封面
声明
中文摘要
英文摘要
目录
List of Figures
List of Tables
1 Introduction
1.1 Background
1.2 Authentication
1.3 User Anonymity
1.4 Malicious attacks
1.5 Problem statements
1.6 Thesis organization
2 Related Works
2.1 User Passwords
2.2 Two-Factor authentication
2.3 One-Time password \(OTP\)
2.4 Summary
3 The Proposed Scheme
3.1 Problem definition
3.2 Primitives and requirements
3.3 Overview to proposed scheme
3.4 Details of our proposed scheme
3.5 Summary
4 Discussion of experimental results for performance evaluation and security analysis
4.1 Experimental Environment
4.2 Performance Evaluation
4.3 Security Analysis
4.4 Comparison with Other Related Works
4.5 Summary
5 Conclusions
致谢
参考文献