:::

詳目顯示

回上一頁
題名:安全的線上身分鑑別協定
書刊名:明新學報
作者:葉慈章 引用關係
作者(外文):Yeh, Tzu Chang
出版日期:2004
卷期:30
頁次:頁149-158
主題關鍵詞:鑑別電子商務通行碼智慧卡安全AuthenticationElectronic commercePasswordSmart cardSecurity
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(0) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:0
  • 共同引用共同引用:0
  • 點閱點閱:33
期刊論文
1.Bennett, R. A.(2001)。I didn't do it。USBanker。  new window
2.Wu, T. C.、Chang, C. C.(1991)。A password authentication scheme based on discrete logarithms。International Journal of Computer Mathematics,41(3/4),31-38。  new window
3.Wu, Tzong-chen、Wu, Tzong-sun(19940100)。Id-Based Remote Login Authentication Scheme Based on Cross Product Operations。資訊管理與工程學報,1(2),7-13。  new window
4.Chang, C. C.、Wu, T. C.(1997)。A smart card oriented password authentication scheme based on Rabin's public key cryptosystem。International Journal of Information and Management Sciences,8(3),63-73。  new window
5.Chang, C. C.、Wu, T. C.(1991)。Remote password authentication with smart cards。IEE Proceedings E: Computers and Digital Techniques,138(3),165-168。  new window
6.Chang, C. C.、Wu, T. C.、Laih, C. S.(1995)。Cryptanalysis of a password authentication scheme using quadratic residues。Computer Communications,18(1),45-47。  new window
7.Ammenheuser, M.(2002)。The business case for biometrics。Bank Systems & Technology。  new window
8.Neuman, B. C.、Ts'o, T.(1994)。Kerberos: An Authentication Service for Computer Networks。IEEE Communications,32(9),33-38。  new window
9.Kwon, T.、Song, J.(1999)。Secure agreement scheme for gxy via password authentication。Electronics Letters,35(11),892-893。  new window
10.Lennon, R. E.、Matyas, S. M.、Meyer, C. H.(1981)。Cryptographic authentication of time-invariant quantities。IEEE Transactions on Communications,COM-29(6),773-777。  new window
11.Kwon, T.、Song, J.(1998)。Efficient and secure password-based authentication protocols against guessing attacks。Computer Communications,21(9),853-861。  new window
12.張真誠、吳玲華(19900600)。A New Password Authentication Scheme。Journal of Information Science and Engineering,6(2),139-147。  new window
13.Lin, C. H.、Chang, C. C.、Wu, T. C.、Lee, R. C. T.(1991)。Password authentication using newton's interpolation polynomials。Information Systems,16(1),97-102。  new window
14.Chang, C. C.、Hwang, S. J.(1993)。Using smart cards to authenticate remote passwords。Computers and Mathematics with Applications,26(7),19-27。  new window
15.Lamport, L.(1981)。Password Authentication with Insecure Communication。Communications of the ACM,24(11),770-772。  new window
會議論文
1.Fumy, W.、Pfau, A.(1989)。On the complexity of asymmetric smart card authentication。Second International Smart Card 2000 Conferenece。Amsterdam。181-190。  new window
2.Shamir, A.(1985)。Identity-based cryptosystems and signature schemes。CRYPTO '84,47-53。  new window
3.Boyko, V.、MacKenzie, P.、Patel, S.(2000)。Provably secure password authenticated key exchange using Diffie。EUROCRYPT 2000,156-171。  new window
4.Jablon, D.(1997)。Extended password key exchange protocols immune to dictionary attack。WETICE Workshop on Enterprise Security。  new window
5.Wu, T.(1998)。Secure remote password protocol。1998 Internet Society Network and Distributed System Security Symposium。San Diego, CA。97-111。  new window
6.Kwon, T.(2001)。Authentication and key agreement via memorable passwords。NDSS 2001 Symposium。  new window
7.Halevi, S.、Krawczyk, H.(1998)。Public-key cryptography and password protocols。5th ACM Conference on Computer and Communications Security,122-131。  new window
8.Harn, L.、Huang, D.、Laih, C. S.(1989)。Password authentication based on public-key distribution cryptosystem。Fifth International Conference on Data Engineering。Los Angeles。  new window
9.Hwang, T. Y.(1983)。Passwords authentication using public-key encryption。1983 IEEE International Carnahan Conference on Security Technology。Zurich。35-38。  new window
10.Bellovin, S.、Merritt, M.(1993)。Augmented encrypted key exchange: A password-based protocol secure against dictionary attacks and password-file compromise。1st ACM Conference on Computer and Communications Security,244-250。  new window
其他
1.Ho, D.(20020124)。Identity theft is top consumer fraud complaint of 2001,http://www.msidenaplesxom/02/01/business/d741589a.htm, 。  new window
2.孫承武(2001)。北市警方偵破駭客入侵網路銀行盜領一百餘萬,http://leaddniexom.tw/leadtime/news/security/北市警方偵破駭客入侵網路銀行盜領一百餘萬(Yahoo-2001.05.02).mht。  延伸查詢new window
3.張慧雯(2001)。騙取語音密碼一連三起,http://ec.chinatimesxom.tw/scripts/chinatimes/iscstext.exe?DB=ChinaTimes&Function=ListDoc&From=5&Single=l。  new window
4.(1996)。Information technology--Open Systems Interconnection--Security frameworks for open systems: Authentication framework(ISO/IEC 10181-2)。  new window
5.Information technology--Security techniques--Entity authentication--Part 5: Mechanisms using zero-knowledge techniques(ISO/IEC 9798-5:2009)。  new window
6.(2002)。提款機盜錄密碼八銀行失金,http://www.cts.com.tw/news/headlines/news20020410N3.htm。  延伸查詢new window
7.(1997)。Information technology--Open Systems Interconnection--The Directory: Authentication framework(ISO/IEC 9594-8)。(ITU-T Rec. X.509)。  new window
8.Paul, F.(20001027)。Microsoft computer network hacked; FBI steps in,http://news.cnet.com/news/0-1003-200-3308084.html。  new window
9.Kohl, J.,Neuman, C.(1993)。The Kerberos Network Authentication Service (V5),http://www.ietf.org/rfc/rfc1510.txt,(RFC1510)。  new window
10.Phoenix Technologies Ltd。Zero-Knowledge Password Proofs,http://www.integritvsciences.com/password.html。  new window
11.Beilare, M.,Rogaway, P.。The AuthA protocol for password-based authenticated key exchange,IEEE P1363 study group for Future PKC Standards。  new window
12.MacKenzie, P.,Swaminathan, R.(1999)。Secure network authentication with password information(IEEE P1363a)。  new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
QR Code
QRCODE