Sciweavers

920 search results - page 30 / 184
» Selecting Secure Passwords
Sort
View
CN
2007
97views more  CN 2007»
15 years 5 months ago
Security enhancement of an IC-card-based remote login mechanism
Wang et al. presented a remote password authentication scheme using IC (Integrated Circuit) cards in 2004. Unfortunately, we discovered that their scheme is unable to withstand th...
Ting-Fang Cheng, Jung-San Lee, Chin-Chen Chang
SIGUCCS
2003
ACM
15 years 10 months ago
Regaining single sign-on taming the beast
It has been our effort at Ringling school to provide our campus community with the capability to uniformly access resources across multiple platforms. Empowering the user with a s...
Divyangi Anchan, Mahmoud Pegah
GLOBECOM
2007
IEEE
15 years 11 months ago
An Improved Dynamic User Authentication Scheme for Wireless Sensor Networks
—Over the last few years, many researchers have paid a lot of attention to the user authentication problem. However, to date, there has been relatively little research suited for...
Huei-Ru Tseng, Rong-Hong Jan, Wuu Yang
TCC
2005
Springer
139views Cryptology» more  TCC 2005»
15 years 11 months ago
The Relationship Between Password-Authenticated Key Exchange and Other Cryptographic Primitives
Abstract. We consider the problem of password-authenticated key exchange (PAK) also known as session-key generation using passwords: constructing session-key generation protocols t...
Minh-Huyen Nguyen
ASIACRYPT
2000
Springer
15 years 9 months ago
Password-Authenticated Key Exchange Based on RSA
Abstract. There have been many proposals in recent years for passwordauthenticated key exchange protocols. Many of these have been shown to be insecure, and the only ones that seem...
Philip D. MacKenzie, Sarvar Patel, Ram Swaminathan