Sciweavers

103 search results - page 2 / 21
» A password authentication scheme over insecure networks
Sort
View
SWS
2006
ACM
14 years 9 hour ago
Single sign-on for java web start applications using myproxy
Single sign-on is critical for the usability of distributed systems. While there are several authentication mechanisms which support single sign-on (e.g. Kerberos and X.509), it m...
Terry Fleury, Jim Basney, Von Welch
SP
1997
IEEE
139views Security Privacy» more  SP 1997»
13 years 9 months ago
Number Theoretic Attacks on Secure Password Schemes
Encrypted Key Exchange (EKE) [1, 2] allows two parties sharing a password to exchange authenticated information over an insecure network by using a combination of public and secre...
Sarvar Patel
COMPSEC
2000
117views more  COMPSEC 2000»
13 years 5 months ago
Methods for Protecting Password Transmission
Peyravian and Zunic (2000) proposed a password transmission scheme and a password change scheme over an insecure network. Their proposed solutions do not require the use of any sym...
Mohammad Peyravian, Nevenko Zunic
INFORMATICALT
2010
126views more  INFORMATICALT 2010»
13 years 3 months ago
An Entire Chaos-Based Biometric Remote User Authentication Scheme on Tokens Without Using Password
This paper presents an entire chaos-based biometric remote user authentication scheme on tokens without using passwords. The proposed scheme is based on the chaotic hash function a...
Eun-Jun Yoon, Kee-Young Yoo
IEEECIT
2010
IEEE
13 years 4 months ago
Enabling Use of Single Password over Multiple Servers in Two-Server Model
—The two-server model is quite promising for password based authentication, well suited for the setting of federated enterprises. However, none of the existing two-server passwor...
Yanjiang Yang, Feng Bao