Attacks and Countermeasures of Hash Chain Based Password Authentication Schemes
Muhammad Shahzad Jan
- Rawalpindi MCS,NUST 2015
- xii, 77 p
Introduction (Page-1), Literature Review and Background of Study (Page-6), Proposed Frame work (Page-20), Analysis and Comparisons of Renowned Protocols (Page-29), Proposed Scheme (Page-54), Frame Work Scrutiny of Proposed Scheme (Page-64), Conclusion and Future Work (Page70),