-
1
-
-
0017018484
-
New directions in cryptography
-
W. Diffie and M.E. Hellman, New directions in cryptography, IEEE Trans., IT-22, pp. 644-654, 1976.
-
(1976)
IEEE Trans.
, vol.IT-22
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.E.2
-
2
-
-
0018543411
-
Password Security: A Case History
-
R. Morris and K. Thompson, Password Security: A Case History, Communications of the ACM, 22(11), pp. 594-597, 1979.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 594-597
-
-
Morris, R.1
Thompson, K.2
-
4
-
-
0027741529
-
Augmented Encrypted Key Exchange: A Password-Based Protocol Secure Against Dictionary Attacks and Password File Compromise
-
S.M. Bellovin and M. Merritt, Augmented Encrypted Key Exchange: a Password-Based Protocol Secure Against Dictionary Attacks and Password File Compromise, ACM Conf. Comp. and Comm. Security, pp. 244-250, 1993.
-
(1993)
ACM Conf. Comp. and Comm. Security
, pp. 244-250
-
-
Bellovin, S.M.1
Merritt, M.2
-
5
-
-
0027615231
-
Protecting Poorly Chosen Secrets from Guessing Attacks
-
L. Gong, M. Lomas, R. Needham and J. Saltzer, Protecting Poorly Chosen Secrets from Guessing Attacks, IEEE Journal on Selected Areas in Communications, 11(5), pp. 648-656, 1993.
-
(1993)
IEEE Journal on Selected Areas in Communications
, vol.11
, Issue.5
, pp. 648-656
-
-
Gong, L.1
Lomas, M.2
Needham, R.3
Saltzer, J.4
-
6
-
-
0002805220
-
Undetectable On-line Password Guessing Attacks
-
Y. Ding and P. Horster, Undetectable On-line Password Guessing Attacks, ACM Operating Systems Review, 29(4), pp. 77-86, 1995.
-
(1995)
ACM Operating Systems Review
, vol.29
, Issue.4
, pp. 77-86
-
-
Ding, Y.1
Horster, P.2
-
8
-
-
0002839106
-
Refinement and Extension of Encrypted Key Exchange
-
M. Steiner, G. Tsudik and M. Waidner, Refinement and Extension of Encrypted Key Exchange, ACM Operating Systems Review, 29(3), pp. 22-30, 1995.
-
(1995)
ACM Operating Systems Review
, vol.29
, Issue.3
, pp. 22-30
-
-
Steiner, M.1
Tsudik, G.2
Waidner, M.3
-
9
-
-
0030261758
-
Strong Password-Only Authenticated Key Exchange
-
D. Jablon, Strong Password-Only Authenticated Key Exchange, ACM Computer Communications Review, 20(5), pp. 5-26, 1996.
-
(1996)
ACM Computer Communications Review
, vol.20
, Issue.5
, pp. 5-26
-
-
Jablon, D.1
-
10
-
-
85084161708
-
Dual-workfactor Encrypted Key Exchange: Efficiently Preventing Password Chaining and Dictionary Attacks
-
B. Jaspan, Dual-workfactor Encrypted Key Exchange: Efficiently Preventing Password Chaining and Dictionary Attacks, Proceedings of the Sixth Annual USENIX Security Conference, pp. 43-50, 1996.
-
(1996)
Proceedings of the Sixth Annual USENIX Security Conference
, pp. 43-50
-
-
Jaspan, B.1
-
11
-
-
0031381717
-
An Adaptable and Reliable Authentication Protocol for Communication Networks
-
T. Kwon, M. Kang and J. Song, An Adaptable and Reliable Authentication Protocol for Communication Networks, Proceedings of IEEE INFOCOM'97, pp. 737-744, 1997.
-
(1997)
Proceedings of IEEE INFOCOM'97
, pp. 737-744
-
-
Kwon, T.1
Kang, M.2
Song, J.3
-
13
-
-
0033157651
-
An Improvement of the Password-Based Authentication protocol (K1P) on Security against Replay Attacks
-
T. Kwon, M. Kang, S. Jung and J. Song, An Improvement of the Password-Based Authentication protocol (K1P) on Security against Replay Attacks, IEICE Trans. Commun., E82-B(7), pp. 991-997, 1999.
-
(1999)
IEICE Trans. Commun.
, vol.E82-B
, Issue.7
, pp. 991-997
-
-
Kwon, T.1
Kang, M.2
Jung, S.3
Song, J.4
-
14
-
-
0032640752
-
xy via Password Authentication
-
xy via Password Authentication, Electronics Letters, 35(11), pp. 892-893, 1999.
-
(1999)
Electronics Letters
, vol.35
, Issue.11
, pp. 892-893
-
-
Kwon, T.1
Song, J.2
|