Communications of the ACM
Computers and Privacy: A Survey
ACM Computing Surveys (CSUR)
Pass-algorithms: a user validation scheme based on knowledge of secret algorithms
Communications of the ACM
Timestamps in key distribution protocols
Communications of the ACM
Password authentication with insecure communication
Communications of the ACM
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
A user authentication scheme not requiring secrecy in the computer
Communications of the ACM
A high security log-in procedure
Communications of the ACM
Communications of the ACM
Cryptography and data security
Cryptography and data security
DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION
DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION
Easily remembered passphrases: a better approach
ACM SIGSAC Review - Resources: part II
An introduction to database systems (The Systems programming series)
An introduction to database systems (The Systems programming series)
Hi-index | 0.00 |
A logical authentication test requires no special hardware. As a proof of identity, the accessor is required to know or to use secret information. In a generalized model of logical authentication, the user learns an encryption algorithm whose functional description is secret. This model includes new tests of secret knowledge which induce larger forgery costs in certain environments than methods currently in wide-spread use.