1 |
William Stallings, Network Security Essentials : Application and Standards, Prentice Hall, 1999.
|
2 |
William Stallings, Cryptography and Network Security : Principles and Practice, Prentice Hall, 1999.
|
3 |
Charlie Kaufman, Radia Perlman and Mike Speciner, Network Security : Private Communication in a Public World, Prentice Hall, 1995.
|
4 |
Ravi Sandhu and Pierangela Samarati, "Authentication, Access Control, and Audit," ACM Computing Surveys, 28(1), pp.241-243, March 1996.
DOI
|
5 |
B.C. Neuman and Theodore Ts'o. Kerberos, "An Authentication Service for Computer Networks," IEEE Communications, 32(9), pp.33-38, September 1994.
DOI
|
6 |
Shai Halevi and Hugo Krawczyk, "Public-key Cryptography and Password Protocols," ACM Transactions on Information and System Security, 2(3), pp.230-268, August 1999.
DOI
|
7 |
James Giles, Reiner Sailer, Dinesh Verma, and Suresh Chari, "Authentication for Distributed Web Caches," Lecture Notes in Computer Science, Vol. 2502, Springer-Verlag, pp.126-145, 2002.
DOI
|
8 |
Ferdinand J. Dafelmair, "Survivability Strategy for a Security Critical Process," Lecture Notes in Computer Science, Vol. 2434, Springer-Verlag, pp.61-69, 2002.
DOI
|
9 |
Jonathan Katz, Rafail Ostrovsky, and Moti Yung, "Forward Secrecy in Password-Only Key Exchange Protocols," Lecture Notes in Computer Science, Vol. 2576, Springer-Verlag, pp.29-44, 2002.
|
10 |
Yasunori Ishihara, Shuichiro Ako, and Toru Fujiwara, "Security against Inference Attacks on Negative Information in Object-Oriented Databases," Lecture Notes in Computer Science, Vol. 2513, Springer-Verlag, pp.49-60, 2002.
|
11 |
Donk-Kwan Kim, Seung-Soo Shin, "Three-Factor authentication system based on one time password," Proceedings of the KAIS Fall conference, The Korea Academia-Industrial cooperation Society, pp.25-28, 2008.
|