Remote login authentication scheme based on a geometric approach
- 31 December 1995
- journal article
- Published by Elsevier BV in Computer Communications
- Vol. 18 (12), 959-963
- https://doi.org/10.1016/0140-3664(96)81595-7
Abstract
No abstract availableKeywords
This publication has 11 references indexed in Scilit:
- A Comparison of Password Techniques for Multilevel Authentication MechanismsThe Computer Journal, 1993
- Password authentication using Newton's interpolating polynomialsInformation Systems, 1991
- A survey of password mechanisms: Weaknesses and potential improvements. Part 2Computers & Security, 1989
- Understanding the use of passwordsComputers & Security, 1988
- A password extension for improved human factorsComputers & Security, 1982
- Password authentication with insecure communicationCommunications of the ACM, 1981
- Timestamps in key distribution protocolsCommunications of the ACM, 1981
- Cryptographic Authentication of Time-Invariant QuantitiesIEEE Transactions on Communications, 1981
- A high security log-in procedureCommunications of the ACM, 1974
- A user authentication scheme not requiring secrecy in the computerCommunications of the ACM, 1974