-
1
-
-
0018048246
-
-
pp. 993-999
-
NEEDHAM, R., and SCHROEDER, M.: 'Using encryption for authentication in larce networks of computers', Commun. ACM, 1978, 21, (12), pp. 993-999
-
And SCHROEDER, M.: 'Using Encryption for Authentication in Larce Networks of Computers', Commun. ACM, 1978, 21, (12)
-
-
Needham, R.1
-
2
-
-
0018543411
-
-
pp. 594-597
-
MORRIS, R., and THOMPSON, K.: 'Password security: a case history', Commun. ACM, 1979, 22, (11), pp. 594-597
-
And THOMPSON, K.: 'Password Security: A Case History', Commun. ACM, 1979, 22, (11)
-
-
Morris, R.1
-
6
-
-
0027615231
-
-
pp. 648-656
-
GONG, L., LOMAS, M., NEEDHAM, R., and SALTZER, J.: 'Protecting poorly chosen secrets from guessing attacks', IEEE J. Sel. Areas Commun., 1993, 11, (5), pp. 648-656
-
LOMAS, M., NEEDHAM, R., and SALTZER, J.: 'Protecting Poorly Chosen Secrets from Guessing Attacks', IEEE J. Sel. Areas Commun., 1993, 11, (5)
-
-
Gong, L.1
-
8
-
-
0031381717
-
-
pp. 738745
-
KWON, T., KANG, M., and SONG, J.: 'An adaptable and reliable authentication protocol for communication networks'. Proceedings of IEEE INFOCOM 97, Kobe, Japan, 1997, pp. 738745
-
KANG, M., and SONG, J.: 'An Adaptable and Reliable Authentication Protocol for Communication Networks'. Proceedings of IEEE INFOCOM 97, Kobe, Japan, 1997
-
-
Kwon, T.1
-
10
-
-
33745996198
-
-
pp. 77-86
-
DING, Y., and HOSTER, P.: 'Undetectable on-line password guessing attacks', ACM Operating Syst. Rev. 1995, 29, (4), pp. 77-86
-
And HOSTER, P.: 'Undetectable On-line Password Guessing Attacks', ACM Operating Syst. Rev. 1995, 29, (4)
-
-
Ding, Y.1
-
11
-
-
0024940229
-
-
pp. 14-18
-
MARK, T., LOMAS, A., GONG, L., and SALTZER, J.: 'Reducing risks from poorly chosen keys', ACM Operating Syst. Rev., 1989, 23, (5), pp. 14-18
-
LOMAS, A., GONG, L., and SALTZER, J.: 'Reducing Risks from Poorly Chosen Keys', ACM Operating Syst. Rev., 1989, 23, (5)
-
-
Mark, T.1
-
12
-
-
84976665942
-
-
pp. 533-536
-
DENNING, D., and SACCO, G.: Timestamps in key distribution protocols', Commun. ACM, 1981, 24, (8), pp. 533-536
-
And SACCO, G.: Timestamps in Key Distribution Protocols', Commun. ACM, 1981, 24, (8)
-
-
Denning, D.1
-
14
-
-
0017018484
-
-
pp. 644-654
-
DIFFIE, W., and HELLMAN, M.: 'New directions in cryptoeraphy', IEEE Trans., 1976, IT-22, (6), pp. 644-654
-
And HELLMAN, M.: 'New Directions in Cryptoeraphy', IEEE Trans., 1976, IT-22, (6)
-
-
Diffie, W.1
-
15
-
-
33746028618
-
-
pp. 810
-
OTWAY, D., and REES, O.: 'Efficient and timely mutual authentication', ACM Operating Syst. Rev., 1987, 21, (1), pp. 810
-
And REES, O.: 'Efficient and Timely Mutual Authentication', ACM Operating Syst. Rev., 1987, 21, (1)
-
-
Otway, D.1
-
16
-
-
0025023289
-
-
pp. 234-248
-
GONG, L., NEEDHAM, R., and YAHALOM, R.: 'Reasoning about belief in cryptographic protocols'. Proceedings of IEEE symposium on Research in security ami privacy, 1990, pp. 234-248
-
NEEDHAM, R., and YAHALOM, R.: 'Reasoning about Belief in Cryptographic Protocols'. Proceedings of IEEE Symposium on Research in Security Ami Privacy, 1990
-
-
Gong, L.1
|