Authentication Scheme for Multi-Server Environment
Abstract
Keywords
Full Text:
PDFReferences
A. S. Anagun and I. Cin, “A neural-network-based computer access security system for multiple users,” in Proc. 23rd Int. Conf. Comput. Ind. Eng., vol. 35, 1998, pp. 351–354.
R. K. Bauer, T. A. Berson, and R. J. Feiertag, “A key distribution protocol using event markers,” ACM Trans. Comput. Syst., vol.1, pp. 249–255, 1983.
S. Bleha and M. S. Obaidat, “Dimensionality reduction and feature extraction applications in identifying computer users,” IEEE Trans. Syst., Man, Cybern., vol. 21, pp. 452–456, Mar. /Apr. 1991.
C. C. Chang, S. M. Tsu, and C. Y. Chen, “Remote scheme for password authentication based on theory of quadratic residues,” Comput. Commun. vol. 18, pp. 936–942, Dec. 1995.
Li-Hua Li, Chang Lin and Hwang, “A Remote Password Authentication Scheme for MultiServer Architecture Using Neural Networks”, IEEE Transactions on Neural Networks, 2001
Shahbaz Zahr Reyhani and Mehregan Mahdavi “User Authentication Using Neural Network in Smart Home Networks”, International Journal of Smart Home, 2007
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.