[PDF][PDF] Web application authentication using ZKP and novel 6D chaotic system
SJ Mohammed, SA Mehdi - Indonesian Journal of Electrical …, 2020 - researchgate.net
Text password has long been a dominant approach to user authentication used by a huge
quantity of Internet services. Web applications are now widely used for the implementation of …
quantity of Internet services. Web applications are now widely used for the implementation of …
The Zero-Knowledge Proof Technique: Limitations and Challenges
SM Shlaka, HBA Wahab - 2023 Second International …, 2023 - ieeexplore.ieee.org
Zero-knowledge proof is one of the techniques implemented in a variety of data security
applications. ZKP is a security procedure between two parties, one as the prover and the …
applications. ZKP is a security procedure between two parties, one as the prover and the …
Authentication System Based on Zero-Knowledge Proof Employing the Rabin Cryptosystem and a Secret Sharing Schema
SM Shlaka, HBA Wahab - National Conference on New Trends in …, 2023 - Springer
Passwords play a significant role in the authentication process for web applications. These
applications are widely employed to deliver a diverse range of crucial services, making their …
applications are widely employed to deliver a diverse range of crucial services, making their …