Sciweavers

1150 search results - page 51 / 230
» Beacon Based Authentication
Sort
View
JOC
2007
133views more  JOC 2007»
13 years 8 months ago
Trapdoor Hard-to-Invert Group Isomorphisms and Their Application to Password-Based Authentication
In the security chain the weakest link is definitely the human one: human beings cannot remember long secrets and often resort to rather insecure solutions to keep track of their ...
Dario Catalano, David Pointcheval, Thomas Pornin
COMPSEC
2002
95views more  COMPSEC 2002»
13 years 8 months ago
Cryptanalysis of a Timestamp-Based Password Authentication Scheme
Chi-Kwong Chan, Lee-Ming Cheng