Password authentication with insecure communication
Communications of the ACM
Tailoring authentication protocols to match underlying mechanisms
ACISP '96 Proceedings of the First Australasian Conference on Information Security and Privacy
Two simple attacks on Lin-Shen-Hwang's strong-password authentication protocol
ACM SIGOPS Operating Systems Review
A hash-based strong-password authentication scheme without using smart cards
ACM SIGOPS Operating Systems Review
A secure one-time password authentication scheme with low-computation for mobile communications
ACM SIGOPS Operating Systems Review
A secure one-time password authentication scheme using smart cards without limiting login times
ACM SIGOPS Operating Systems Review
A password authentication scheme over insecure networks
Journal of Computer and System Sciences
Injective synchronisation: an extension of the authentication hierarchy
Theoretical Computer Science - Automated reasoning for security protocol analysis
An efficient One-Time Password authentication scheme using a smart card
International Journal of Security and Networks
Authentication and key agreement method for home networks using a smart card
ICCSA'07 Proceedings of the 2007 international conference on Computational science and its applications - Volume Part I
USENIXATC'10 Proceedings of the 2010 USENIX conference on USENIX annual technical conference
A smart card based authentication protocol for strong passwords
ACOS'06 Proceedings of the 5th WSEAS international conference on Applied computer science
A one-time password authentication scheme for secure remote access in intelligent home networks
KES'06 Proceedings of the 10th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part II
One-time password authentication scheme using smart cards providing user anonymity
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part V
A light weight authentication protocol for digital home networks
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part IV
Improvements to mitchell's remote user authentication protocol
ICISC'05 Proceedings of the 8th international conference on Information Security and Cryptology
Mobile one-time passwords: two-factor authentication using mobile phones
Security and Communication Networks
GridOne: A complement to the GridOne authentication method
Network Security
Intelligent home network authentication: S/key-based home device authentication
ISPA'07 Proceedings of the 2007 international conference on Frontiers of High Performance Computing and Networking
Hi-index | 0.00 |
We give a critical analysis of the security properties of the S/KEY user authentication system.