+

Hauser et al., 1994 - Google Patents

Robust and secure password and key change method

Hauser et al., 1994

View PS
Document ID
17613900965691297812
Author
Hauser R
Janson P
Molva R
Tsudik G
Van Herreweghen E
Publication year
Publication venue
European Symposium on Research in Computer Security

External Links

Snippet

This paper discusses issues and idiosyncrasies associated with changing passwords and keys in distributed computer systems. Current approaches are often complicated and fail to provide the desired level of security and fault tolerance. A novel and very simple approach to …
Continue reading at www.ics.uci.edu (PS) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/083Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords

Similar Documents

Publication Publication Date Title
EP0720796B1 (en) System and method for changing the key or password in a secure distributed communications network
Molva et al. KryptoKnight authentication and key distribution system
Chang et al. An efficient and secure multi-server password authentication scheme using smart cards
US10897358B2 (en) Method for mapping at least two authentication devices to a user account using an authentication server
EP0254812B1 (en) Cryptovariable initialisation in a public key network
US6377691B1 (en) Challenge-response authentication and key exchange for a connectionless security protocol
Anderson et al. Programming Satan's computer
US6883095B2 (en) System and method for password throttling
US5978475A (en) Event auditing system
US20020087860A1 (en) Cryptographic data security system and method
CA2531411C (en) System and method for encrypting traffic on a network
JP5201716B2 (en) Cryptographic module distribution system, cryptographic management server device, cryptographic processing device, client device, cryptographic management program, cryptographic processing program, and client program
Norman et al. Analysis of probabilistic contract signing
WO2002017555A2 (en) Countering credentials copying
KR20030010667A (en) Systems, methods and software for remote password authentication using multiple servers
WO2000007326A1 (en) Methods and systems for establishing a shared secret using an authentication token
Hauser et al. Robust and secure password and key change method
Hauser et al. Robust and secure password and key change method
Kline et al. Encryption protocols, public key algorithms and digital signatures in computer networks
Kline et al. Public key vs. conventional key encryption
Just et al. Addressing the Problem of Undetected Signature Key Compromise.
Cao et al. Cryptanalysis and improvement of user authentication scheme using smart cards for multi-server environments
Steves et al. A protocol for secure transactions
Herlihy et al. Implementing distributed capabilities without a trusted kernel
Bettahar et al. Secure and efficient authentication framework for IoT-based smart home using dynamic key
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载