|
|
|
Xiaotong Cui, Hongxin Zhang, Xing Fang, Yuanzhen Wang, Danzhi Wang, Fan Fan and Lei Shu
The leakage signals, including electromagnetic, energy, time, and temperature, generated during the operation of password devices contain highly correlated key information, which leads to security vulnerabilities. In traditional encryption algorithms, th...
ver más
|
|
|
|
|
|
|
Xiaozhou Guo, Yi Liu, Kaijun Tan, Wenyu Mao, Min Jin and Huaxiang Lu
In password guessing, the Markov model is still widely used due to its simple structure and fast inference speed. However, the Markov model based on random sampling to generate passwords has the problem of a high repetition rate, which leads to a low cov...
ver más
|
|
|
|
|
|
|
Anuj Kumar Singh, Arun Solanki, Anand Nayyar and Basit Qureshi
In the modern computing environment, smart cards are being used extensively, which are intended to authenticate a user with the system or server. Owing to the constrictions of computational resources, smart card-based systems require an effective design ...
ver más
|
|
|
|
|
|
|
Ali A. Yassin, Jian Yao and Shiyao Han
In 2009, Xu et al. presented a safe, dynamic, id-based on remote user authentication method that has several advantages such as freely chosen passwords and mutual authentication. In this paper, we review the Xu?Zhu?Feng scheme and indicate many shortcomi...
ver más
|
|
|
|