Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Chang, CC | en_US |
dc.contributor.author | Tsu, SM | en_US |
dc.contributor.author | Chen, CY | en_US |
dc.date.accessioned | 2014-12-08T15:03:02Z | - |
dc.date.available | 2014-12-08T15:03:02Z | - |
dc.date.issued | 1995-12-01 | en_US |
dc.identifier.issn | 0140-3664 | en_US |
dc.identifier.uri | http://hdl.handle.net/11536/1622 | - |
dc.description.abstract | We propose a remote password authentication scheme based on quadratic residues. In our schemer any legal user can freely choose his own password in the card initialization phase. Using his password and smart card which contains identity and other information, he can then log into the system successfully. According to our analysis, intruders cannot obtain any secret information from the public information, or derive any password from intercepted messages. In addition, our scheme can withstand the attack of replaying previously intercepted log-in requests. | en_US |
dc.language.iso | en_US | en_US |
dc.subject | remote password authentication | en_US |
dc.subject | quadratic residues | en_US |
dc.subject | login request | en_US |
dc.subject | time stamp | en_US |
dc.subject | smart card | en_US |
dc.title | Remote scheme for password authentication based on theory of quadratic residues | en_US |
dc.type | Article | en_US |
dc.identifier.journal | COMPUTER COMMUNICATIONS | en_US |
dc.citation.volume | 18 | en_US |
dc.citation.issue | 12 | en_US |
dc.citation.spage | 936 | en_US |
dc.citation.epage | 942 | en_US |
dc.contributor.department | 資訊工程學系 | zh_TW |
dc.contributor.department | Department of Computer Science | en_US |
dc.identifier.wosnumber | WOS:A1995TW81100008 | - |
dc.citation.woscount | 9 | - |
Appears in Collections: | Articles |
Files in This Item:
If it is a zip file, please download the file and unzip it, then open index.html in a browser to view the full text content.