A Proactive Authentication Using Credentials based on Chameleon Hashing in MIH Environments
Vol. 35, No. 5, pp. 840-848, May 2010
PDF Full-Text
Abstract
Statistics
Cumulative Counts from November, 2022
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.
|
Cite this article
[IEEE Style]
K. Chae, J. Choi, S. Jung, "A Proactive Authentication Using Credentials based on Chameleon Hashing in MIH Environments," The Journal of Korean Institute of Communications and Information Sciences, vol. 35, no. 5, pp. 840-848, 2010. DOI: .
[ACM Style]
Kangsuk Chae, Jaeduck Choi, and Souhwan Jung. 2010. A Proactive Authentication Using Credentials based on Chameleon Hashing in MIH Environments. The Journal of Korean Institute of Communications and Information Sciences, 35, 5, (2010), 840-848. DOI: .
[KICS Style]
Kangsuk Chae, Jaeduck Choi, Souhwan Jung, "A Proactive Authentication Using Credentials based on Chameleon Hashing in MIH Environments," The Journal of Korean Institute of Communications and Information Sciences, vol. 35, no. 5, pp. 840-848, 5. 2010.