Login / Signup
Weaknesses of Lee-Li-Hwang's hash-based password authentication scheme.
Wei-Chi Ku
Chien-Ming Chen
Hui-Lung Lee
Published in:
ACM SIGOPS Oper. Syst. Rev. (2003)
Keyphrases
</>
authentication scheme
user authentication
password guessing
image encryption
security analysis
smart card
security flaws
information security
authentication protocol
hash functions
secret key
image authentication
biometric systems
data distribution