搜索结果: 1-12 共查到“军队指挥学 Password Authentication”相关记录12条 . 查询时间(0.063 秒)
User Study on Single Password Authentication
Password authentication usability two-factor authentication
2018/11/6
Single password authentication (SPA) schemes are introduced to overcome the challenges of traditional password authentications, which are vulnerable to offline dictionary, phishing, honeypot, and man-...
Offline Dictionary Attack on Password Authentication Schemes using Smart Cards
two-factor authentication schemes security-critical applications
2016/1/25
The design of secure and efficient smart-card-based password
authentication schemes remains a challenging problem today despite two
decades of intensive research in the security community, and the c...
Weaknesses of Password Authentication Scheme Based on Geometric Hashing
cryptographic protocols authentication schemes
2016/1/23
We show that a recently proposed password authentication scheme based on geometric hashing has several security weaknesses, and that the use of this scheme should be avoided in practice.
An Optimal Strong Password Authentication Protocol with USB Sticks
Strong Password Authentication Protocol USB Sticks
2016/1/23
Authentication is the process for identify the user authorized or not. The identity contains mainly the username and passwords for verifying the two entities. The authentication information’s are stor...
Secure modular password authentication for the web using channel bindings
password authentication Transport Layer Security channel binding
2016/1/7
Secure protocols for password-based user authentication are well-studied in the cryptographic
literature but have failed to see wide-spread adoption on the Internet; most proposals to date
require e...
Single Password Authentication
Password-based authenticatio dictionary attacks malware honeypots privacy mobile
2013/4/18
Users frequently reuse their passwords when authenticating to various online services. Combined with the use of weak passwords or honeypot/phishing attacks, this brings high risks to the security of t...
Comments on a password authentication and update scheme based on elliptic curve cryptography
Password authentication, Elliptic curve cryptography offline password guessing attack stolen-verifier attack and privileged insider attack
2012/3/27
The security of a password authentication and update scheme based on elliptic curve cryptography proposed by Islam et al. [S.K. Hafizul Islam, G.P. Biswas, Design of improved password authentication a...
A Privacy-Flexible Password Authentication Scheme for Multi-Server Environment
password authentication impersonation attack user privacy protection Kerberos password guessing attack smart card lost attack
2010/7/14
Since Kerberos suffers from KDC (Key Distribution Center) compromise and impersonation attack, a multi-server password authentication protocol which highlights no verification table in the server end ...
On the Security Vulnerabilities of a Hash Based Strong Password Authentication Scheme
Login server access system
2009/12/29
User authentication is an essential task for network security. To serve this purpose,in the past years, several strong password
authentication schemes have been proposed, but none of them probably wi...
Yet another attack on a password authentication scheme based on quadratic residues with parameters unknown
cryptanalysis authentication password
2009/3/23
In 1988, Harn, Laih and Huang proposed a password authentication scheme based on
quadratic residues. However, in 1995, Chang, Wu and Laih pointed out that if the parameters
a ,b ,d and l are known b...
Cryptanalysis of a timestamp-based password authentication scheme
Cryptanalysis authentication cryptography
2009/3/23
Recently, J.-J. Shen, C.-W. Lin and M.-S. Hwang (Computers & Security, Vol 22, No
7, pp 591-595, 2003) proposed a modified Yang-Shieh scheme to enhance security.
They claimed that their modified sch...
Cryptanalysis of the Yang -Wang’s password authentication schemes
password authentication scheme smart card forgery attack
2009/3/19
In 1999, Yang and shieh proposed two password authentication schemes using
smart cards. But in 2003, Sun and Yeh indicated that their schemes are subject to the
forgery attack. So in 2005, Yang and ...