Time Sharing Computer Systems
ACM SIGSAC Review
Discrete logarithms in finite fields and their cryptographic significance
Proc. of the EUROCRYPT 84 workshop on Advances in cryptology: theory and application of cryptographic techniques
Secrecy and privacy in the local area network environment
Proc. of the EUROCRYPT 84 workshop on Advances in cryptology: theory and application of cryptographic techniques
On some cryptographic solutions for access control in a tree hierarchy
ACM '87 Proceedings of the 1987 Fall Joint Computer Conference on Exploring technology: today and tomorrow
Zero-knowledge proofs of identity and veracity of transaction receipts
Lecture Notes in Computer Science on Advances in Cryptology-EUROCRYPT'88
Limits on the provable consequences of one-way permutations
STOC '89 Proceedings of the twenty-first annual ACM symposium on Theory of computing
Limits on the provable consequences of one-way permutations (invited talk)
CRYPTO '88 Proceedings on Advances in cryptology
Cryptosystem for group oriented cryptography
EUROCRYPT '90 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
ID-based secret-key cryptography
ACM SIGOPS Operating Systems Review
MULTISAFE—a modular multiprocessing approach to secure database management
ACM Transactions on Database Systems (TODS)
An Efficient One-Way Enciphering Algorithm
ACM Transactions on Mathematical Software (TOMS)
Symmetric and Asymmetric Encryption
ACM Computing Surveys (CSUR)
Communications of the ACM
An unlinkably divisible and intention attachable ticket scheme for runoff elections
Journal of Network and Computer Applications
A new key authentication scheme based on discrete logarithms
Applied Mathematics and Computation
Cryptosystems Based on an Analog of Heat Flow
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
A Flexible User Authentication Scheme for Multi-server Internet Services
ICN '01 Proceedings of the First International Conference on Networking-Part 1
Easy entry: the password encryption problem
ACM SIGOPS Operating Systems Review
Some cryptographic principles of authentication in electronic funds transfer systems
SIGCOMM '81 Proceedings of the seventh symposium on Data communications
Some Open Problems In Cryptography
ACM '78 Proceedings of the 1978 annual conference
Full protection specifications in the semantic model for database protection languages
ACM '76 Proceedings of the 1976 annual conference
Partitions and principles for secure operating systems
ACM '75 Proceedings of the 1975 annual conference
Fighting entity authentication frauds by combining different technologies
BT Technology Journal
A password authentication scheme over insecure networks
Journal of Computer and System Sciences
A Computer Algorithm for Calculating the Product AB Modulo M
IEEE Transactions on Computers
The use of passwords for controlling access to remote computer systems and services
AFIPS '77 Proceedings of the June 13-16, 1977, national computer conference
Multiuser cryptographic techniques
AFIPS '76 Proceedings of the June 7-10, 1976, national computer conference and exposition
Computers, security, and the audit function
AFIPS '75 Proceedings of the May 19-22, 1975, national computer conference and exposition
A security policy for a profile-oriented operating system
AFIPS '81 Proceedings of the May 4-7, 1981, national computer conference
Some applications of polynomials for the design of cryptographic protocols
SCN'02 Proceedings of the 3rd international conference on Security in communication networks
An efficient and secure multi-server authentication scheme with key agreement
Journal of Systems and Software
Research: Remote login authentication scheme based on a geometric approach
Computer Communications
Single password authentication
Computer Networks: The International Journal of Computer and Telecommunications Networking
Honeywords: making password-cracking detectable
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Hi-index | 48.24 |
The protection of time sharing systems from unauthorized users is often achieved by the use of passwords. By using one-way ciphers to code the passwords, the risks involved with storing the passwords in the computer can be avoided. We discuss the selection of a suitable one-way cipher and suggest that for this purpose polynomials over a prime modulus are superior to one-way ciphers derived from Shannon codes.