VERIFYING THE AUTHENTICATION OF AN INFORMATION SYSTEM USER.

被引:8
|
作者
Ahituv, Niv [1 ]
Lapid, Yeheskel [1 ]
Neumann, Seev [1 ]
机构
[1] Tel Aviv Univ, Tel Aviv, Isr, Tel Aviv Univ, Tel Aviv, Isr
来源
Computers and Security | 1987年 / 6卷 / 02期
关键词
AUTHENTICATION - COMPUTER SECURITY - INFORMATION SYSTEM SECURITY - PASSWORD;
D O I
10.1016/0167-4048(87)90086-1
中图分类号
学科分类号
摘要
引用
收藏
页码:152 / 157
相关论文
共 50 条
  • [31] Exogenous lipoid pneumonia in a chronic laxative user.
    Hernandez-Montfort, J. A.
    Martagon-Villamil, J. A.
    Hehn, B.
    Arora, A.
    JOURNAL OF THE AMERICAN GERIATRICS SOCIETY, 2009, 57 : S67 - S68
  • [32] Verifying authentication protocols in CSP
    Schneider, S
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1998, 24 (09) : 741 - 758
  • [33] Verifying authentication protocols with CSP
    Schneider, S
    10TH COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1997, : 3 - 17
  • [34] A Survey of User Authentication Based on Channel State Information
    Wang, Zhengjie
    Dou, Wenwen
    Ma, Mingjing
    Feng, Xiaoxue
    Huang, Zehua
    Zhang, Chengming
    Guo, Yinjing
    Chen, Da
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [35] Provable user authentication scheme in telecare medicine information system using elliptic curve cryptosystem
    Toan Thinh Truong
    Duong Tien Phan
    Minh Triet Tran
    Anh Duc Duong
    Echizen, Isao
    PROCEEDINGS OF 2016 11TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, (ARES 2016), 2016, : 253 - 259
  • [36] Construction of a secure two-factor user authentication system using fingerprint information and password
    Go, Woong
    Lee, Kwangwoo
    Kwak, Jin
    JOURNAL OF INTELLIGENT MANUFACTURING, 2014, 25 (02) : 217 - 230
  • [37] Construction of a secure two-factor user authentication system using fingerprint information and password
    Woong Go
    Kwangwoo Lee
    Jin Kwak
    Journal of Intelligent Manufacturing, 2014, 25 : 217 - 230
  • [38] Cryptanalysis and improvement of a password-based user authentication scheme for the integrated EPR information system
    Islam, S. K. Hafizul
    Biswas, G. P.
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2015, 27 (02) : 211 - 221
  • [39] An Efficient Two Factor User Authentication and Key Exchange Protocol for Telecare Medical Information System
    Sherali, Fairouz
    Falah, Sarhan
    INTERNATIONAL JOURNAL OF MATHEMATICS AND COMPUTER SCIENCE, 2020, 15 (04): : 1015 - 1027
  • [40] LAN BRIDGES MAKE NETWORK COMMUNICATIONS TRANSPARENT TO THE USER.
    Kline, Charles
    Computer Technology Review, 1986, 6 (02):