搜索结果: 1-8 共查到“军队指挥学 authentication schemes”相关记录8条 . 查询时间(0.087 秒)
Offline Dictionary Attack on Password Authentication Schemes using Smart Cards
two-factor authentication schemes security-critical applications
2016/1/25
The design of secure and efficient smart-card-based password
authentication schemes remains a challenging problem today despite two
decades of intensive research in the security community, and the c...
Man-in-the-Middle Secure Authentication Schemes from LPN and Weak PRFs
authentication schemes LPN HB authentication weak-PRFs
2013/4/18
We show how to construct, from any weak pseudorandom function, a 3-round symmetric-key authentication protocol that is secure against man-in-the-middle attacks. The construction is very efficient, req...
Insecure“Provably Secure Network Coding”and Homomorphic Authentication Schemes for Network Coding
Provably Secure Network Coding Homomorphic Authentication Schemes Network Coding
2010/2/20
Network coding allows the routers to mix the received information before forwarding them
to the next nodes. Though this information mixing has been proven to maximize network
throughput, it also int...
Authentication schemes from actions on graphs, groups, or rings
authentication one-way function NP-hard
2010/1/18
We propose a couple of general ways of constructing authentication schemes
from actions of a semigroup on a set, without exploiting any speci¯c algebraic
properties of the set acted upon. Then ...
Entity Authentication Schemes Using Braid Word Reduction
braid group authentication zero knowledge handle reduction
2009/4/15
Artin’s braid groups currently provide a promising background for cryptographical
applications, since the first cryptosystems using braids were introduced in
[2, 3, 18] (see also [22]). A variety of...
Cryptanalysis of the Yang -Wang’s password authentication schemes
password authentication scheme smart card forgery attack
2009/3/19
In 1999, Yang and shieh proposed two password authentication schemes using
smart cards. But in 2003, Sun and Yeh indicated that their schemes are subject to the
forgery attack. So in 2005, Yang and ...
Improvement of recently proposed Remote User Authentication Schemes
Authentication Bilinear pairings Smart Card
2008/11/27
Recently Manik et al. [13] proposed a novel remote user authentication scheme using bilinear pairings. Chou et al. [14] identified a weakness in Manik et al.’s scheme and made an improvement. Thulasi ...
Cryptanalysis of recently proposed Remote User Authentication Schemes
Authentication Bilinear pairings Smart Card Password Timestamp
2008/10/23
Recently Manik et al. [13] proposed a novel remote user authentication scheme using bilinear pairings. Chou et al. [14] identified a weakness in Manik et al.’s scheme and made an improvement. In this ...