Author:
Peyravian Mohammad,Zunic Nevenko
Subject
Law,General Computer Science
Reference5 articles.
1. Halevi, S. Krawczyk, H., “Public key cryptography and password protocols”, Proceedings of 5th ACM Conference on Computer and Communications Security, pages 122-131, 1998.
2. Botting, J., “Security on the Internet: Authenticating the User”, Telecommunications, Vol. 31, No.12, pages 77-80, December 1997.
3. Schneier, B., Applied Cryptography, 2nd edition, John Wiley & Sons Inc, 1996.
4. Jablon, D.P., “Strong Password Only Authenticated Key Exchange”, Computer Communication Review, Vol. 26, No. 5, Pages 5-26, October 1996.
5. Horng, T.L., “Password Authentication Using Triangles and Straight Lines”, Computers and Mathematics Applications, Vol. 30, No. 9, pages 63-71, November 1995.
Cited by
68 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献