Sciweavers

IMA
2003
Springer

Remote User Authentication Using Public Information

14 years 5 months ago
Remote User Authentication Using Public Information
A method for remote user authentication is proposed that requires only public information to be stored at the verifying host. Like the S/KEY scheme, the new technique uses only symmetric cryptography and is resistant to eavesdropping, but, unlike S/KEY, it is resistant to host impersonation attacks. The avoidance of asymmetric cryptographic techniques makes the scheme appropriate for low cost user authentication devices.
Chris J. Mitchell
Added 07 Jul 2010
Updated 07 Jul 2010
Type Conference
Year 2003
Where IMA
Authors Chris J. Mitchell
Comments (0)