搜索历史记录选项已关闭,请开启搜索历史记录选项。
作者: Mike Scott
DOI:
关键词:
摘要: … Token based schemes are often based on expensive (and irreplaceable) smart-card tokens, while password-only schemes require that a unique password is shared between every pair …
public key cryptography,2012, 引用: 34
network and distributed system security symposium,2007, 引用: 148
Cryptography and Coding,2011, 引用: 12
international conference on information security and cryptology,2013, 引用: 1
,2011, 引用: 1
,2012, 引用: 0
,2006, 引用: 3
Advances in Cryptology – EUROCRYPT 2012,2012, 引用: 33
,2013, 引用: 9
IACR Cryptology ePrint Archive,2005, 引用: 43