ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
1
views
0
references
Top references
cited by
5
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
1,794
similar
All similar
Record
: found
Abstract
: not found
Article
: not found
A password authentication scheme with secure password updating
Author(s):
Chun-Li Lin
,
Tzonelih Hwang
Publication date
Created:
January 2003
Publication date
(Print):
January 2003
Journal:
Computers & Security
Publisher:
Elsevier BV
Read this article at
ScienceOpen
Publisher
Review
Review article
Invite someone to review
Bookmark
Cite as...
There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
ScienceOpen Research
Author and article information
Journal
Title:
Computers & Security
Abbreviated Title:
Computers & Security
Publisher:
Elsevier BV
ISSN (Print):
01674048
Publication date Created:
January 2003
Publication date (Print):
January 2003
Volume
: 22
Issue
: 1
Pages
: 68-72
Article
DOI:
10.1016/S0167-4048(03)00114-7
SO-VID:
7ff1bdad-b881-4c90-9578-0b9bc1f2645c
Copyright ©
© 2003
License:
http://www.elsevier.com/tdm/userlicense/1.0/
History
Data availability:
Comments
Comment on this article
Sign in to comment
scite_
Similar content
1,794
My(o) Armband Leaks Passwords: An EMG and IMU Based Keylogging Side-Channel Attack
Authors:
Matthias Gazzari
,
Annemarie Mattmann
,
Max Maass
…
Unbreakable distributed storage with quantum key distribution network and password-authenticated secret sharing
Authors:
M. C. Fujiwara
,
A Waseda
,
R. Nojima
…
The true cost of unusable password policies
Authors:
Philip G. Inglesant
,
M. Sasse
See all similar
Cited by
5
Elliptic curve cryptography based mutual authentication scheme for session initiation protocol
Authors:
N. Ikram
,
R. Arshad
Cryptanalysis of Arshad et al.’s ECC-based mutual authentication scheme for session initiation protocol
Authors:
Xinsong Liu
,
Hongbin Tang
A new password authentication and user anonymity scheme based on elliptic curve cryptography and smart card
Authors:
Chun-Ta Li
See all cited by