Simple quantum password checking

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Proactive Password Checking

This paper presents generic requirements for proactive password changer. It then examines two of the most popular, publicly-available programs to see how well they meet the requirements. Future directions are examined, as well as alternatives to such checkers.

متن کامل

PSV (Password Security Visualizer): From Password Checking to User Education

This paper presents the Password Security Visualizer (PSV), an interactive visualization system specifically designed for password security education. PSV can be seen as a reconfigurable “box” containing different proactive password checkers (PPCs) and visualizers of password security information, allowing it to be used like a “many in one” or “hybrid” PPC. PSV can provide many new features tha...

متن کامل

Improving system security via proactive password checking

As the Internet has grown, its user community has changed from a small tight knit group of researchers to a loose gathering of people on a global network. The amazing and constantly growing numbers of machines and users ensures that untrustworthy individuals have full access to that network. High speed inter-machine communication and even higher speed computational processors have made the thre...

متن کامل

Pretty-Simple Password-Authenticated Key-Exchange Protocol

In this paper, we propose pretty simple password-authenticated key-exchange protocol which is based on the difficulty of solving DDH problem. It has the following advantages: (1) Both y1 and y2 in our protocol are independent and thus they can be pre-computed and can be sent independently. This speeds up the protocol. (2) Clients and servers can use almost the same algorithm. This reduces the i...

متن کامل

Simple Password-Based Encrypted Key Exchange Protocols

Password-based encrypted key exchange are protocols that are designed to provide pair of users communicating over an unreliable channel with a secure session key even when the secret key or password shared between two users is drawn from a small set of values. In this paper, we present two simple password-based encrypted key exchange protocols based on that of Bellovin and Merritt. While one pr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Physical Review A

سال: 2015

ISSN: 1050-2947,1094-1622

DOI: 10.1103/physreva.91.062310