English  |  正體中文  |  简体中文  |  Items with full text/Total items : 94286/110023 (86%)
Visitors : 21694013      Online Users : 603
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    ASIA unversity > 管理學院 > 國際企業學系 > 期刊論文 >  Item 310904400/79825


    Please use this identifier to cite or link to this item: http://asiair.asia.edu.tw/ir/handle/310904400/79825


    Title: A Simple Password Authentication Scheme Based on Geometric Hashing Function
    Authors: Zhuang, Xu;Zhuang, Xu;張真誠;CHang, Chin-Chen;Wang, Zhi-Hui;Wang, Zhi-Hui;Zhu, Yan;Zhu, Yan
    Contributors: 資訊工程學系
    Keywords: Geometric hash function;hash table;one-way hash function;password authentication
    Date: 2014-05
    Issue Date: 2014-06-05 04:15:19 (UTC+0)
    Abstract: Password authentication protocol is one of most important mechanisms to prevent resources from accessing by unauthorized users. Many password authentication schemes have been developed in last decades, and many of them are based on the use of smart card. However, nowadays it is not applicable for many applications on the Internet to adopt the smart card in their authentication scheme due to its inconvenience and relative high cost for both users and service providers. On the other hand, all password authentication schemes without using smart card (ex.schemes based on hash function) cited in this paper are proved to be vulnerable to replay attack and/or man-in-themiddle attack and/or verifier stolen attack, etc. Hence, in this paper, we focus on designing a simple, secure and high efficiency password authentication scheme based on geometric hash function without using smart card. Our security analysis and performance evaluation demonstrate that our scheme is quite simple and efficient, and also can withstand replay attack, password guessing attack, min-inthe-middle attack, verifier stolen attack and denial-ofservice attack.
    Relation: International Journal of Network Security,16(3),237-243.
    Appears in Collections:[國際企業學系] 期刊論文

    Files in This Item:

    File SizeFormat
    index.html0KbHTML395View/Open


    All items in ASIAIR are protected by copyright, with all rights reserved.


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback