Password authentication without using a password table
From MaRDI portal
Publication:672653
DOI10.1016/0020-0190(95)00087-SzbMATH Open0875.68391OpenAlexW2036712742WikidataQ114685331 ScholiaQ114685331MaRDI QIDQ672653FDOQ672653
Authors: Gwoboa Horng
Publication date: 28 February 1997
Published in: Information Processing Letters (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/0020-0190(95)00087-s
Recommendations
Lagrange interpolating polynomialOne-way functionPassword authenticationPassword tableSecurity in digital systemsTrapdoor one-way function
Cites Work
Cited In (10)
- Authentication schemes with no verification table
- Multifactor authentication as a protection mechanism in computer networks
- Password authentication using public-key cryptography
- A simple remote user authentication scheme
- A countable and time-bound password-based user authentication scheme for the applications of electronic commerce
- AN EFFICIENT PASSWORD AUTHENTICATION SCHEME BASED ON A UNIT CIRCLE
- A novel ECC-based provably secure and privacy-preserving multi-factor authentication protocol for cloud computing
- KBID: Kerberos bracelet identification (short paper)
- Title not available (Why is that?)
- Password authentication based on fractal coding scheme
This page was built for publication: Password authentication without using a password table
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q672653)