@inproceedings{133cf2c3dd1843eb9c13bd1cc8886efe,
title = "Non-interactive password authentications without password tables",
abstract = "The authors propose a noninteractive password authentication scheme. The scheme simply discards the use of verification tables. The legitimacy of the login user can be validated easily by anyone inside the system. However, no one can masquerade as a legitimate user even though he intecepts the previous login password. The security of the scheme is equivalent to that of Shamir's signature scheme. It can withstand the attack of replaying a previously intercepted login request.",
author = "Tzone-Lih Hwang and Yihwa Chen and Laih, \{Chi Sung\}",
year = "1991",
month = jan,
day = "1",
language = "English",
isbn = "0879425563",
series = "90 IEEE Reg 10 Conf Comput Commun Syst IEEE TENCON 91",
publisher = "Publ by IEEE",
pages = "429--431",
booktitle = "90 IEEE Reg 10 Conf Comput Commun Syst IEEE TENCON 91",
note = "1990 IEEE Region 10 Conference on Computer and Communication Systems - IEEE TENCON '90 ; Conference date: 24-09-1990 Through 27-09-1990",
}