期刊文献+

智能卡口令认证方案 被引量:1

A Password Authentication Scheme with Smart Cards
下载PDF
导出
摘要 本文提出了一种智能卡口令认证方案。在这个方案中 ,用户能随意更改口令 ,远程系统不需要存储用户的口令表或验证表 ,并且能防止恶意的重放攻击。一旦建立起安全的网络环境 。 In this paper, a password authentication scheme with smart cards is proposed In the scheme, users can change their passwords freely, and the remote system does not need the directory of passwords or verification tables to authenticate users, and malicious replay attacks can be avoided Once the secure network environment is set up, authentication can be handled solely by the two parties involved
出处 《计算机工程与科学》 CSCD 2002年第1期18-19,32,共3页 Computer Engineering & Science
关键词 口令认证 智能卡 网络安全 计算机网络 password authentication smart card ID based scheme
  • 相关文献

参考文献7

  • 1[1]A Evans,W Kantrowitz,E Weiss. A User Authentication Scheme not Requiring Secrecy in the Computer [J]. Communication of the ACM, 1974, 17(8):437-442.
  • 2[2]C C Chang, T C Wu.Remote Password Authentication with Smart Cards[J]. IEE Proceeding-E, 1998,138(3):165-168.
  • 3[3]S J Wang, J F Chang. Smart Card Based Secure Password Authentication Scheme[J]. Computers and Security, 1999,15(3):231-237.
  • 4[4]A Shamir. Identiry-Based Cryptosystems and Signature Schemes[A]. Proc CRYPTO'84 [C].1984.47-53.
  • 5[5]P Peyret,G Lisimaque, T Y Chua.Smart Cards Provide Very High Security and Flexibility in Subscribers Management[J].IEEE Trans on Consumer Electronics, 1995,36(3):744-752.
  • 6[6]R L Rivest, A Shamir, L Adlemnan. A Method for Obtaining Digital Signature and Public-Key Cryptosystem[J]. Communications of the ACM, 1978,21(2):120-126.
  • 7[7]L Adleman. A Subexponential Algorithm for the Discrete Logarithm Problem with Applications to Cryptography[A]. Proc 20th IEEE Symp Foundations of Computer Science[C].1979.55-60.

同被引文献5

  • 1[4]Evans A, Kantrowitz W, Weiss E. A User Authentication Scheme not Requiring Security in the Computer. Communication of the ACM,1974; 17 (8): 437 ~442
  • 2[5]Chang C C, Wu T C. Remote Password Authentication with Smart. IEE Proceeding- E, 1998; 138(3): 165 ~ 168
  • 3[6]Wang S J, Chang J F. Smart Card Based Secure Password Authentication Scheme. Computers and Security, 1999; 15 (3) :231 ~ 237
  • 4[7]Shamir A. Identity - Based Cryptosystems and Signature Schemes. Proc CRYPTO' 84, 1984:47 ~ 53
  • 5[8]Rivest R L, Shamir A, Adleman L. A Method for Obtaining Digital Signature and Public - Key Cryptosystem . Communications of the ACM, 1978;21(2): 120 ~ 126

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部