To search, Click below search items.
All Published Papers Search Service
Title
A Simple Attack on a Recently Introduced Hash-Based Secure User Authentication Scheme
Author
Minho Kim, ?etin Kaya Ko?
Vol. 6 No. 5 pp. 157-160
Keywords
Hash function, user authentication, stolen-verifier attack, denial-of-service attack
Generation of Authentication Strings From Graphic Keys
Sergio Tenreiro de Magalhaes, Kenneth Revett, Henrique M. D. Santos
Vol. 6 No. 3 pp. 240-246
Authentication, Graphic Keys, Passgraphs, Key Space, Password creation.
Authentication Transmission Overhead Between Entities in Mobile Networks
Ja¡¯afer AL-Saraireh, Sufian Yousef
Vol. 6 No. 3 pp. 150-154
AuC, Authentication, UMTS, Authentication Vector.
Methodology of Secure and Efficient Source Authentication Protocol for Multicast Data Streams
Sanghoon Jeon, Jeonghoon Jeon, Moonseog Jun
Vol. 6 No. 2 pp. 226~232
Multicast, Source Authentication, Streaming Data security.