A Usable and Secure Two-Factor Authentication Scheme
暂无分享,去创建一个
[1] Wei-Chi Ku,et al. Impersonation Attack on a Dynamic ID-Based Remote User Authentication Scheme Using Smart Cards , 2005, IEICE Trans. Commun..
[2] William Stallings,et al. Network Security Essentials , 1999 .
[3] Amit K. Awasthi,et al. Proxy Blind Signature Scheme , 2003, IACR Cryptol. ePrint Arch..
[4] Leslie Lamport,et al. Password authentication with insecure communication , 1981, CACM.
[5] M. Misbahuddin,et al. A Simple and Efficient Solution to Remote User Authentication Using Smart Cards , 2006, 2006 Innovations in Information Technology.
[6] William Stallings,et al. Network Security Essentials: Applications and Standards , 1999 .
[7] Mohammed Misbahuddin,et al. Cryptanalysis of Liao-Lee-Hwang's Dynamic ID Scheme , 2008, Int. J. Netw. Secur..
[8] Bruce Schneier,et al. Two-factor authentication: too little, too late , 2005, CACM.
[9] Gwoboa Horng. Password Authentication Without Using a Password Table , 1995, Inf. Process. Lett..
[10] Roman V. Yampolskiy. Secure Network Authentication with PassText , 2007, Fourth International Conference on Information Technology (ITNG'07).
[11] Ashutosh Saxena,et al. A dynamic ID-based remote user authentication scheme , 2004, IEEE Transactions on Consumer Electronics.
[12] Quynh H. Dang,et al. Secure Hash Standard | NIST , 2015 .
[13] Wassim El-Hajj,et al. Two factor authentication using mobile phones , 2009, 2009 IEEE/ACS International Conference on Computer Systems and Applications.
[14] William Stallings. Network Security Essentials: Applications and Standards (3rd Edition) , 2006 .