Login / Signup
Weaknesses of Yoon-Ryu-Yoo's hash-based password authentication scheme.
Wei-Chi Ku
Min-Hung Chiang
Shen-Tien Chang
Published in:
ACM SIGOPS Oper. Syst. Rev. (2005)
Keyphrases
</>
authentication scheme
user authentication
password guessing
information security
image encryption
security analysis
authentication protocol
smart card
hash functions
security flaws
image authentication
secret key
data distribution
biometric systems
public key
security requirements
end to end