User Authentication Protocols with Three Factors and Key Agreement
碩士 === 長庚大學 === 資訊管理學研究所 === 96 === Traditional password-based user authentication protocols authenticate the legitimacy of the user by checking his valid password and identity. However, the password is either a long meaningless string (which is difficult for user to memorize) or a short easily-memo...
Main Authors: | Chen Chih Cheng, 陳志清 |
---|---|
Other Authors: | C. L. Hsu |
Format: | Others |
Published: |
2008
|
Online Access: | http://ndltd.ncl.edu.tw/handle/n8r6xk |
Similar Items
-
User authentication and key agreement protocols for wireless network environment
by: Chen, YuWen, et al.
Published: (2011) -
Authenticated Key Agreement Protocol for Three Parties
by: Chang, Ku Yi, et al.
Published: (2006) -
Privacy-Preserved Key Agreement and Hierarchical Conference Key Distribution Protocols with User Authentication from Pairings
by: Chih Wei Chu, et al.
Published: (2009) -
Privacy-Preserved Key Agreement and Hierarchical Conference Key Distribution Protocols with User Authentication from Pairings
by: Chu Chih-Wei, et al.
Published: (2009) -
The password authentication for the three-party key agreement protocol
by: Hsing-Chuan Lin, et al.
Published: (2016)