Zobrazeno 1 - 10
of 827
pro vyhledávání: '"Zero-knowledge password proof"'
Publikováno v:
IEEE Transactions on Information Forensics and Security. 13:545-558
To keep password users from creating simple and common passwords, major websites and applications provide a password-strength measure, namely a password checker. While critical requirements for a password checker to be stringent have prevailed in the
Publikováno v:
Future Generation Computer Systems. 78:699-711
Password authenticated key exchange (PAKE) protocols are designed for a pair of users to establish a secret session key over a public and unreliable network. In existing PAKE protocols, it is assumed that short passwords are pre-shared between users.
Publikováno v:
Computers & Electrical Engineering. 65:322-331
Wireless body area networks (WBANs) comprise many tiny sensor nodes which are planted in or around a patient’s body. These sensor nodes can collect biomedical data of the patient and transmit these valuable data to a data sink or a personal digital
Publikováno v:
Journal of Ambient Intelligence and Humanized Computing. 10:163-173
Three-party password-based authenticated key exchange (3PAKE) protocol is an important practical cryptographic primitive in the client-client communication environments, where two clients could generate a shared secure session key using their human-m
Publikováno v:
IEEE Transactions on Information Forensics and Security. 12:2574-2589
Textual passwords remain the most commonly employed user authentication mechanism, and potentially will continue to be so for years to come. Despite the well-known security and usability issues concerning textual passwords, none of the numerous propo
Autor:
Kazukuni Kobara, SeongHan Shinand
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. 14:573-576
A PAKR (Password-Authenticated Key Retrieval) protocol and its multi-server system allow one party (say, client), who has a memorable password, to retrieve a long-term static key in an exchange of messages with at least one other party (say, server)
Autor:
Chin-Chen Chang, Ngoc-Tu Nguyen
Publikováno v:
Peer-to-Peer Networking and Applications. 11:644-663
An authenticated key exchange (AKE) between two end-users is a crucial procedure to ensure data integrity and confidentiality while they communicate through a public channel. The existing three-party AKE schemes conventionally employ a relatively eas
Autor:
Dongdong Zhao, Wenjian Luo
Publikováno v:
Engineering Applications of Artificial Intelligence. 62:396-404
In this paper, a novel one-time password authentication scheme based on the negative database (NDB) is proposed. The authentication data, which involve a user password and random number, are converted to an NDB before they are transmitted to the netw
Publikováno v:
Cluster Computing. 21:1161-1173
User authentication is necessary to provide services on an application system and the Internet. Various authentication methods are used such as ID/PW, biometric, and OTP authentications. One of the popular authentications is ID/PW authentication. As
Publikováno v:
Wireless Personal Communications. 96:1451-1474
Anonymous password authenticated key exchange (APAKE) allows a client holding a low-entropy password to establish a session key with a server in an authenticated and anonymous way. As a very convenient solution for personal privacy protection, it has