搜索结果: 1-8 共查到“军队指挥学 two-factor authentication”相关记录8条 . 查询时间(0.14 秒)
Two-Factor Authentication with End-to-End Password Security
password authentication two-factor authentication short authenticated string model
2018/1/11
We present a secure two-factor authentication (TFA) scheme based on the possession by the user of a password and a crypto-capable device. Security is ``end-to-end" in the sense that the attacker can a...
PROVABLY SECURE TWO-FACTOR AUTHENTICATION SCHEME FOR E-HEALTH USING SMART CARD
elliptic curve cryptosystem smart cards hash functions
2017/6/6
Nowadays, IT enabled service gain more attention due to easy to access resources from remote place. IT enabled services are extend their service to all kind of business and personal related applicatio...
Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment
Two-factor authentication User anonymity Smart card
2016/1/25
Despite two decades of intensive research, it remains a challenge to design a practical anonymous two-factor authentication
scheme, for the designers are confronted with an impressive list of securit...
We show how to realize two-factor authentication for a Bitcoin wallet
employing the two-party ECDSA signature protocol adapted from MacKenzie
& Reiter (2004). We also present a prototypic implementa...
On the Usability of Two-Factor Authentication
Two-factor authentication Usability User anonymity
2015/12/21
Smart-card-based password authentication, known as twofactor
authentication, is one of the most widely used security mechanisms
to validate the legitimacy of a remote client, who must hold a valid s...
Improvement of Das’s Two-Factor Authentication Protocol in Wireless Sensor Networks
Wireless sensor network authentication password smart card
2009/12/29
User authentication is essential for customized services
and privileged access control in wireless sensor network. In
2009, Das proposed a novel two-factor authentication scheme for
wireless sensor...
Formal Analysis and Systematic Construction of Two-factor Authentication Scheme
Authentication Password Smart Card Guessing Attack
2008/12/12
One of the most commonly used two-factor authentication
mechanisms is based on smart card and user's password. Throughout the
years, there have been many schemes proposed, but most of them have
alr...
Formal Analysis and Systematic Construction of Two-factor Authentication Scheme
Authentication Password Smart Card Guessing Attack
2008/12/11
One of the most commonly used two-factor authentication
mechanisms is based on smart card and user's password. Throughout the
years, there have been many schemes proposed, but most of them have
alr...