-
1
-
-
0018543411
-
Password security: A case history
-
R. Morris and K. Thompson, "Password security: A case history," ACM Communications, vol.22, no.11, pp. 594-597, 1979.
-
(1979)
ACM Communications
, vol.22
, Issue.11
, pp. 594-597
-
-
Morris, R.1
Thompson, K.2
-
2
-
-
84873466407
-
Authenticated key exchange secure against dictionary attacks
-
(LNCS 1807)
-
M. Bellare, D. Pointcheval and P. Rogaway, "Authenticated key exchange secure against dictionary attacks," In Eurocrypt 2000 (LNCS 1807), pp. 139-155, 2000.
-
(2000)
Eurocrypt 2000
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
3
-
-
84937550984
-
Provably secure password authentication and key exchange using Diffie-Hellman
-
(LNCS 1807)
-
V. Boyko, P. MacKenzie and S. Patel, "Provably secure password authentication and key exchange using Diffie-Hellman," In Eurocrypt 2000 (LNCS 1807), pp. 156-171, 2000.
-
(2000)
Eurocrypt 2000
, pp. 156-171
-
-
Boyko, V.1
MacKenzie, P.2
Patel, S.3
-
4
-
-
0030261758
-
Strong password-only authenticated key exchange
-
D. Jablon, "Strong password-only authenticated key exchange," ACM Computer Communication Review, vol.26, no.5, pp. 5-20, 1996.
-
(1996)
ACM Computer Communication Review
, vol.26
, Issue.5
, pp. 5-20
-
-
Jablon, D.1
-
5
-
-
84945132563
-
Practical password-authenticated key exchange provably secure under standard assumptions
-
(LNCS 2045)
-
J. Katz, R. Ostrovsky and M. Yung, "Practical password-authenticated key exchange provably secure under standard assumptions," In Eurocrypt 2001 (LNCS 2045), pp. 475-494, 2001.
-
(2001)
Eurocrypt 2001
, pp. 475-494
-
-
Katz, J.1
Ostrovsky, R.2
Yung, M.3
-
6
-
-
84937402236
-
Password authenticated key exchange based on RSA
-
(LNCS 1976)
-
P. MacKenzie, S. Patel and R. Swaminathan, "Password authenticated key exchange based on RSA," in Asiacrypt 2000, (LNCS 1976), pp. 599-613, 2000.
-
(2000)
Asiacrypt 2000
, pp. 599-613
-
-
MacKenzie, P.1
Patel, S.2
Swaminathan, R.3
-
7
-
-
0033704170
-
Methods for protecting password transmission
-
M. Peyravian and N. Zunic, "Methods for protecting password transmission," Computers & Security, vol.19, no.5, pp. 466-469, 2000.
-
(2000)
Computers & Security
, vol.19
, Issue.5
, pp. 466-469
-
-
Peyravian, M.1
Zunic, N.2
-
9
-
-
0036556279
-
Improvement on peyravian-zunic's password authentication schemes
-
April
-
J.J. Hwang and T.C. Yeh, "Improvement on Peyravian-Zunic's Password Authentication Schemes," IEICE Transactions on Communications, vol. E85-B, no.4, pp. 823-825, April 2002.
-
(2002)
IEICE Transactions on Communications
, vol.E85-B
, Issue.4
, pp. 823-825
-
-
Hwang, J.J.1
Yeh, T.C.2
-
10
-
-
0017018484
-
New directions in cryptography
-
W. Diffie and M.E. Hellman, "New directions in cryptography," IEEE Transactions on Information Theory, vol.IT-22, no.6, pp. 644-654, 1976.
-
(1976)
IEEE Transactions on Information Theory
, vol.IT-22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.E.2
-
11
-
-
71849087704
-
Public-key cryptography and password protocols
-
S. Halevi and H. Krawczyk, "Public-key cryptography and password protocols," ACM Trans. Inf. and System Security, vol.2, no.3, pp. 25-60, 1999.
-
(1999)
ACM Trans. Inf. and System Security
, vol.2
, Issue.3
, pp. 25-60
-
-
Halevi, S.1
Krawczyk, H.2
|