메뉴 건너뛰기




Volumn E85-B, Issue 4, 2002, Pages 823-825

Improvement on Peyravian-Zunic's password authentication schemes

Author keywords

Authentication; Password; Security

Indexed keywords

CLIENT SERVER COMPUTER SYSTEMS; COMPUTATIONAL METHODS; COMPUTER CRIME; DATA COMMUNICATION SYSTEMS; DATA STORAGE EQUIPMENT; DATABASE SYSTEMS; ELECTRONIC COMMERCE;

EID: 0036556279     PISSN: 09168516     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Letter
Times cited : (69)

References (12)
  • 1
    • 85027191810 scopus 로고    scopus 로고
    • Microsoft computer network hacked; FBI steps in
    • CNET, Oct.
    • P, Festa, "Microsoft computer network hacked; FBI steps in," CNET, Oct. 2000, http://news.cnet.com/new/0-1003-200-3308084.html
    • (2000)
    • Festa, P.1
  • 2
    • 0033704170 scopus 로고    scopus 로고
    • Method for protecting password transmission
    • M. Peytavian and N. Zunic, "Method for protecting password transmission," Computers & Security, vol.19, no.5, pp.466-469, 2000.
    • (2000) Computers & Security , vol.19 , Issue.5 , pp. 466-469
    • Peytavian, M.1    Zunic, N.2
  • 3
    • 0004304523 scopus 로고    scopus 로고
    • The AuthA protocol for password-based authenticated key exchange
    • Contribution to the IEEE P1363 study group for Future PKC Standards
    • M. Bellare and P. Rogaway, "The AuthA protocol for password-based authenticated key exchange," Contribution to the IEEE P1363 study group for Future PKC Standards.
    • Bellare, M.1    Rogaway, P.2
  • 4
    • 3042657129 scopus 로고    scopus 로고
    • Provably secure password authenticated key exchange using Diffie Hellman
    • V. Boyko, P. MacKenzie, and S. Patel, "Provably secure password authenticated key exchange using Diffie Hellman," Eurocrypt 2000.
    • (2000) Eurocrypt
    • Boyko, V.1    MacKenzie, P.2    Patel, S.3
  • 5
    • 0027741529 scopus 로고
    • Augmented encrypted key exchange: A password-based protocol secure against dictionary attacks and password file compromise
    • Nov.
    • S. Bellovin and M. Merritt, "Augmented encrypted key exchange: A password-based protocol secure against dictionary attacks and password file compromise," The 1st ACM Conference on Computer and Communications Security, pp.244-250, Nov. 1993.
    • (1993) The 1st ACM Conference on Computer and Communications Security , pp. 244-250
    • Bellovin, S.1    Merritt, M.2
  • 7
    • 0032640752 scopus 로고    scopus 로고
    • xy via password authentication
    • 27th May
    • xy via password authentication," Electron. Lett., vol.35, no.11, pp.892-893, 27th May 1999.
    • (1999) Electron. Lett. , vol.35 , Issue.11 , pp. 892-893
    • Kwon, T.1    Song, J.2
  • 10
    • 0027615231 scopus 로고
    • Protecting poorly chosen secrets from guessing attacks
    • June
    • L. Gong, M. Lomas, R. Needham, and J. Saltzer, "Protecting poorly chosen secrets from guessing attacks," IEEE J. Sel. Areas Commun., vol.11, no.5, pp.648-656, June 1993.
    • (1993) IEEE J. Sel. Areas Commun. , vol.11 , Issue.5 , pp. 648-656
    • Gong, L.1    Lomas, M.2    Needham, R.3    Saltzer, J.4
  • 12
    • 0032115203 scopus 로고    scopus 로고
    • Efficient and secure password-based authentication protocols against guessing attacks
    • July
    • T. Kwon and J. Song, "Efficient and secure password-based authentication protocols against guessing attacks," Computer Communications, pp.853-861, July 1998.
    • (1998) Computer Communications , pp. 853-861
    • Kwon, T.1    Song, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.