메뉴 건너뛰기




Volumn 21, Issue 5, 1998, Pages 485-497

Group-oriented authentication mechanism with key exchange

Author keywords

Divide and conquer; Entity authentication mechanism; Group oriented cryptography; Key exchange; One way hash function

Indexed keywords

COMPUTATIONAL COMPLEXITY; CRYPTOGRAPHY; ITERATIVE METHODS; NETWORK PROTOCOLS; SECURITY OF DATA;

EID: 0032075621     PISSN: 01403664     EISSN: None     Source Type: Journal    
DOI: 10.1016/s0140-3664(97)00185-0     Document Type: Article
Times cited : (6)

References (27)
  • 1
    • 84945119254 scopus 로고
    • Entity authentication and key distribution
    • Springer, Berlin
    • M. Bellare, P. Rogaway, Entity authentication and key distribution, Advances in Cryptology - CRYPTO '93, Springer, Berlin, 1993, pp. 232-249.
    • (1993) Advances in Cryptology - CRYPTO '93 , pp. 232-249
    • Bellare, M.1    Rogaway, P.2
  • 3
    • 84976665942 scopus 로고
    • Timestamps in key distribution systems
    • D.E. Denning, G.M. Sacco, Timestamps in key distribution systems, Communications of the ACM 24 (8) (1981) 533-536.
    • (1981) Communications of the ACM , vol.24 , Issue.8 , pp. 533-536
    • Denning, D.E.1    Sacco, G.M.2
  • 5
    • 0029208641 scopus 로고
    • Several practical protocols for authentication and key exchange
    • C.H. Lim, P.J. Lee, Several practical protocols for authentication and key exchange, Information Processing Letters 53 (1995) 91-96.
    • (1995) Information Processing Letters , vol.53 , pp. 91-96
    • Lim, C.H.1    Lee, P.J.2
  • 7
    • 0029368205 scopus 로고
    • Secure and minimal protocols for authenticated key distribution
    • P. Janson, G. Tsudik, Secure and minimal protocols for authenticated key distribution, Computer Communications 18 (9) (1995) 645-653.
    • (1995) Computer Communications , vol.18 , Issue.9 , pp. 645-653
    • Janson, P.1    Tsudik, G.2
  • 9
    • 0002783180 scopus 로고
    • Using one-way functions for authentication
    • L. Gong, Using one-way functions for authentication, ACM Computer Communication Review 19 (5) (1989) 8-11.
    • (1989) ACM Computer Communication Review , vol.19 , Issue.5 , pp. 8-11
    • Gong, L.1
  • 10
    • 0018048246 scopus 로고
    • Using encryption for audientication in large networks of computers
    • R.M. Needham, M.D. Schroeder, Using encryption for audientication in large networks of computers, Communications of the ACM 21 (12) (1978) 993-999.
    • (1978) Communications of the ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2
  • 13
    • 0028514601 scopus 로고
    • Kerberos: An authentication service for computer networks
    • B.C. Neuman, J. Ts'o, Kerberos: An authentication service for computer networks, IEEE Communications Magazine 32 (9) (1994) 33-38.
    • (1994) IEEE Communications Magazine , vol.32 , Issue.9 , pp. 33-38
    • Neuman, B.C.1    Ts'o, J.2
  • 14
    • 0023247970 scopus 로고
    • Efficient and timely mutual authentication
    • D. Otway, O. Rees, Efficient and timely mutual authentication. Operating Systems Review 21 (1) (1987) 8-10.
    • (1987) Operating Systems Review , vol.21 , Issue.1 , pp. 8-10
    • Otway, D.1    Rees, O.2
  • 16
    • 2742584770 scopus 로고    scopus 로고
    • An authentication and key distribution system for open network system
    • S.P. Shieh, W.H. Yang, An authentication and key distribution system for open network system, ACM Operating Systems Review 30 (2) (1996) 32-41.
    • (1996) ACM Operating Systems Review , vol.30 , Issue.2 , pp. 32-41
    • Shieh, S.P.1    Yang, W.H.2
  • 17
    • 0002796093 scopus 로고
    • On key distribution protocols for repeated authentication
    • P. Syverson, On key distribution protocols for repeated authentication, ACM Operating Systems Review 27 (4) (1993) 24-30.
    • (1993) ACM Operating Systems Review , vol.27 , Issue.4 , pp. 24-30
    • Syverson, P.1
  • 19
    • 0029531472 scopus 로고
    • Optimal authentication protocols resistant to password guessing attacks
    • Country Kerry, Ireland
    • L. Gong, Optimal authentication protocols resistant to password guessing attacks, Proceedings of the Eighth IEEE Computer Security Foundations Workshop, Country Kerry, Ireland, pp. 24-29, 1995.
    • (1995) Proceedings of the Eighth IEEE Computer Security Foundations Workshop , pp. 24-29
    • Gong, L.1
  • 20
    • 85032188633 scopus 로고
    • Society and group oriented cryptography: A new concept
    • Springer, Berlin
    • Y. Desmedt, Society and group oriented cryptography: A new concept, in Advances in Cryptology - CRYPTO'87, Springer, Berlin, pp. 120-127, 1988.
    • (1988) Advances in Cryptology - CRYPTO'87 , pp. 120-127
    • Desmedt, Y.1
  • 26
    • 0029346019 scopus 로고
    • Methodical use of cryptographic transformations in authentication protocols
    • W. Mao, C. Boyd, Methodical use of cryptographic transformations in authentication protocols, IEE Proceedings Computers and Digital Techniques 142 (4) (1995) 272-278.
    • (1995) IEE Proceedings Computers and Digital Techniques , vol.142 , Issue.4 , pp. 272-278
    • Mao, W.1    Boyd, C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.