• 沒有找到結果。

[PDF] Top 20 Password Authentication Schemes with Multi-Servers

Has 10000 "Password Authentication Schemes with Multi-Servers" found on our website. Below are the top 20 most common "Password Authentication Schemes with Multi-Servers".

Password Authentication Schemes with Multi-Servers

Password Authentication Schemes with Multi-Servers

... Abstract Password authentication is an essential ap- proach for users to access a ...many password authentication schemes ...many schemes suffer from security risks such as ... See full document

8

Password authentication schemes with smart cards

Password authentication schemes with smart cards

... In this paper, two practical password authentication schemes are proposed which are based on the con- cepts of ID-based schemes and the smart cards.These schemes [r] ... See full document

7

Security Analysis of Two SAS-Like Password Authentication Schemes

Security Analysis of Two SAS-Like Password Authentication Schemes

... stored in U i ’ s s ma r t c a r d a nd S are inconsis- tent, U i ’ s s uc c e e di ng l ogi n r e que s t us i ng N will be denied. Alternatively, the adversary can fool U i ’ s s ma r t c a r d i nt o c ha ngi ng N ... See full document

6

A Common Weakness of Password Authentication Schemes Requiring Synchronous Update of Stored Data

A Common Weakness of Password Authentication Schemes Requiring Synchronous Update of Stored Data

... one-time password authentication scheme, the Robust and Simple authentication protocol (ROSI), which assumes the use of a smart ...memorized password and store a strong secret key in his smart ... See full document

4

Authentication Schemes with No Verification Table

Authentication Schemes with No Verification Table

... In 2003, Lin and Hwang indicated that Hwang and Yeh?s scheme suffers from the denial-of- service attack and proposed a password authentication scheme with secure password updating.. How[r] ... See full document

1

Advanced Smart Card Based Password Authentication with User Anonymity

Advanced Smart Card Based Password Authentication with User Anonymity

... card, password, mobile communication, user anonymity 1. Introduction Password based authentication has been the essential security mechanism for the remote access control ...a password ... See full document

1

Dynamic Password Authentication Scheme for Multi-server Environments 王興翰、曹偉駿

Dynamic Password Authentication Scheme for Multi-server Environments 王興翰、曹偉駿

... security schemes have been developed and applied in various environments, in order to effectively ensure that the information can be securely transmitted via the network ...these schemes must satisfy at ... See full document

2

A Password Authentication Scheme for Multi-serverin Vehicular Ad Hoc Networks 王常力、曹偉駿

A Password Authentication Scheme for Multi-serverin Vehicular Ad Hoc Networks 王常力、曹偉駿

... Identity-based encryption from the weil pairing. Lecture Notes in Computer Science, 2139 , 213-229. Boneh, D., Lynn, B., & Shacham, H. (2001). Short signatures from the Weil pairing. Lecture Notes in Computer Science, ... See full document

2

Weaknesses of a Multi-Server Password Authenticated Weaknesses of a Multi-Server Password Authenticated

Weaknesses of a Multi-Server Password Authenticated Weaknesses of a Multi-Server Password Authenticated

... verifier-free password authentication scheme for the multi-server architecture by using neural ...register with each ...verifier-free password au- thentication scheme using smart cards ... See full document

5

Security Weaknesses of Two Dynamic ID-based User Authentication and Key Agreement Schemes for Multi-server Environment

Security Weaknesses of Two Dynamic ID-based User Authentication and Key Agreement Schemes for Multi-server Environment

... user authentication scheme for multi-server environment provides mutual authentication and session key establishment between users and multiple ...thentication schemes for multi-server ... See full document

8

Self-certified multi-proxy signature schemes with message recovery

Self-certified multi-proxy signature schemes with message recovery

... Abstract: Multi-proxy signature schemes allow the original signer to delegate his/her signing power to n proxy signers such that all proxy signers must corporately generate a valid proxy signature on behalf ... See full document

11

Time-bound Based Authentication Scheme for Multi-server Architecture

Time-bound Based Authentication Scheme for Multi-server Architecture

... schemes are designed for single-server environments, users who access different remote servers need to register many times and passwords. To solve this problem, we propose a more effic[r] ... See full document

1

On the (2,2) Visual Multi-Secret Sharing Schemes

On the (2,2) Visual Multi-Secret Sharing Schemes

... The authentication and identification using VSS scheme were studied in [13] and ...Visual Multi-Secret Sharing (VMSS) ...secret with the same qualified subset of shadows in VMSS while VSS can hide ... See full document

8

Designing Parallel Loop Self-Scheduling Schemes by the Hybrid MPI and OpenMP Model for Grid Systems with Multi-Core Computational Nodes

Designing Parallel Loop Self-Scheduling Schemes by the Hybrid MPI and OpenMP Model for Grid Systems with Multi-Core Computational Nodes

... computers, servers, ...system with multicore computers, none of them aimed at the design of parallel loop ...work with the average speedup of ... See full document

6

An improvement of the Yang-Shieh password authentication schemes

An improvement of the Yang-Shieh password authentication schemes

... two password authentication schemes by employing smart ...timestamp-based password authentication scheme and the other is a nonce-based password authentication ... See full document

6

REMOTE PASSWORD AUTHENTICATION WITH SMART CARDS

REMOTE PASSWORD AUTHENTICATION WITH SMART CARDS

... A signature scheme and communication timestamps are provided in the authentication phase against the potential attacks of replaying a previously intercepted login request[r] ... See full document

4

Graphical Password Authentication Scheme-Screen Drag and Drop

Graphical Password Authentication Scheme-Screen Drag and Drop

... 近來使用者登入認證系統的安全性日益重 要,舉凡繳稅、銀行轉帳、線上刷卡、股票交 易等,都是在登入後授權使用。 傳統登入方式,使用者偏向由字彙所組成 的通行碼(Password),而且登入環境可能會有木 馬程式或攝影機側錄,針對傳統文字通行碼認 證的缺點:安全性強度不足、容易遭受字典攻 擊(Dictionary Attack),且無法抵擋肩窺、側錄攻 擊,使得整體安全性大為降低;現今有許多專 ... See full document

12

Cryptanalysis of a New Password Authentication Scheme Using Hash Functions

Cryptanalysis of a New Password Authentication Scheme Using Hash Functions

... Department of Computer Science and Information Engineering Fu Jen Catholic University Email: figo@wcku1.csie.fju.edu.tw Abstract -In 2000, Peyravian and Zunic proposed an efficient hash-based password ... See full document

4

A NEW PASSWORD AUTHENTICATION SCHEME RESISTANT AGAINST SHOULDER SURFING ATTACK

A NEW PASSWORD AUTHENTICATION SCHEME RESISTANT AGAINST SHOULDER SURFING ATTACK

... textual password authentication, infor- mation ...user authentication that is commonly used to protect user information through online information systems such as ...textual password ... See full document

11

Remote scheme for password authentication based on theory of quadratic residues

Remote scheme for password authentication based on theory of quadratic residues

... The proposed scheme uses the concept of a prob- abilistic password to enforce the security of the remote access request. The scheme is useful for authentication [r] ... See full document

7

Show all 10000 documents...