Sciweavers

IMA
2003
Springer
97views Cryptology» more  IMA 2003»
14 years 5 months ago
Remote User Authentication Using Public Information
A method for remote user authentication is proposed that requires only public information to be stored at the verifying host. Like the S/KEY scheme, the new technique uses only sym...
Chris J. Mitchell