A method for remote user authentication is proposed that requires only public information to be stored at the verifying host. Like the S/KEY scheme, the new technique uses only symmetric cryptography and is resistant to eavesdropping, but, unlike S/KEY, it is resistant to host impersonation attacks. The avoidance of asymmetric cryptographic techniques makes the scheme appropriate for low cost user authentication devices. © Springer-Verlag Berlin Heidelberg 2003.
CITATION STYLE
Mitchell, C. J. (2003). Remote user authentication using public information. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2898, 360–369. https://doi.org/10.1007/978-3-540-40974-8_28
Mendeley helps you to discover research relevant for your work.