Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Yang, WH | en_US |
dc.contributor.author | Shieh, SP | en_US |
dc.date.accessioned | 2014-12-08T15:47:07Z | - |
dc.date.available | 2014-12-08T15:47:07Z | - |
dc.date.issued | 1999 | en_US |
dc.identifier.issn | 0167-4048 | en_US |
dc.identifier.uri | http://hdl.handle.net/11536/31624 | - |
dc.identifier.uri | http://dx.doi.org/10.1016/S0167-4048(99)80136-9 | en_US |
dc.description.abstract | In this paper, two password authentication schemes with smart cards are proposed. In the schemes, users can change their pass-words freely, and the remote system does nor need the directory of passwords or verification tables to authenticate users. Once the secure network environment is see up, authentication can be handled solely by the two parries involved. For a network without synchronized clocks, the proposed nonce-based authentication scheme is able to prevent malicious reply attacks. | en_US |
dc.language.iso | en_US | en_US |
dc.subject | password authentication | en_US |
dc.subject | smart card | en_US |
dc.subject | ID-based scheme | en_US |
dc.subject | clock synchronization | en_US |
dc.title | Password authentication schemes with smart cards | en_US |
dc.type | Article | en_US |
dc.identifier.doi | 10.1016/S0167-4048(99)80136-9 | en_US |
dc.identifier.journal | COMPUTERS & SECURITY | en_US |
dc.citation.volume | 18 | en_US |
dc.citation.issue | 8 | en_US |
dc.citation.spage | 727 | en_US |
dc.citation.epage | 733 | en_US |
dc.contributor.department | 資訊工程學系 | zh_TW |
dc.contributor.department | Department of Computer Science | en_US |
dc.identifier.wosnumber | WOS:000084523400021 | - |
dc.citation.woscount | 145 | - |
Appears in Collections: | Articles |
Files in This Item:
If it is a zip file, please download the file and unzip it, then open index.html in a browser to view the full text content.