Challenge response password security using combinatorial group theory.
Gilbert BaumslagYegor BryukhovBenjamin FineDouglas TroegerPublished in: Groups Complex. Cryptol. (2010)
Keyphrases
- information security
- user authentication
- intrusion detection
- authentication mechanism
- theoretical framework
- theoretical basis
- security requirements
- network security
- security issues
- data encryption
- statistical databases
- group members
- computer security
- authentication systems
- password based authenticated key exchange