共 18 条
[1]
Two Factor Authentication Using Mobile Phones
[J].
2009 IEEE/ACS INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, VOLS 1 AND 2,
2009,
:641-+
[2]
Infinite length hash chains and their applications
[J].
WET ICE 2002: ELEVENTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS,
2002,
:57-61
[3]
One-Time Password Authentication with Infinite Hash Chains
[J].
NOVEL ALGORITHMS AND TECHNIQUES IN TELECOMMUNICATIONS, AUTOMATION AND INDUSTRIAL ELECTRONICS,
2008,
:283-286
[5]
The N/R one time password system
[J].
ITCC 2005: International Conference on Information Technology: Coding and Computing, Vol 1,
2005,
:733-738
[6]
Haller N. M., 1994, Proceedings Internet Society Symposium on Network and Distributed System Security 1994, P151
[10]
A Design of One-Time Password Mechanism using Public Key Infrastructure
[J].
NCM 2008 : 4TH INTERNATIONAL CONFERENCE ON NETWORKED COMPUTING AND ADVANCED INFORMATION MANAGEMENT, VOL 1, PROCEEDINGS,
2008,
:18-24