메뉴 건너뛰기




Volumn 22, Issue 1, 2003, Pages 68-72

A password authentication scheme with secure password updating

Author keywords

Cryptography; Key exchange; Password authentication; Password change

Indexed keywords

COMPUTER CRIME; CRYPTOGRAPHY; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; UNIX;

EID: 0037282439     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/S0167-4048(03)00114-7     Document Type: Article
Times cited : (110)

References (11)
  • 1
    • 0018543411 scopus 로고
    • Password security: A case history
    • R. Morris and K. Thompson, "Password security: A case history," ACM Communications, vol.22, no.11, pp. 594-597, 1979.
    • (1979) ACM Communications , vol.22 , Issue.11 , pp. 594-597
    • Morris, R.1    Thompson, K.2
  • 2
    • 84873466407 scopus 로고    scopus 로고
    • Authenticated key exchange secure against dictionary attacks
    • (LNCS 1807)
    • M. Bellare, D. Pointcheval and P. Rogaway, "Authenticated key exchange secure against dictionary attacks," In Eurocrypt 2000 (LNCS 1807), pp. 139-155, 2000.
    • (2000) Eurocrypt 2000 , pp. 139-155
    • Bellare, M.1    Pointcheval, D.2    Rogaway, P.3
  • 3
    • 84937550984 scopus 로고    scopus 로고
    • Provably secure password authentication and key exchange using Diffie-Hellman
    • (LNCS 1807)
    • V. Boyko, P. MacKenzie and S. Patel, "Provably secure password authentication and key exchange using Diffie-Hellman," In Eurocrypt 2000 (LNCS 1807), pp. 156-171, 2000.
    • (2000) Eurocrypt 2000 , pp. 156-171
    • Boyko, V.1    MacKenzie, P.2    Patel, S.3
  • 4
    • 0030261758 scopus 로고    scopus 로고
    • Strong password-only authenticated key exchange
    • D. Jablon, "Strong password-only authenticated key exchange," ACM Computer Communication Review, vol.26, no.5, pp. 5-20, 1996.
    • (1996) ACM Computer Communication Review , vol.26 , Issue.5 , pp. 5-20
    • Jablon, D.1
  • 5
    • 84945132563 scopus 로고    scopus 로고
    • Practical password-authenticated key exchange provably secure under standard assumptions
    • (LNCS 2045)
    • J. Katz, R. Ostrovsky and M. Yung, "Practical password-authenticated key exchange provably secure under standard assumptions," In Eurocrypt 2001 (LNCS 2045), pp. 475-494, 2001.
    • (2001) Eurocrypt 2001 , pp. 475-494
    • Katz, J.1    Ostrovsky, R.2    Yung, M.3
  • 6
    • 84937402236 scopus 로고    scopus 로고
    • Password authenticated key exchange based on RSA
    • (LNCS 1976)
    • P. MacKenzie, S. Patel and R. Swaminathan, "Password authenticated key exchange based on RSA," in Asiacrypt 2000, (LNCS 1976), pp. 599-613, 2000.
    • (2000) Asiacrypt 2000 , pp. 599-613
    • MacKenzie, P.1    Patel, S.2    Swaminathan, R.3
  • 7
    • 0033704170 scopus 로고    scopus 로고
    • Methods for protecting password transmission
    • M. Peyravian and N. Zunic, "Methods for protecting password transmission," Computers & Security, vol.19, no.5, pp. 466-469, 2000.
    • (2000) Computers & Security , vol.19 , Issue.5 , pp. 466-469
    • Peyravian, M.1    Zunic, N.2
  • 9
    • 0036556279 scopus 로고    scopus 로고
    • Improvement on peyravian-zunic's password authentication schemes
    • April
    • J.J. Hwang and T.C. Yeh, "Improvement on Peyravian-Zunic's Password Authentication Schemes," IEICE Transactions on Communications, vol. E85-B, no.4, pp. 823-825, April 2002.
    • (2002) IEICE Transactions on Communications , vol.E85-B , Issue.4 , pp. 823-825
    • Hwang, J.J.1    Yeh, T.C.2
  • 11
    • 71849087704 scopus 로고    scopus 로고
    • Public-key cryptography and password protocols
    • S. Halevi and H. Krawczyk, "Public-key cryptography and password protocols," ACM Trans. Inf. and System Security, vol.2, no.3, pp. 25-60, 1999.
    • (1999) ACM Trans. Inf. and System Security , vol.2 , Issue.3 , pp. 25-60
    • Halevi, S.1    Krawczyk, H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.