共 18 条
[1]
Two Factor Authentication Using Mobile Phones
[J].
2009 IEEE/ACS INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, VOLS 1 AND 2,
2009,
:641-+
[2]
[Anonymous], 2016, HDB APPL CRYPTOGRAPH
[3]
Infinite length hash chains and their applications
[J].
WET ICE 2002: ELEVENTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS,
2002,
:57-61
[4]
One-Time Password Authentication with Infinite Hash Chains
[J].
NOVEL ALGORITHMS AND TECHNIQUES IN TELECOMMUNICATIONS, AUTOMATION AND INDUSTRIAL ELECTRONICS,
2008,
:283-286
[6]
The N/R one time password system
[J].
ITCC 2005: International Conference on Information Technology: Coding and Computing, Vol 1,
2005,
:733-738
[7]
Haller N. M., 1994, Proceedings Internet Society Symposium on Network and Distributed System Security 1994, P151
[8]
Hallsteinsen S, 2007, INT C SYST NETW COMM, P68