21
Views
1
CrossRef citations to date
0
Altmetric
Original Articles

A new password authentication mechanism based on two phases encryption

Pages 463-480 | Received 01 Mar 2001, Published online: 18 Jun 2013

References

  • Brassard , G. 1983 . (1983), Relativized Cryptography . IEEE Transactions on Information Theory , IT-29 ( 6 ) : 877 – 894 .
  • Brouwer , A.E. and Emde Boas , P. 1982 . (1982), A note on Master Keys for Group Sharing . Information Processing Letters , 14 ( 1 ) : 12 – 14 .
  • Chang , C.C. and Hwang , S.J. Cryptographic Authentication of Passwords . Proceedings of International Carnahan Conference on Security Technology , October . pp. 126 – 130 . Taipei , R.O.C : Taiwan . 1991
  • Chiu , K.H. and Chen , W.T. 1989 . Secure Broadcast Using the Secure Lock . IEEE Transactions on Software Engineering , SE-15 ( 8 ) : 929 – 935 . 1989
  • Denning , D.E. and Schneider , F.B. 1981 . Master Keys for Group Sharing . Information Processing Letters , 12 ( 1 ) : 23 – 25 . 1981
  • Denning , D.E. 1982 . (1982), Cryptography and Data Security , Reading, MA : Addison-Wesley . 1982
  • Denning , D.E. The Data Encryption Standard Fifteen Years of Public Scrutiny . Proceedings of Sixth Annual Computer Security Applications Conference , pp. x – xv .
  • Diffie , W. and Hellman , M.E. 1976 . New Directions in Cryptography . IEEE Transactions on Information Theory , 12 ( 1 ) : 23 – 25 . 1976
  • Evans , A. Jr. , Kantrowitz , W. and Weiss , E. 1974 . A User Authentication Scheme not Requiring Secrecy in the Computer . Communications of the Association for Computing Machinery , 17 ( 8 ) August : 437 – 442 . 1974
  • Gopal , I.S. and Jaffe , J.M. 1984 . Point-to-Multipoint Communication Over Broadcast Links . IEEE Transactions on Communications , COM-32 ( 9 ) : 1034 – 1044 . 1984
  • Hwang , T.Y. Password Authentication Using Public-key Encryption . Proceedings of International Carnahan Conference on Security Technology , Octobel . Zurich , Switzerland 1983
  • Kent , S.T. 1981 . Security Requirements and Protocols for a Broadcast Scenario . IEEE Transactions on Communications , COM-29 ( 6 ) : 778 – 786 . 1981
  • Landwehr , C.E. , Heitmeyer , C.L. and McLean , J. 1981 . A Security Model for Military Message Systems . Association for Computing Machinery Transactions on Computer Systems , 2 ( 3 ) : 198 – 222 . 1984
  • Lennon , R.E. , Matyas , S.M. and Meyer , C.H. 1981 . Cryptographic Authentication of Time Invariant Quantities . IEEE Transactions on Communications , COM-29 ( 6 ) June : 773 – 777 . 1981
  • Lin , S. and Costello , D.J. 1982 . Error Control Coding , New York : Prentice-Hall . 1982
  • Miller , Benjamin . February 1994 . Vital Sign of Identity, IEEE Spectrum February , 1994
  • 1977 . “ Data Encryption Standard, Federal Information Processing Standard (FIPS) Publication 46 ” . In National Bureau of Standards, U. S. Department of Commerce Washington , D. C National Bureau of Standards 1977
  • Needham , R.M. and Schroeder , M.D. 1978 . Using Encryption for Authentication in Larger Networks of Computers . Communications of Association for Computing Machinery , 21 ( 12 ) : 993 – 999 . 1978
  • Niven , I. and Zukerman , H.S. 1972 . An Introduction to the Theory of Numbers , New York : John Wiley & Sons . 1972
  • Pohlig , S. and Hellman , M.E. 1978 . An Improved algorithm for Computing Logarithms Over GF(P) and Its Cryptographic Significance . IEEE Transactions on Information Theory , IT-24 ( 1 ) : 106 – 110 . 1978
  • Purdy , G.B. 1974 . A High Security Log-in Procedure . Communications of the Association for Computing Machinery , 17 ( 8 ) August : 442 – 445 . 1974
  • Shamir , A. 1979 . How to Share a Secret . Communications of Association for Computing Machinery , 22 ( 11 ) : 612 – 613 . 1979
  • Shannon , C.E. 1949 . Communication Theory of Secrecy Systems . Bell System Technical Journal , 28 : 656 – 715 . 1949
  • Simmons , G.J. 1979 . Symmetric and Asymmetric Encryption . ACM Computing Surverys , 11 ( 4 ) December : 305 – 330 . 1979
  • Tanenbaum , A.S. 1981 . Computer Networks , New York : Prentice-Hall . 1981
  • Wilkes , M.V. 1991 . Revisiting Computer Security in the Business World . Communications of Association for Computing Machinery , 34 ( 8 ) : 993 – 999 . 1991
  • Voydock , V.L. and Kent , S.T. 1983 . Security Mechanisms in High-Level Network Protocols . Association for Computing Machinery Computing Surveys , 15 ( 2 ) : 135 – 171 . 1983

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.