Authentication using cryptography

被引:0
|
作者
Mitchell, Chris
机构
来源
Information Security Technical Report | 1997年 / 2卷 / 02期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:25 / 32
相关论文
共 50 条
  • [31] Efficient RFID Authentication Using Elliptic Curve Cryptography for the Internet of Things
    Han Shen
    Jian Shen
    Muhammad Khurram Khan
    Jong-Hyouk Lee
    Wireless Personal Communications, 2017, 96 : 5253 - 5266
  • [32] An efficient and secure RFID authentication protocol using elliptic curve cryptography
    Negin Dinarvand
    Hamid Barati
    Wireless Networks, 2019, 25 : 415 - 428
  • [33] An Improved Secure RFID Authentication Protocol Using Elliptic Curve Cryptography
    Liu, Wan-Rong
    Ji, Zhi-Yong
    Chu, Cheng-Chen
    International Journal of Network Security, 2024, 26 (01) : 106 - 115
  • [34] An efficient and secure RFID authentication protocol using elliptic curve cryptography
    Dinarvand, Negin
    Barati, Hamid
    WIRELESS NETWORKS, 2019, 25 (01) : 415 - 428
  • [35] A Secure Access Authentication Scheme for Multiserver Environments using Neural Cryptography
    Pattanayak, Sayantica
    Ludwig, Simone A.
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2018, 13 (01): : 56 - 65
  • [36] Signature Based Authentication using Contrast Enhanced Hierarchical Visual Cryptography
    Chavan, Pallavi Vijay
    Atique, Mohammad
    Malik, Latesh
    2014 IEEE STUDENTS' CONFERENCE ON ELECTRICAL, ELECTRONICS AND COMPUTER SCIENCE (SCEECS), 2014,
  • [37] An Asymmetric Authentication Protocol for Mobile Devices Using Elliptic Curve Cryptography
    Ganesan, S. Prasanna
    2ND IEEE INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER CONTROL (ICACC 2010), VOL. 4, 2010, : 107 - 109
  • [38] Port Knocking with Single Packet Authentication using Asymmetric Key Cryptography
    Reeves, Michael
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2014, 9 (01): : 1 - 8
  • [39] An Improved Remote User Authentication Scheme Using Elliptic Curve Cryptography
    Chaudhry, Shehzad Ashraf
    Naqvi, Husnain
    Mahmood, Khalid
    Ahmad, Hafiz Farooq
    Khan, Muhammad Khurram
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 96 (04) : 5355 - 5373
  • [40] Authentication of Parties in Piggy Bank Cryptography
    Prashanth, Busireddygari
    Subhash, Kak
    2017 FIFTY-FIRST ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS, AND COMPUTERS, 2017, : 1389 - 1393