完整後設資料紀錄
DC 欄位語言
dc.contributor.authorKu, Wei-Chi
dc.contributor.authorTsai, Hao-Chuan
dc.contributor.authorTsaur, Maw-Jinn
dc.date.accessioned2009-06-02T06:39:12Z
dc.date.accessioned2020-05-25T06:41:00Z-
dc.date.available2009-06-02T06:39:12Z
dc.date.available2020-05-25T06:41:00Z-
dc.date.issued2006-10-16T05:38:00Z
dc.date.submitted2004-12-15
dc.identifier.urihttp://dspace.lib.fcu.edu.tw/handle/2377/1559-
dc.description.abstractTo resist off-line password guessing attacks without using public-key techniques, many newer hash-based one-time password authentication schemes additionally employ a smart card to generate a one-time high-entropy passcode from the userchosen fixed password. Among these schemes, some require synchronous update of stored data in the user’s smart card and the server. Herein, we show that such schemes tend to suffer from denial-ofservice attacks by using three illustrative examples.
dc.description.sponsorship大同大學,台北市
dc.format.extent4p.
dc.format.extent559224 bytes
dc.format.mimetypeapplication/pdf
dc.language.isozh_TW
dc.relation.ispartofseries2004 ICS會議
dc.subjectpassword authentication
dc.subjectdata synchronization
dc.subjectsmart card
dc.subjectdenial-of-service attack
dc.subject.otherInformation Security
dc.titleA Common Weakness of Password Authentication Schemes Requiring Synchronous Update of Stored Data
分類:2004年 ICS 國際計算機會議

文件中的檔案:
檔案 描述 大小格式 
ce07ics002004000145.pdf546.12 kBAdobe PDF檢視/開啟


在 DSpace 系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。