共 15 条
[1]
[Anonymous], 2006, NIST SPEC PUBL
[2]
[Anonymous], 2012, FIPS PUB, V180
[3]
Boneh D, 1999, LECT NOTES COMPUT SC, V1592, P1
[4]
One-Time Password Authentication with Infinite Hash Chains
[J].
NOVEL ALGORITHMS AND TECHNIQUES IN TELECOMMUNICATIONS, AUTOMATION AND INDUSTRIAL ELECTRONICS,
2008,
:283-286
[5]
El-Booz Sheren A., 2015, 978150900275715 IEEE, P188
[6]
Elganzoury HS, 2017, INT J SECUR APPL, V11, P77, DOI 10.14257/ijsia.2017.11.8.06
[7]
Elganzoury Hisham S, 2015, INT J COMPUTER APPL, V123, P33
[8]
Haller N. M., 1994, Proceedings Internet Society Symposium on Network and Distributed System Security 1994, P151
[9]
Khoo Khoongming, 2006, LNCS, V3989, P239
[10]
A Design of One-Time Password Mechanism using Public Key Infrastructure
[J].
NCM 2008 : 4TH INTERNATIONAL CONFERENCE ON NETWORKED COMPUTING AND ADVANCED INFORMATION MANAGEMENT, VOL 1, PROCEEDINGS,
2008,
:18-24