摘要
对SEPA认证方案进行了分析,发现其存在安全缺陷,进而对SEPA方案加以改进.改进后的版本保持原方案的优势,并增强了安全性.
出处
《河南教育学院学报(自然科学版)》
2008年第2期35-37,共3页
Journal of Henan Institute of Education(Natural Science Edition)
参考文献5
-
1Lamport L. Password Authentication with Insecure Communication [ J]. Communication of ACM, 1981, 24 : 770 -772.
-
2Haller N. The S/KEYTM one-time password system [ A]. Proc Internet Society Symposium on Network and Distributed System Security [C]. USA: San Diego,ISSNDSS, 1994:151-158.
-
3Sandirigama M,Shimizu A, Noda M T . Simple and secure password authentication protocol (SAS) [ J ]. IEICE Transactions on Communications E83-B (6) , 2000:1363 - 1365.
-
4Tsuji T,Shimizu A. An impersonation attack on one-time password authentication protocol OSPA[ J]. IEICE Transactions on Communications E86-B (7) ,2003:2182 - 2185.
-
5袁丁,范平志.一个简单有效的口令识别方案[J].计算机工程,2006,32(17):192-193. 被引量:2
二级参考文献7
-
1Lamport L.Password Authentication with Insecure Communication[J].Comm.of ACM,1981,24(11):770-772.
-
2Haller N.The S/Key One-time Password System[C].Proc.of Internet Society Symposium on Network and Distributed System Security,San Diego,CA,1994:151-158.
-
3Shimizu A.A Dynamic Password Authentication Method by One-way Function[J].IEICE Trans.on Information and System,1990,73(7):630-636.
-
4Shimizu A,Horioka T,Inagaki H.A Password Authentication Method for Contents Communication on the Internet[J].IEICE Trans.on Comm.,1998,81(8):1666-1673.
-
5Sandirigama M,Shimizu A,Noda M T,Simple and Secure Password Authentication Protocol[J].IEICE Trans.on Comm.,2000,83(6):1363-1365.
-
6Lin C L,Sun H M,Hwang Z.Attacks and Solutions on Strong-password Authentication[J].IEICE Trans.on Comm.,2001,84(9):2622-2627.
-
7袁丁,范平志.一个安全的动态口令鉴别方案(英文)[J].四川大学学报(自然科学版),2002,39(2):228-232. 被引量:6
同被引文献4
-
1王涛,谢冬青,周洲仪.一种新的双向认证的一次性口令系统TAOTP[J].计算机应用研究,2005,22(9):128-130. 被引量:13
-
2Lamport L. Password authentication with insecure communication [ J]. Communication of ACM, 1981, 24 : 770 - 772.
-
3Hailer N. The S/KEY^TM one-time password system [ C ]. //Proc Internet Society Symposium on Network and Distributed System Security. USA, San Diego: ISSNDSS, 1994 : 151 - 158.
-
4李世平,李凤霞,战守义.S/key认证系统的安全缺陷及改进[J].计算机工程,2003,29(20):18-19. 被引量:10
-
1王寸心.对TAR命令的一种补充[J].金融电子化,2000(6):80-82.
-
2李毅,张少武,曾立君,韩继红.一个基于智能卡的动态认证方案[J].计算机应用,2008,28(3):637-639. 被引量:1
-
3张靖,王喜文.欧洲信息化应用范例:丹麦的电子票据[J].信息化建设,2011(2):50-51.
-
4袁丁,范平志.一个简单有效的口令识别方案[J].计算机工程,2006,32(17):192-193. 被引量:2
-
5赵佳璐,杨俊,韩晶,鄂海红.基于事务ID集合的带约束的关联规则挖掘算法[J].计算机工程与设计,2013,34(5):1663-1667. 被引量:9
-
6李飞,李彤.软件演化过程体系结构研究[J].计算机应用与软件,2008,25(7):37-39. 被引量:2
-
7李飞飞,杜心灵,陈澍.Biventricular Repair versus Uni-ventricular Repair for Pulmonary Atresia with Intact Ventrical Septum:A Systematic Review[J].Journal of Huazhong University of Science and Technology(Medical Sciences),2015,35(5):656-661. 被引量:4