期刊文献+

User Authentication Schemes Based on Smart Cards

User Authentication Schemes Based on Smart Cards
原文传递
导出
摘要 Three user authentication schemes are proposed. The security of these new schemes is due to the used secure hash functions and the physically secure smart cards. Three user authentication schemes are proposed. The security of these new schemes is due to the used secure hash functions and the physically secure smart cards.
出处 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 1998年第2期57-59,82,共4页 中国邮电高校学报(英文版)
关键词 smart cards network security hash function user authentication smart cards, network security, hash function, user authentication
  • 相关文献

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部