
Published in: International Journal of Computer Mathematics (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1080/00207169908804781
Recommendations
Cites Work
- A method for obtaining digital signatures and public-key cryptosystems
- A public key cryptosystem and a signature scheme based on discrete logarithms
- New directions in cryptography
- Using encryption for authentication in large networks of computers
- Title not available (Why is that?)
- A “Paradoxical” Solution to The Signature Problem
- Title not available (Why is that?)
Cited In (14)
- A simple remote user authentication scheme
- Security analysis of three password authentication schemes
- A countable and time-bound password-based user authentication scheme for the applications of electronic commerce
- AN EFFICIENT PASSWORD AUTHENTICATION SCHEME BASED ON A UNIT CIRCLE
- A new key authentication scheme based on discrete logarithms
- A new remote user authentication scheme for multi-server architecture
- Information Security and Cryptology - ICISC 2005
- Analysis and extension of S/Key-based authentication schemes for digital home networks
- Cryptanalysis of a remote password authentication scheme
- Title not available (Why is that?)
- A new strong-password authentication scheme using one-way hash functions
- Password authentication based on fractal coding scheme
- Cryptography and Coding
- A new method for using hash functions to solve remote user authentication
This page was built for publication: A remote password authentication scheme based on the digital signature method
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4240622)