Sciweavers

210 search results - page 4 / 42
» The Secure Remote Password Protocol
Sort
View
CN
2007
144views more  CN 2007»
14 years 9 months ago
SPP: An anti-phishing single password protocol
Most users have multiple accounts on the Internet where each account is protected by a password. To avoid the headache in remembering and managing a long list of different and un...
Mohamed G. Gouda, Alex X. Liu, Lok M. Leung, Moham...
INFORMATICALT
2007
109views more  INFORMATICALT 2007»
14 years 9 months ago
A Secure YS-Like User Authentication Scheme
Abstract. Recently, there are several articles proposed based on Yang and Shieh’s password authentication schemes (YS for short) with the following features: (1) A user can choos...
Tzungher Chen, Gwoboa Horng, Ke-Chiang Wu
81
Voted
FC
2007
Springer
117views Cryptology» more  FC 2007»
15 years 3 months ago
Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer
Keylogging and phishing attacks can extract user identity and sensitive account information for unauthorized access to users’ financial accounts. Most existing or proposed solut...
Mohammad Mannan, Paul C. van Oorschot
CCS
1998
ACM
15 years 1 months ago
Public-Key Cryptography and Password Protocols
Shai Halevi, Hugo Krawczyk
JCSS
2006
102views more  JCSS 2006»
14 years 9 months ago
Password-based authentication and key distribution protocols with perfect forward secrecy
In an open networking environment, a workstation usually needs to identify its legal users for providing its services. Kerberos provides an efficient approach whereby a trusted th...
Hung-Min Sun, Her-Tyan Yeh