In this paper we study the use of … store a strong secret (such as the private … key. This asymmetry arises naturally in applications … where the user does not carry any computational … [and for] protocols such as SSL [refs]; IPSEC [ref]; and SET[ref] in the cases where the client end does … The emphasis of [Gong et al. 1993] is in protecting passwords … [Gong et al 1993] in several ways, with special emphasis on the analysis and … [p. 232] Our assurance of security is optimal in … in active (on-line) impersonation attempts
Google-1
Google-2
Copyright clearance needed for quotation.