H.-Y. Chien∗
[1] N. Asokan, H. Debar, M. Steiner, & M. Waidner, Authenticat-ing public terminals, Computer Networks, 31, 1999, 861–970. [2] C.-Y. Cheng, K. Seman, & J. Yunus, Authentication publicterminals with smart cards, Proc. of TENCON 2000, 527–529. [3] H.Y. Chien, R.C. Wang, & C.C. Yang, Note on robust andsimple authentication protocol, The Computer Journal, 48 (1),2005, 27–29. [4] A.O. Frier, P. Kariton, & P.C. Kocher, The SSL Protocol:Version 3.0, Technical Report, Internet Draft, 1996. [5] J.T. Kohl & B.C. Neuman, The Kerberos Network Authenti-cation Service (V5), Internet Request for Comment RFC 1510,1993. [6] R. Ganesan, Yaksha: Augmenting Kerberos with public keycryptography, Proc. of IEEE Symposium on Network andDistributed System Security, 1995, 132–143. [7] J.S. Pierce & H. Mahaney, Opportunistic annexing handhelddevices: Opportunities and challenges, Proc. of HCIC 2004,2004. [8] S.N. Patel, J.S. Pierce, & G.D. Abowd, A gesture-basedauthentication scheme for un-trusted public terminals, Proc. ofthe 17th Annual ACM Symposium on User Interface Softwareand Technology Table of Contents, NM, USA, 2004, 157–160.
Important Links:
Go Back