作者: Cheng-Chi Lee , Min-Shiang Hwang , Chwei-Shyong Tsai
DOI: 10.6633/IJNS.200609.3(2).01
关键词:
摘要: Password authentication is one of the simplest and most convenient mechanisms to deal with secret data over insecure networks. It more frequently required in areas such as computer networks, wireless remote login systems, operation database management systems. In this paper, we shall present result our survey through all currently available password-authentication-related schemes get them classified terms several crucial criteria. To be critical, existing are vulnerable various attacks fail serve purposes an ideal password scheme should. order see how different compare situations, define possible goals that should withstand achieve. We hope offer here can also help future researchers develop better schemes.