메뉴 건너뛰기




Volumn 34, Issue 4, 2000, Pages 12-20

Three-party Encrypted Key Exchange: Attacks and a Solution

Author keywords

[No Author keywords available]

Indexed keywords


EID: 0008145442     PISSN: 01635980     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/506106.506108     Document Type: Article
Times cited : (173)

References (14)
  • 1
    • 0017018484 scopus 로고
    • New directions in cryptography
    • W. Diffie and M.E. Hellman, New directions in cryptography, IEEE Trans., IT-22, pp. 644-654, 1976.
    • (1976) IEEE Trans. , vol.IT-22 , pp. 644-654
    • Diffie, W.1    Hellman, M.E.2
  • 2
    • 0018543411 scopus 로고
    • Password Security: A Case History
    • R. Morris and K. Thompson, Password Security: A Case History, Communications of the ACM, 22(11), pp. 594-597, 1979.
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 594-597
    • Morris, R.1    Thompson, K.2
  • 4
    • 0027741529 scopus 로고
    • Augmented Encrypted Key Exchange: A Password-Based Protocol Secure Against Dictionary Attacks and Password File Compromise
    • S.M. Bellovin and M. Merritt, Augmented Encrypted Key Exchange: a Password-Based Protocol Secure Against Dictionary Attacks and Password File Compromise, ACM Conf. Comp. and Comm. Security, pp. 244-250, 1993.
    • (1993) ACM Conf. Comp. and Comm. Security , pp. 244-250
    • Bellovin, S.M.1    Merritt, M.2
  • 6
    • 0002805220 scopus 로고
    • Undetectable On-line Password Guessing Attacks
    • Y. Ding and P. Horster, Undetectable On-line Password Guessing Attacks, ACM Operating Systems Review, 29(4), pp. 77-86, 1995.
    • (1995) ACM Operating Systems Review , vol.29 , Issue.4 , pp. 77-86
    • Ding, Y.1    Horster, P.2
  • 8
    • 0002839106 scopus 로고
    • Refinement and Extension of Encrypted Key Exchange
    • M. Steiner, G. Tsudik and M. Waidner, Refinement and Extension of Encrypted Key Exchange, ACM Operating Systems Review, 29(3), pp. 22-30, 1995.
    • (1995) ACM Operating Systems Review , vol.29 , Issue.3 , pp. 22-30
    • Steiner, M.1    Tsudik, G.2    Waidner, M.3
  • 9
    • 0030261758 scopus 로고    scopus 로고
    • Strong Password-Only Authenticated Key Exchange
    • D. Jablon, Strong Password-Only Authenticated Key Exchange, ACM Computer Communications Review, 20(5), pp. 5-26, 1996.
    • (1996) ACM Computer Communications Review , vol.20 , Issue.5 , pp. 5-26
    • Jablon, D.1
  • 10
    • 85084161708 scopus 로고    scopus 로고
    • Dual-workfactor Encrypted Key Exchange: Efficiently Preventing Password Chaining and Dictionary Attacks
    • B. Jaspan, Dual-workfactor Encrypted Key Exchange: Efficiently Preventing Password Chaining and Dictionary Attacks, Proceedings of the Sixth Annual USENIX Security Conference, pp. 43-50, 1996.
    • (1996) Proceedings of the Sixth Annual USENIX Security Conference , pp. 43-50
    • Jaspan, B.1
  • 11
    • 0031381717 scopus 로고    scopus 로고
    • An Adaptable and Reliable Authentication Protocol for Communication Networks
    • T. Kwon, M. Kang and J. Song, An Adaptable and Reliable Authentication Protocol for Communication Networks, Proceedings of IEEE INFOCOM'97, pp. 737-744, 1997.
    • (1997) Proceedings of IEEE INFOCOM'97 , pp. 737-744
    • Kwon, T.1    Kang, M.2    Song, J.3
  • 13
    • 0033157651 scopus 로고    scopus 로고
    • An Improvement of the Password-Based Authentication protocol (K1P) on Security against Replay Attacks
    • T. Kwon, M. Kang, S. Jung and J. Song, An Improvement of the Password-Based Authentication protocol (K1P) on Security against Replay Attacks, IEICE Trans. Commun., E82-B(7), pp. 991-997, 1999.
    • (1999) IEICE Trans. Commun. , vol.E82-B , Issue.7 , pp. 991-997
    • Kwon, T.1    Kang, M.2    Jung, S.3    Song, J.4
  • 14
    • 0032640752 scopus 로고    scopus 로고
    • xy via Password Authentication
    • xy via Password Authentication, Electronics Letters, 35(11), pp. 892-893, 1999.
    • (1999) Electronics Letters , vol.35 , Issue.11 , pp. 892-893
    • Kwon, T.1    Song, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.