完整後設資料紀錄
DC 欄位 | 值 | 語言 |
---|---|---|
dc.contributor.author | Hwang, JJ | en_US |
dc.contributor.author | Yeh, TC | en_US |
dc.date.accessioned | 2014-12-08T15:42:31Z | - |
dc.date.available | 2014-12-08T15:42:31Z | - |
dc.date.issued | 2002-04-01 | en_US |
dc.identifier.issn | 0916-8516 | en_US |
dc.identifier.uri | http://hdl.handle.net/11536/28873 | - |
dc.description.abstract | Peyravian and Zunic (2000) presented two schemes for protecting password transmission and password change respectively. Like the traditional authentication scheme using passwords, the two new schemes are also vulnerable to attacks like guessing attacks, server spooling, and server data eavesdropping, This paper will give demonstrations on what have caused to these drawbacks, and more of that, two improved schemes are also proposed which are free from worries of those possible attacks. | en_US |
dc.language.iso | en_US | en_US |
dc.subject | authentication | en_US |
dc.subject | password | en_US |
dc.subject | security | en_US |
dc.title | Improvement on Peyravian-Zunic's password authentication schemes | en_US |
dc.type | Letter | en_US |
dc.identifier.journal | IEICE TRANSACTIONS ON COMMUNICATIONS | en_US |
dc.citation.volume | E85B | en_US |
dc.citation.issue | 4 | en_US |
dc.citation.spage | 823 | en_US |
dc.citation.epage | 825 | en_US |
dc.contributor.department | 資訊管理與財務金融系 註:原資管所+財金所 | zh_TW |
dc.contributor.department | Department of Information Management and Finance | en_US |
dc.identifier.wosnumber | WOS:000175083600012 | - |
dc.citation.woscount | 39 | - |
顯示於類別: | 期刊論文 |