Online citations, reference lists, and bibliographies.

Password Authentication With Insecure Communication

L. Lamport
Published 1981 · Computer Science

Cite This
Download PDF
Analyze on Scholarcy
Share
A method of user password authentication is described which is secure even if an intruder can read the system's data, and can tamper with or eavesdrop on the communication between the user and the system. The method assumes a secure one-way encryption function and can be implemented with a microcomputer in the user's terminal.
This paper references



This paper is referenced by
A Study of Micro-payment Based on One-way Hash Chain
M. Hwang (2006)
10.1109/NSITNSW.2015.7176384
One time password authentication scheme based on elliptic curves for Internet of Things (IoT)
V. L. Shivraj (2015)
10.1109/SECCOM.2007.4550354
RoK: A robust key pre-distribution protocol for multi-phase wireless sensor networks
C. Castelluccia (2007)
10.1109/ICCIT.2007.291
Obfuscated Dechiper Routine Analysis Using Theorem Prover for Information Protection
R. Ando (2007)
Proxychain: Developing a Robust and Efficient Authentication Infrastructure for Carrier-Scale VoIP Networks
Italo Dacosta (2010)
Manoj Kumar : On the security of an efficient remote user authentication scheme using smart cards 1 Security Pitfalls of an efficient remote user authentication scheme using smart cards
M. Kumar (2004)
10.1109/TWC.2009.070032
Enhanced delegation-based authentication protocol for PCSs
Tian-Fu Lee (2009)
A Cloud-assisted Passenger Authentication Scheme for Japan Rail Pass Based on Image Morphing
Yanjun Liu (2019)
10.1109/ANCS.2017.25
An Attack-Resilient Source Authentication Protocol in Controller Area Network
K. Kang (2017)
Privacy Preserving Aggregation of Distributed Mobility Data Streams
T. Liebig (2014)
10.1145/303297.303305
On the efficient implementation of fair non-repudiation
Cheng-Hwee You (1998)
Slander Resistant Attacker Isolation in Ad Hoc Networks
Qijun Gu (2005)
10.1109/WICOM.2008.1173
Efficient Anonymous Sever-Supported Signature Protocol Based on Multipath Hash Chain
Zhen-Rong Zhu (2008)
10.1145/1456508.1456519
Beacon certificate push revocation
J. Solworth (2008)
10.1007/S11071-013-1029-Y
An extended chaotic maps based user authentication and privacy preserving scheme against DoS attacks in pervasive and ubiquitous computing environments
C. Li (2013)
10.1080/19393555.2018.1516835
Key management in tree shaped hierarchies
L. Lopriore (2018)
10.1109/JSAC.2006.877223
ARSA: An Attack-Resilient Security Architecture for Multihop Wireless Mesh Networks
Yanchao Zhang (2006)
10.6633/IJNS.200611.3(3).07
Authentication and Key Agreement Protocols Preserving Anonymity
Kumar V. Mangipudi (2006)
10.1007/s11277-016-3418-2
An Untraceable Biometric-Based Multi-server Authenticated Key Agreement Protocol with Revocation
C. Chang (2016)
10.1007/s11277-017-4310-4
Cryptanalysis and Improvement of an Anonymous Multi-server Authenticated Key Agreement Scheme
S. Kumari (2017)
10.1007/s11036-006-0008-7
Privacy-enhanced, Attack-resilient Access Control in Pervasive Computing Environments with Optional Context Authentication Capability
K. Ren (2007)
10.1109/INDCON.2006.302819
A Novel Dynamic ID-Based Remote User Authentication Scheme
M. Misbahuddin (2006)
10.1109/PST.2016.7907012
A novel hash chain construction for simple and efficient authentication
Yuta Kurihara (2016)
HIERARCHICAL ROUTING IN MANETS USING SIMPLE CLUSTERING
Adam Carnine (2009)
10.1109/ISPDC.2009.23
SAEP: Secure and Accurate and Energy-Efficient Time Synchronization in Wireless Sensor Networks
K. Kim (2009)
10.1109/NBiS.2009.17
Per-Connection Return Routability Test in Mobile IPv6
Hengky Susanto (2009)
10.1109/IWCFTA.2009.50
The Design and Implementation of Password Authentication System Based on Chaos
Nan Jiang (2009)
Cryptanalysis and improvement of Park et al.'s remote user authentication protocol
Xie Qi (2010)
10.1007/s12243-009-0123-0
MUQAMI+: a scalable and locally distributed key management scheme for clustered sensor networks
Syed Muhammad Khaliq-ur-Rahman Raazi (2010)
10.1109/AICCSA.2010.5586993
An efficient source authentication scheme in wireless sensor networks
Wafa Ben Jaballah (2010)
10.1109/I-SOCIETY16502.2010.6018817
Improvement of the dynamic ID-based remote user authentication scheme
Rafael Martínez-Peláez (2010)
10.1007/s11036-011-0303-9
Security Attack Safe Mobile and Cloud-based One-time Password Tokens Using Rubbing Encryption Algorithm
Fred Cheng (2011)
See more
Semantic Scholar Logo Some data provided by SemanticScholar