Sciweavers

10 search results - page 1 / 2
» An attack on MySQL's login protocol
Sort
View
CORR
2010
Springer
56views Education» more  CORR 2010»
13 years 5 months ago
An attack on MySQL's login protocol
The MySQL challenge
Ivan Arce, Emiliano Kargieman, Gerardo Richarte, C...
COMPSEC
2006
98views more  COMPSEC 2006»
13 years 5 months ago
A Secure Identification and Key agreement protocol with user Anonymity (SIKA)
Anonymity is a desirable security feature in addition to providing user identification and key agreement during a user's login process. Recently, Yang et al., proposed an eff...
Kumar V. Mangipudi, Rajendra S. Katti
ITCC
2005
IEEE
13 years 11 months ago
CompChall: Addressing Password Guessing Attacks
Even though passwords are the most convenient means of authentication, they bring along themselves the threat of dictionary attacks. Dictionary attacks may be of two kinds: online...
Vipul Goyal, Virendra Kumar, Mayank Singh, Ajith A...
IEEEIAS
2009
IEEE
13 years 3 months ago
An Improved Scheme of Single Sign-on Protocol
In order to avoid security threats caused by password attack and replay attack in single sign-on protocal, the most methods on sovling these issues are making use of complicated te...
Yang Jian
CN
2007
144views more  CN 2007»
13 years 5 months ago
SPP: An anti-phishing single password protocol
Most users have multiple accounts on the Internet where each account is protected by a password. To avoid the headache in remembering and managing a long list of different and un...
Mohamed G. Gouda, Alex X. Liu, Lok M. Leung, Moham...