A simple way of improving the login security
Computers and Security
Accessibility vs. security: a look at the demand for computer security
Computers and Security
A zero knowledge probabilistic login protocol
Computers and Security
On distinguishing prime numbers from composite numbers
SFCS '80 Proceedings of the 21st Annual Symposium on Foundations of Computer Science
Proofs that yield nothing but their validity and a methodology of cryptographic protocol design
SFCS '86 Proceedings of the 27th Annual Symposium on Foundations of Computer Science
Secure Disconnected Agent Interaction for Electronic Commerce Activities Using CapBasED-AMS
Information Technology and Management
Hi-index | 0.24 |
The problem of system-to-system authentication with the use of a password can be effectively facilitated through the use of either a probabilistic protocol or a zero-knowledge model. A combination of these two into a zero-knowledge probabilistic protocol has been demonstrated to be an efficient alternative approach to this problem. In the present paper, this combined protocol is restructured into a formal system-to-system login and authentication scheme, which is demonstrated to be not only secure but also generic and parametric enough to be usable in environments with different technological platforms and/or operational structures.