[1] |
M’RAIHI D , MACHANI S , PEI M ,et al. TOTP:time-based one-time password algorithm[R]. 2011.
|
[2] |
HALLER N , . The s/key one-time password system[C]// Proceedings of the Internet Society Symposium on Network and Distributed Systems. 1995: 151-157.
|
[3] |
ZHOU Z C , LI L X , GUO S . Biometric and password two-factor cross domain authentication scheme based on blockchain technology[J]. Journal of Computer Applications, 2018,(6).
|
[4] |
PRAKASH S , NITESH S . Listening watch:wearable two-factor authentication using speech signals resilient to near-far attacks[R]. 2018.
|
[5] |
RAIHI D M , BELLARE M , HOORNAERT F ,et al. HOTP:an HMAC-based one-time password algorithm[S]. 2005.
|
[6] |
刘知贵, 臧爱军, 陆荣杰 ,等. 基于事件同步及异步的动态口令身份认证技术研究[J]. 计算机应用研究, 2006,23(6): 133-134.
|
|
LIU Z G , ZANG A J , LU R J ,et al. Dynamic password authentication based on event-synchronous and challenge/response technology[J]. Application Research of Computers, 2006,23(6): 133-134.
|
[7] |
AWASTHI A K . Comment on a dynamic d-based remote user authentication scheme[J]. Transaction on Cryptology, 2004,1(2): 15-16.
|
[8] |
DAS M L , SAXENA A , GULATI V P . A dynamic ID-based remote user authentication scheme[J]. IEEE Transactions on Consumer Electronics, 2004,50(2): 629-631.
|
[9] |
GOYAL V , ABRAHAM A , SANYAL S ,et al. The N/R one time password system[C]// International Conference on Information Technology:Coding and Computing. 2005: 733-738.
|
[10] |
GONG L , PAN J , LIU B ,et al. A novel one-time password mutual authentication scheme on sharing renewed finite random subpasswords[J]. Journal of Computer and System Sciences, 2013,79(1): 122-130.
|
[11] |
PARK C S . One-time password based on hash chain without shared secret and re-registration[J]. Computers & Security, 2018,75.
|
[12] |
KOGAN D , MANOHAR N , DAN B . T/Key:second-factor authentication from secure Hash chains[R]. 2017.
|
[13] |
HWANG , SHEN H Y , HWANG J J . A secure one-time password authentication scheme using smart cards[J]. IEICE Trans Commun, 2002,85(11): 2515-2518.
|
[14] |
CHEFRANOV A G . One-time password authentication with infinite Hash chains[M]. Berlin: Springer NetherlandsPress, 2008.
|
[15] |
LAMPORT L . Password authentication with insecure communication[J]. Communications of the ACM, 1981,24(24): 770-772.
|
[16] |
MEYER C , SCHWENK J . Lessons learned from previous SSL/TLS attacks-a brief chronology of attacks and weaknesses[J]. IACR Cryptology ePrint Archive, 2013
|