Author:
Shiuh-Jeng Wang,Jin-Fu Chang
Subject
Law,General Computer Science
Reference14 articles.
1. A user authentication system not requiring secrecy in the computer;Evans;Communications of the ACM,1974
2. Cryptographic authentication of time-invariant quantities;Lennon;IEEE Transactions on Communications, COM-29,1981
3. Remote password authenticated with smart cards;Chang,1991
4. Understanding the use of passwords;Menkus;Computers and Security,1988
5. Comment on remote password authentication with smart cards;Ghang,1992
Cited by
59 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献