Sun 등이 제안한 착용 가능한 토큰 시스템의 취약점 분석에 관한 연구
Vol. 20, No. 5, pp. 81-88,
10월.
2010
10.13089/JKIISC.2010.20.5.81, Full Text:
Keywords: wearable token, authentication, offline password guessing attack, Man-in-the-middle Attack
Abstract Statistics
Cite this article
10.13089/JKIISC.2010.20.5.81, Full Text:
Keywords: wearable token, authentication, offline password guessing attack, Man-in-the-middle Attack
Abstract Statistics
Cite this article
[IEEE Style]
J. Kim and H. Choi, "Weaknesses of the new design of wearable token system proposed by Sun et al.," Journal of The Korea Institute of Information Security and Cryptology, vol. 20, no. 5, pp. 81-88, 2010. DOI: 10.13089/JKIISC.2010.20.5.81.
[ACM Style]
Jung-Yoon Kim and Hyoung-Kee Choi. 2010. Weaknesses of the new design of wearable token system proposed by Sun et al.. Journal of The Korea Institute of Information Security and Cryptology, 20, 5, (2010), 81-88. DOI: 10.13089/JKIISC.2010.20.5.81.