Learn More
Password-based mechanism is the widely used method for authentication since it allows people to choose their own passwords without any assistant device to generate or store. However, people are used to choose easy-to-remember passwords such that guessing attacks could succeed. In 1992, Bellovin and Merritt proposed <i>Encrypted Key Exchange</i> (EKE)(More)
In an internet environment, such as UNIX, a remote user has to obtain the access right from a server before doing any job. The procedure of obtaining acess right is called a user authen-tication protocol. User authentication via user memorable password provides convenience without needing any auxiliary devices, such as smart card. A user authentication(More)