A password authentication scheme over insecure networks

@article{Liao2006APA,
  title={A password authentication scheme over insecure networks},
  author={I-En Liao and Cheng-Chi Lee and Min-Shiang Hwang},
  journal={J. Comput. Syst. Sci.},
  year={2006},
  volume={72},
  pages={727-740}
}
Authentication ensures that system's resources are not obtained fraudulently by illegal users. Password authentication is one of the simplest and the most convenient authentication mechanisms over insecure networks. The problem of password authentication in an insecure networks is present in many application areas. Since computing resources have grown tremendously, password authentication is more frequently required in areas such as computer networks, wireless networks, remote login, operation… CONTINUE READING

Citations

Publications citing this paper.
SHOWING 1-10 OF 181 CITATIONS

Requirements for secure graphical password schemes

  • 2014 IST-Africa Conference Proceedings
  • 2014
VIEW 5 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

Efficient and complete remote authentication scheme with smart cards

  • 2008 IEEE International Conference on Intelligence and Security Informatics
  • 2008
VIEW 6 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

Two-factor mutual authentication based on smart cards and passwords

VIEW 10 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

Drawbacks of Liao et al.'s Password Authentication Scheme

  • International Conference on Next Generation Web Services Practices
  • 2006
VIEW 4 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

Formal Analysis and Systematic Construction of Two-factor Authentication Scheme

  • IACR Cryptology ePrint Archive
  • 2006
VIEW 10 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

FILTER CITATIONS BY YEAR

2006
2019

CITATION STATISTICS

  • 17 Highly Influenced Citations

  • Averaged 7 Citations per year from 2017 through 2019

References

Publications referenced by this paper.
SHOWING 1-10 OF 41 REFERENCES