A high security log-in procedure

@article{Purdy1974AHS,
  title={A high security log-in procedure},
  author={G. Purdy},
  journal={Commun. ACM},
  year={1974},
  volume={17},
  pages={442-445}
}
  • G. Purdy
  • Published 1974
  • Computer Science
  • Commun. ACM
The protection of time sharing systems from unauthorized users is often achieved by the use of passwords. By using one-way ciphers to code the passwords, the risks involved with storing the passwords in the computer can be avoided. We discuss the selection of a suitable one-way cipher and suggest that for this purpose polynomials over a prime modulus are superior to one-way ciphers derived from Shannon codes. 
136 Citations
A password authentication scheme based on discrete logarithms
  • 1
Password authentication based on public-key distribution cryptosystem
  • L. Harn, D. Huang, C. Laih
  • Computer Science
  • [1989] Proceedings. Fifth International Conference on Data Engineering
  • 1989
  • 2
  • PDF
Multiuser cryptographic techniques
  • 241
  • PDF
Some Open Problems In Cryptography
  • C. Leung
  • Computer Science
  • ACM Annual Conference
  • 1978
Logical authentication method
  • 4
Cryptographic Authentication of Time-Invariant Quantities
  • 100
A new key authentication scheme based on discrete logarithms
  • 53
  • PDF
The Design of a Cryptography Based Secure File System
  • E. Gudes
  • Computer Science
  • IEEE Transactions on Software Engineering
  • 1980
  • 61
A public-key based dynamic password scheme
  • L. Harn
  • Computer Science
  • [Proceedings] 1991 Symposium on Applied Computing
  • 1991
  • 11
Two phases encryption and its applications
...
1
2
3
4
5
...