Password authentication scheme for mobile computing environment
By means of IC(integrated circuit) card,RSA cryptography,and discrete logarithm,a password authentication scheme for mobile computing environment was presented.No verification tables were preserved at the server side to consolidate the security.To be applicable for the mobile computing environment,t...
Saved in:
Main Authors: | LIU Jun, LIAO Jian-xin, ZHU Xiao-min, WANG Chun |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2007-01-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/74659116/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Secure password-based authentication scheme with anonymous identity without smart cards
by: WANG Bang-ju1, et al.
Published: (2008-01-01) -
Stability of password authentication in infocommunication networks
by: M. N. Bobov, et al.
Published: (2020-09-01) -
Two-factor authenticated key agreement protocol based on biometric feature and password
by: Xiao-wei LI, et al.
Published: (2017-07-01) -
Research on password-authenticated key exchange protocol over lattices
by: Yuanbo GUO, et al.
Published: (2022-12-01) -
Verifier-based password-authenticated key exchange protocol for three-party
by: LI Wen-min, et al.
Published: (2008-01-01)