Authentication using cryptography

被引:0
|
作者
Mitchell, Chris
机构
来源
Information Security Technical Report | 1997年 / 2卷 / 02期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:25 / 32
相关论文
共 50 条
  • [21] A Secured Authentication Protocol for SIP Using Elliptic Curves Cryptography
    Chen, Tien-ho
    Yeh, Hsiu-lien
    Liu, Pin-chuan
    Hsiang, Han-chen
    Shih, Wei-kuan
    COMMUNICATION AND NETWORKING, PT I, 2010, 119 : 46 - 55
  • [22] PRIVACY AND AUTHENTICATION - INTRODUCTION TO CRYPTOGRAPHY
    DIFFIE, W
    HELLMAN, ME
    PROCEEDINGS OF THE IEEE, 1979, 67 (03) : 397 - 427
  • [23] Mutual Authentication for Mobile Communication Using Symmetric and Asymmetric Key Cryptography
    Roy, Tumpa
    Dutta, Kamlesh
    TRENDS IN NETWORKS AND COMMUNICATIONS, 2011, 197 : 88 - 99
  • [24] A Multiserver Biometric Authentication Scheme for TMIS using Elliptic Curve Cryptography
    Chaudhry, Shehzad Ashraf
    Khan, Muhammad Tawab
    Khan, Muhammad Khurram
    Shon, Taeshik
    JOURNAL OF MEDICAL SYSTEMS, 2016, 40 (11)
  • [25] Two Factor Authentication Using Visual Cryptography and Digital Envelope in Kerberos
    Khandelwal, Naman S.
    Kamboj, Pariza
    2015 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, SIGNALS, COMMUNICATION AND OPTIMIZATION (EESCO), 2015,
  • [26] A Multiserver Biometric Authentication Scheme for TMIS using Elliptic Curve Cryptography
    Shehzad Ashraf Chaudhry
    Muhammad Tawab Khan
    Muhammad Khurram Khan
    Taeshik Shon
    Journal of Medical Systems, 2016, 40
  • [27] A Mutual Authentication Protocol for IoT Devices using Elliptic Curve Cryptography
    Tewari, Aakanksha
    Gupta, B. B.
    PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE CONFLUENCE 2018 ON CLOUD COMPUTING, DATA SCIENCE AND ENGINEERING, 2018, : 716 - 720
  • [28] Using cryptography in the cloud for lightweight authentication protocols based on QR codes
    Aciobanitei, Iulian
    Buhus, Iulian Catalin
    Pura, Mihai-Lica
    2018 IEEE 12TH INTERNATIONAL SYMPOSIUM ON APPLIED COMPUTATIONAL INTELLIGENCE AND INFORMATICS (SACI), 2018, : 539 - 542
  • [29] Efficient RFID Authentication Using Elliptic Curve Cryptography for the Internet of Things
    Shen, Han
    Shen, Jian
    Khan, Muhammad Khurram
    Lee, Jong-Hyouk
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 96 (04) : 5253 - 5266
  • [30] Secure Authentication using Image Processing and Visual Cryptography for Banking Applications
    Hegde, Chetana
    Manu, S.
    Shenoy, P. Deepa
    Venugopal, K. R.
    Patnaik, L. M.
    ADCOM: 2008 16TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATIONS, 2008, : 65 - +