ASIA unversity:Item 310904400/25375
English  |  正體中文  |  简体中文  |  Items with full text/Total items : 90451/105768 (86%)
Visitors : 11038765      Online Users : 567
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version

    Please use this identifier to cite or link to this item:

    Title: Guessing Attacks on Strong-Password Authentication Protocol
    Authors: Le, Cheng-Chi;Lee, Cheng-Chi;Li, Chia-Hsin;Liu, Chia-Hsin;黃明祥;Hwang, Min-Shiang
    Contributors: 資訊工程學系
    Keywords: Authentication;cryptography;guessing attack;hash function;password
    Date: 2013-01
    Issue Date: 2013-07-11 14:19:18 (UTC+8)
    Abstract: Password authentication is the most important and convenient protocol for verifying users to get the system's
    resources. Lin et al. had proposed an optimal strongpassword authentication protocol (OSPA) which is a onetime password method. It can protect against the replaying attacks, impersonation attacks, and denial of service
    attacks. However, the authors shall show that the OSPA
    protocol is vulnerable to the guessing attacks in this paper.
    Relation: International Journal of Network Security
    Appears in Collections:[Department of Computer Science and Information Engineering] Journal Artical

    Files in This Item:

    File SizeFormat

    All items in ASIAIR are protected by copyright, with all rights reserved.

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback