Author:
Yoon Eun-Jun,Yoo Kee-Young
Publisher
Springer Berlin Heidelberg
Reference14 articles.
1. Botting, J.: Security on the Internet: Authenticating the User. Telecommunications 31(12), 77–80 (1997)
2. Halevi, S., Krawczyk, H.: Public Key Cryptography and Password Protocols. In: Proceedings of Fifth ACM Conference on Computer and Communications Security, pp. 122–131 (1998)
3. Jablon, D.P.: Strong Password Only Authenticated Key Exchange. Computer Communication Review 26(5), 5–26 (1996)
4. Lecture Notes in Computer Science;V. Boyko,2000
5. Horng, T.L.: Password Authentication Using Triangles and Straight Lines. Computers and Mathematics Applications 30(9), 63–71 (1995)