dc.contributor.author | Γκρίτζαλης, Δημήτριος | el |
dc.contributor.author | Κατσικάς, Σωκράτης Κ. | el |
dc.contributor.author | Γκρίτζαλης, Στέφανος | el |
dc.date.accessioned | 2015-06-13T13:26:43Z | |
dc.date.available | 2015-06-13T13:26:43Z | |
dc.date.issued | 2015-06-13 | |
dc.identifier.uri | http://hdl.handle.net/11400/15893 | |
dc.rights | Αναφορά Δημιουργού-Μη Εμπορική Χρήση-Όχι Παράγωγα Έργα 3.0 Ηνωμένες Πολιτείες | * |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/3.0/us/ | * |
dc.source | http://www.elsevier.com/ | en |
dc.subject | Login | |
dc.subject | Authentication | |
dc.subject | Passwords | |
dc.subject | Network security | |
dc.subject | Access control | |
dc.subject | Είσοδος | |
dc.subject | Πιστοποίηση | |
dc.subject | κωδικοί πρόσβασης | |
dc.subject | ασφάλεια δικτύων | |
dc.subject | έλεγχος πρόσβασης | |
dc.title | A zero knowledge probabilistic login protocol | en |
heal.type | journalArticle | |
heal.classification | Science | |
heal.classification | Mathematics | |
heal.classification | Επιστήμη | |
heal.classification | Μαθηματικά | |
heal.classificationURI | http://zbw.eu/stw/descriptor/15685-2 | |
heal.classificationURI | http://zbw.eu/stw/thsys/70269 | |
heal.classificationURI | **N/A**-Επιστήμη | |
heal.classificationURI | **N/A**-Μαθηματικά | |
heal.keywordURI | http://id.loc.gov/authorities/subjects/sh85009783 | |
heal.identifier.secondary | doi:10.1016/0167-4048(92)90129-F | |
heal.language | en | |
heal.access | campus | |
heal.publicationDate | 1992-12 | |
heal.bibliographicCitation | GRITZALIS, D., KATSIKAS, S.K. & GRITZALIS, S. (1992). A zero knowledge probabilistic login protocol. Computers & Security. [online] 11 (8). p. 733-746. Available from: http://www.elsevier.com/[Accessed 12/04/2002] | en |
heal.abstract | In the first part of this paper two techniques for system authentication via a password are analyzed. The first is a probabilistic protocol for the improvement of the login security mechanism and the second is a zero knowledge model for system authentication. Their major advantages and disadvantages are identified and commented upon. In the second part of the paper, a new protocol is proposed as a combination of the two, which establishes a new approach which is quite effective in the case of system-to-system authentication. This protocol avoids some of the limitations of the previously mentioned two techniques, while at the same time manages to merge several of the advantages of both. | en |
heal.publisher | Elsevier | en |
heal.journalName | Computers & Security | en |
heal.journalType | non peer-reviewed | |
heal.fullTextAvailability | true |
Οι παρακάτω άδειες σχετίζονται με αυτό το τεκμήριο: