-
1
المؤلفون: Izwa Altaf, Akasha Shafiq, Khalid Mahmood, Minahil Rana, Shehzad Ashraf Chaudhry, Mamoun Alazab, Yousaf Bin Zikria
المساهمون: Chaudhry, Shehzad Ashraf
المصدر: Computer Communications. 165:85-96
مصطلحات موضوعية: Password, Authentication, User impersonation, Computer Networks and Communications, business.industry, Network security, Computer science, 020206 networking & telecommunications, 02 engineering and technology, Computer security, computer.software_genre, Network Security, 6G/IoT security, Symmetric-key algorithm, Secure communication, Authentication protocol, 0202 electrical engineering, electronic engineering, information engineering, 020201 artificial intelligence & image processing, Smart card, business, computer, Protocol (object-oriented programming)
وصف الملف: application/pdf
-
2
المؤلفون: Maode Ma, Yan Zhang, Daojing He, Chun Chen, Jiajun Bu
المصدر: Computer Communications. 34:367-374
مصطلحات موضوعية: Challenge-Handshake Authentication Protocol, Computer Networks and Communications, Computer science, computer.internet_protocol, Computer security, computer.software_genre, One-time password, S/KEY, 3-D Secure, Generic Bootstrapping Architecture, Session key, Password authentication protocol, Data Authentication Algorithm, Password, Password policy, Authentication, business.industry, Wireless network, Multi-factor authentication, Chip Authentication Program, Symmetric-key algorithm, Network Access Control, Authentication protocol, Smart card, Challenge–response authentication, Roaming, business, Mobile device, computer, Computer network
-
3
المؤلفون: Soo-Kyun Kim, Muhammad Khurram Khan, Khaled Alghathbar
المصدر: Computer Communications. 34:305-309
مصطلحات موضوعية: Password, Authentication, User authentication, Revocation, Computer Networks and Communications, business.industry, Computer science, Access control, Multi-factor authentication, Computer security, computer.software_genre, Password strength, law.invention, Public-key cryptography, law, Authentication protocol, Session key, Smart card, Challenge–response authentication, business, Cryptanalysis, computer, Data Authentication Algorithm, Computer network
-
4
المؤلفون: Wei-Kuan Shih, Han-Cheng Hsiang
المصدر: Computer Communications. 32:649-652
مصطلحات موضوعية: Password, Authentication, Computer Networks and Communications, business.industry, Computer science, Data_MISCELLANEOUS, Hash function, Password cracking, Access control, Mutual authentication, Computer security, computer.software_genre, Authentication protocol, Smart card, Reflection attack, Challenge–response authentication, business, computer
-
5
المؤلفون: Kim-Kwang Raymond Choo, Yvonne Hitchcock, Colin Boyd
المصدر: Computer Communications. 29:2788-2797
مصطلحات موضوعية: Provable security, Password, Key-agreement protocol, Encrypted key exchange, Authentication, Key establishment, Dictionary attack, Computer Networks and Communications, business.industry, Computer science, Password cracking, Access control, Cryptography, Mutual authentication, Computer security, computer.software_genre, Authenticated Key Exchange, Public-key cryptography, Authentication protocol, business, computer, Key exchange, Computer network
-
6
المؤلفون: Mohammad Peyravian, Clark D. Jeffries
المصدر: Computer Communications. 29:660-667
مصطلحات موضوعية: TLS-SRP, SSLIOP, Computer Networks and Communications, Computer science, Hash function, Cryptography, Access control, Computer security, computer.software_genre, S/KEY, Public-key cryptography, Session key, Password, Password policy, Authentication, business.industry, Secure by design, ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS, Authentication protocol, Key (cryptography), The Internet, Challenge–response authentication, business, computer, Computer network, Secure by default
-
7
المؤلفون: Jorge Munilla, Alberto Peinado
المصدر: Computer Communications. 32:736-739
مصطلحات موضوعية: Challenge-Handshake Authentication Protocol, Password, Otway–Rees protocol, SSLIOP, Interlock protocol, Computer Networks and Communications, Computer science, Computer security, computer.software_genre, ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS, Authentication protocol, Wide Mouth Frog protocol, Challenge–response authentication, computer
-
8
المؤلفون: Tatjana Welzer, Marko Hölbl, Boštjan Brumen
المصدر: Computer Communications. 31:1945-1951
مصطلحات موضوعية: Challenge-Handshake Authentication Protocol, Otway–Rees protocol, SSLIOP, Computer Networks and Communications, Computer science, Hash function, Access control, Cryptography, Computer security, computer.software_genre, Public-key cryptography, Session key, Password, Authentication, User authentication, business.industry, Public key infrastructure, ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS, Authentication protocol, Key (cryptography), Wide Mouth Frog protocol, Reflection attack, Challenge–response authentication, business, computer, Computer network
-
9
المؤلفون: Sokratis K. Katsikas, Dimitris Gritzalis
المصدر: Computer Communications. 19:954-961
مصطلحات موضوعية: Challenge-Handshake Authentication Protocol, Password, Authentication, Otway–Rees protocol, Computer Networks and Communications, Computer science, business.industry, Email authentication, Computer security, computer.software_genre, Login, Generic Bootstrapping Architecture, Authentication protocol, Lightweight Extensible Authentication Protocol, Protected Extensible Authentication Protocol, Wide Mouth Frog protocol, Challenge–response authentication, Reflection attack, business, computer, Data Authentication Algorithm, Computer network
-
10
المؤلفون: M. S. Hwang
المصدر: Computer Communications. 22:742-744
مصطلحات موضوعية: Scheme (programming language), Authentication, Computer Networks and Communications, Computer science, business.industry, computer.internet_protocol, Cryptography, Login, Computer security, computer.software_genre, law.invention, ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS, law, Authentication protocol, Computer Science::Multimedia, Password authentication protocol, business, Cryptanalysis, computer, Data Authentication Algorithm, Computer Science::Cryptography and Security, Computer network, computer.programming_language