Non-interactive password authentications without password tables

Tzone-Lih Hwang, Yihwa Chen, Chi Sung Laih

研究成果: Conference contribution

100 引文 斯高帕斯(Scopus)

摘要

The authors propose a noninteractive password authentication scheme. The scheme simply discards the use of verification tables. The legitimacy of the login user can be validated easily by anyone inside the system. However, no one can masquerade as a legitimate user even though he intecepts the previous login password. The security of the scheme is equivalent to that of Shamir's signature scheme. It can withstand the attack of replaying a previously intercepted login request.

原文English
主出版物標題90 IEEE Reg 10 Conf Comput Commun Syst IEEE TENCON 91
發行者Publ by IEEE
頁面429-431
頁數3
ISBN(列印)0879425563
出版狀態Published - 1991 一月 1
事件1990 IEEE Region 10 Conference on Computer and Communication Systems - IEEE TENCON '90 - Hong Kong
持續時間: 1990 九月 241990 九月 27

出版系列

名字90 IEEE Reg 10 Conf Comput Commun Syst IEEE TENCON 91

Other

Other1990 IEEE Region 10 Conference on Computer and Communication Systems - IEEE TENCON '90
城市Hong Kong
期間90-09-2490-09-27

All Science Journal Classification (ASJC) codes

  • Engineering(all)

指紋 深入研究「Non-interactive password authentications without password tables」主題。共同形成了獨特的指紋。

  • 引用此

    Hwang, T-L., Chen, Y., & Laih, C. S. (1991). Non-interactive password authentications without password tables. 於 90 IEEE Reg 10 Conf Comput Commun Syst IEEE TENCON 91 (頁 429-431). (90 IEEE Reg 10 Conf Comput Commun Syst IEEE TENCON 91). Publ by IEEE.