Search

Your search keyword '"Zero-knowledge password proof"' showing total 827 results

Search Constraints

Start Over You searched for: Descriptor "Zero-knowledge password proof" Remove constraint Descriptor: "Zero-knowledge password proof"
827 results on '"Zero-knowledge password proof"'

Search Results

1. DPPG: A Dynamic Password Policy Generation System

2. A provably secure password-based anonymous authentication scheme for wireless body area networks

3. A variant of password authenticated key exchange protocol

4. Provably leakage-resilient three-party password-based authenticated key exchange

5. Someone in Your Contact List: Cued Recall-Based Textual Passwords

6. Security Analysis of Password-Authenticated Key Retrieval

7. Untraceable biometric-based three-party authenticated key exchange for dynamic systems

8. One-time password authentication scheme based on the negative database

9. A novel secure and efficient hash function with extra padding against rainbow table attacks

10. Anonymous Password Authenticated Key Exchange Protocol in the Standard Model

11. Comment and modification of RSA based remote password authentication using smart card

12. A Provably Secure General Construction for Key Exchange Protocols Using Smart Card and Password

13. A New Efficient Chaotic Maps Based Three Factor User Authentication and Key Agreement Scheme

14. A novel three-party password-based authenticated key exchange protocol with user anonymity based on chaotic maps

15. An enhanced dynamic ID-based authentication scheme for telecare medical information systems

16. New Graphic Password Scheme Containing Questions-Background-Pattern and Implementation

17. An Improved Rainbow Table Attack for Long Passwords

18. Research on the Cloud Authentication on Anonymous One-Time Password Based on Fractional Function

19. Performance analysis and evaluation of secure password persuasive cued click points

20. Provably secure user authentication and key agreement scheme for wireless sensor networks

21. Password Security: An Analysis of Password Strengths and Vulnerabilities

22. Dual Layer Secured Password Manager using Blowfish and LSB

23. Verifier-based Password Authenticated 3P-EKE Protocol using PCLA keys

24. ENHANCED CIPHER METHOD FOR CLOUD AUTHENTICATION

25. A SIMPLISTIC MOBILE SOLUTION FOR PASSWORD SECURITY

26. An Efficient Remote User Password Authentication Scheme based on Rabin’s Cryptosystem

27. A privacy preserving three-factor authentication protocol for e-Health clouds

28. Secure Authentication Using Click Draw Based Graphical Password Scheme

29. The Shoulder Surfing Resistant Graphical Password Authentication Technique

30. Cued-Click Point Graphical Password Using Circular Tolerance to Increase Password Space and Persuasive Features

31. Towards Improving Storage Cost and Security Features of Honeyword Based Approaches

32. Automatic Fortified Password Generator System Using Special Characters

33. Secure Graphical One Time Password (GOTPass): An Empirical Study

34. A mobile authentication system resists to shoulder-surfing attacks

35. Efficient provably secure password-based explicit authenticated key agreement

36. Three Way Graphical Password Authentication

37. Provably Secure Password Reset Protocol: Model, Definition, and Construction

38. Access right management by extended password capabilities

39. A Security Analysis, and a Fix, of a Code-Corrupted Honeywords System

40. Mechanism on Computer Access Permission Management Based on the Proposed Dynamic Password Algorithm

42. An improved secure and efficient password and chaos-based two-party key agreement protocol

43. A Study of Interpretation Effect of Passwords to Password Generation

44. Design of a password-based authenticated key exchange protocol for SIP

45. Multi Server Password Authenticated Key Exchange Using Attribute-Based Encryption

46. Hash Based Multi-server Key Exchange Protocol Using Smart Card

47. Cracking More Password Hashes With Patterns

48. An Efficient Remote User Authentication with Key Agreement Scheme Using Elliptic Curve Cryptography

49. Provably secure extended chaotic map-based three-party key agreement protocols using password authentication

50. Design and Analysis of Bilinear Pairing Based Mutual Authentication and Key Agreement Protocol Usable in Multi-server Environment

Catalog

Books, media, physical & digital resources