8   Artículos

 
en línea
Xiaotong Cui, Hongxin Zhang, Xing Fang, Yuanzhen Wang, Danzhi Wang, Fan Fan and Lei Shu    
The leakage signals, including electromagnetic, energy, time, and temperature, generated during the operation of password devices contain highly correlated key information, which leads to security vulnerabilities. In traditional encryption algorithms, th... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Xiaozhou Guo, Yi Liu, Kaijun Tan, Wenyu Mao, Min Jin and Huaxiang Lu    
In password guessing, the Markov model is still widely used due to its simple structure and fast inference speed. However, the Markov model based on random sampling to generate passwords has the problem of a high repetition rate, which leads to a low cov... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Anuj Kumar Singh, Arun Solanki, Anand Nayyar and Basit Qureshi    
In the modern computing environment, smart cards are being used extensively, which are intended to authenticate a user with the system or server. Owing to the constrictions of computational resources, smart card-based systems require an effective design ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Ali A. Yassin, Jian Yao and Shiyao Han    
In 2009, Xu et al. presented a safe, dynamic, id-based on remote user authentication method that has several advantages such as freely chosen passwords and mutual authentication. In this paper, we review the Xu?Zhu?Feng scheme and indicate many shortcomi... ver más
Revista: Computers    Formato: Electrónico

« Anterior     Página: 1 de 1     Siguiente »