The Design and Applications of Efficient and Secure Remote User Authentication
碩士 === 臺中技術學院 === 資訊科技與應用研究所 === 98 === User authentication is an important technology to guarantee that only the legal users can access resources from the remote server. In three-party password based key exchange protocol, a client is allowed to share a human-memorable password with a trusted serve...
Main Authors: | Yi-Jia Chang, 張宜嘉 |
---|---|
Other Authors: | 黃慧鳳 |
Format: | Others |
Language: | en_US |
Published: |
2010
|
Online Access: | http://ndltd.ncl.edu.tw/handle/cs39h4 |
Similar Items
-
A security enhanced remote user authentication scheme
by: Guan-Hong Liou, et al.
Published: (2013) -
Improved Peyravian-Jeffries’s remote user authentication scheme
by: Yi-Jai Chen, et al.
Published: (2008) -
User Efficient Authentication Protocols with Provable Security Based on Standard Reduction and Model Checking
by: Yi-Hui Lin, et al.
Published: (2012) -
A study of Authenticating Remote User
by: Jia Lun Tsai, et al.
Published: (2007) -
The Design and Applications of User Authentication with Smart Card
by: Hong-Wei Chang, et al.
Published: (2013)