Hauser et al., 1994 - Google Patents
Robust and secure password and key change methodHauser et al., 1994
View PS- Document ID
- 17613900965691297812
- Author
- Hauser R
- Janson P
- Molva R
- Tsudik G
- Van Herreweghen E
- Publication year
- Publication venue
- European Symposium on Research in Computer Security
External Links
Snippet
This paper discusses issues and idiosyncrasies associated with changing passwords and keys in distributed computer systems. Current approaches are often complicated and fail to provide the desired level of security and fault tolerance. A novel and very simple approach to …
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/083—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| EP0720796B1 (en) | System and method for changing the key or password in a secure distributed communications network | |
| Molva et al. | KryptoKnight authentication and key distribution system | |
| Chang et al. | An efficient and secure multi-server password authentication scheme using smart cards | |
| US10897358B2 (en) | Method for mapping at least two authentication devices to a user account using an authentication server | |
| EP0254812B1 (en) | Cryptovariable initialisation in a public key network | |
| US6377691B1 (en) | Challenge-response authentication and key exchange for a connectionless security protocol | |
| Anderson et al. | Programming Satan's computer | |
| US6883095B2 (en) | System and method for password throttling | |
| US5978475A (en) | Event auditing system | |
| US20020087860A1 (en) | Cryptographic data security system and method | |
| CA2531411C (en) | System and method for encrypting traffic on a network | |
| JP5201716B2 (en) | Cryptographic module distribution system, cryptographic management server device, cryptographic processing device, client device, cryptographic management program, cryptographic processing program, and client program | |
| Norman et al. | Analysis of probabilistic contract signing | |
| WO2002017555A2 (en) | Countering credentials copying | |
| KR20030010667A (en) | Systems, methods and software for remote password authentication using multiple servers | |
| WO2000007326A1 (en) | Methods and systems for establishing a shared secret using an authentication token | |
| Hauser et al. | Robust and secure password and key change method | |
| Hauser et al. | Robust and secure password and key change method | |
| Kline et al. | Encryption protocols, public key algorithms and digital signatures in computer networks | |
| Kline et al. | Public key vs. conventional key encryption | |
| Just et al. | Addressing the Problem of Undetected Signature Key Compromise. | |
| Cao et al. | Cryptanalysis and improvement of user authentication scheme using smart cards for multi-server environments | |
| Steves et al. | A protocol for secure transactions | |
| Herlihy et al. | Implementing distributed capabilities without a trusted kernel | |
| Bettahar et al. | Secure and efficient authentication framework for IoT-based smart home using dynamic key |