1 |
D. Denning and G. Sacco, 'Timestamps in Key Distribution Systems,' Commun. ACM, Vol.24, No.8, pp.533-536, August, 1981
DOI
|
2 |
S. Kim, B. Kim, S. Park and S. Yen, 'Comments on Password-Based Private Key Download Protocol of NDSS '99,' Electron. Lett., Vol.35, No.22, pp.1937-1938, 1999
DOI
ScienceOn
|
3 |
W. C. Ku, C. M. Chen and H. L. Lee, 'Cryptoanalysis of a Variant of Peyravian- Zunic' s Password Authentication Scheme,' IEICE Trans. Commun., VoI.E86-B, No.5, pp. 1682-1684, May, 2003
|
4 |
한국정보보호진흥원, '일회용 패스워드 기술', http://www.kisa.or.kr/technology/sub4/password.htm, 1998
|
5 |
T. C. Yeh, H. Y. Shen and J. J. Hwang, 'A Secure One-Time Password Authentication Scheme Using Smart Cards,' IEICE Trans. Commun., Vol.E85-B, No.11, pp.2515-2518, Nov., 2002
DOI
|
6 |
N. Haller, C. Metz, P. Nesser and M. Straw, 'A one-time password system,' RFC 2289, Feb., 1998
|
7 |
N. Haller, 'The S/KEY one-time password,' RFC 1760, Feb., 1995
|
8 |
C. J. Mitchell and L. Chen, 'Comments on the S/KEY user authentication scheme,' ACM Operating Systems Review, Vol.30, No.4, pp.12-16, Oct., 1996
DOI
|