Author:
Farooq Sameer,Chawla Priyanka
Publisher
Springer Nature Singapore
Reference41 articles.
1. L. Lamport, Password authentication with insecure communication. Commun. ACM 24(11), 770–772 (1981)
2. C.J. Mitchell, I. Chen, Comments on the S/KEY user authentication scheme. ACM SIGOPS Oper. Syst. Rev. 30(4), 12–16 (1996)
3. C.M. Chen, W.C. Ku, Stolen-verifier attack on two new strong-password authentication protocol. IEICE Trans. Commun. E85-B(11), 2519–2521 (2002)
4. T. Hwang, Y. Chen, C.S. Laih, Non-interactive password authentications without password tables, in Proceedings of IEEE Region 10 Conference on Computer and Communication Systems (1990), pp. 429–431
5. M.S. Hwang, L.H. Li, A new remote user authentication scheme using smart cards. IEEE Trans. Consum. Electron. 46(1), 28–30 (2000)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献