Formal analysis and systematic construction of two-factor authentication scheme
One of the most commonly used two-factor authentication mechanisms is based on smart card and user’s password. Throughout the years, there have been many schemes proposed, but most of them have already been found flawed due to the lack of formal security analysis. On the cryptanalysis of this type o...
محفوظ في:
المؤلفون الرئيسيون: | YANG, Guomin, WONG, Duncan S., WANG, Huaxiong, DENG, Xiaotie |
---|---|
التنسيق: | text |
اللغة: | English |
منشور في: |
Institutional Knowledge at Singapore Management University
2006
|
الموضوعات: | |
الوصول للمادة أونلاين: | https://ink.library.smu.edu.sg/sis_research/7437 https://ink.library.smu.edu.sg/context/sis_research/article/8440/viewcontent/Formal_analysis_and_systematic_construction_of_two_factor_authentication_scheme.pdf |
الوسوم: |
إضافة وسم
لا توجد وسوم, كن أول من يضع وسما على هذه التسجيلة!
|
المؤسسة: | Singapore Management University |
اللغة: | English |
مواد مشابهة
-
Two-factor mutual authentication based on smart cards and passwords
بواسطة: YANG, Guomin, وآخرون
منشور في: (2008) -
Two Robust Remote User Authentication Protocols Using Smart Cards
بواسطة: YEH, Kuo-Hui, وآخرون
منشور في: (2010) -
Analysis and improvement on a biometric-based remote user authentication scheme using smart cards
بواسطة: WEN, Fengtong, وآخرون
منشور في: (2015) -
A secure and effective anonymous user authentication scheme for roaming service in global mobility networks
بواسطة: WEN, Fengtong, وآخرون
منشور في: (2013) -
New efficient user identification and key distribution scheme providing enhanced security
بواسطة: YANG, Yanjiang, وآخرون
منشور في: (2004)