2017
DOI: 10.1007/978-3-319-58808-7
|View full text |Cite
|
Sign up to set email alerts
|

Advances in User Authentication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
36
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 58 publications
(36 citation statements)
references
References 0 publications
0
36
0
Order By: Relevance
“…It is obvious that then he is able to share reliable key after completing the protocol. Such problem has to be solved by some additional activity of legitimate users, in order to reject falsely shared key before its implementation for encryption of secure messages [27].…”
Section: Security Of the Proposed Key Sharing Protocolmentioning
confidence: 99%
“…It is obvious that then he is able to share reliable key after completing the protocol. Such problem has to be solved by some additional activity of legitimate users, in order to reject falsely shared key before its implementation for encryption of secure messages [27].…”
Section: Security Of the Proposed Key Sharing Protocolmentioning
confidence: 99%
“…The authentication system directly influences the quality of Internet web services, in terms of usability. There is a tradeoff between the complexity of the authentication system and the service usability [4,5].…”
Section: Introductionmentioning
confidence: 99%
“…As a result, human user often resorts to storing identifiers and passwords in browsers memories or in easily accessible, visible files. They tend to use predictable graphic passwords and, sometimes, the same identifiers and passwords are in use for multiple websites [4,6].…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations