메뉴 건너뛰기




Volumn 12, Issue 3, 2001, Pages 469-476

On the Security of Methods for Protecting Password Transmission

Author keywords

Cryptography; Discrete logarithm; Hash function; Password

Indexed keywords


EID: 0141518232     PISSN: 08684952     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (20)

References (10)
  • 1
    • 0141946906 scopus 로고    scopus 로고
    • Security on the internet: Authenticating the user
    • Botting, J. (1997). Security on the internet: Authenticating the user. Telecommunications, 31(12), 77-80.
    • (1997) Telecommunications , vol.31 , Issue.12 , pp. 77-80
    • Botting, J.1
  • 3
    • 58149326626 scopus 로고
    • Password authentication using triangles and straight lines
    • Horng, T.L. (1995). Password authentication using triangles and straight lines. Computers and Mathematics with Applications, 30(9), 63-71.
    • (1995) Computers and Mathematics with Applications , vol.30 , Issue.9 , pp. 63-71
    • Horng, T.L.1
  • 4
    • 0030261758 scopus 로고    scopus 로고
    • Strong password only authenticated key exchange
    • Jablon, D.P. (1996). Strong password only authenticated key exchange. Computer Communication Review, 26(5), 5-26.
    • (1996) Computer Communication Review , vol.26 , Issue.5 , pp. 5-26
    • Jablon, D.P.1
  • 5
    • 0032640752 scopus 로고    scopus 로고
    • xy via password authentication
    • xy via password authentication. Electronics Letters, 35(11), 892-893.
    • (1999) Electronics Letters , vol.35 , Issue.11 , pp. 892-893
    • Kwon, T.1    Song, J.2
  • 6
    • 0018543411 scopus 로고
    • Password security: A case history
    • Morris, D., K. Thompson (1979). Password security: a case history. Communications of ACM, 22(11), 594-597.
    • (1979) Communications of ACM , vol.22 , Issue.11 , pp. 594-597
    • Morris, D.1    Thompson, K.2
  • 7
    • 0033704170 scopus 로고    scopus 로고
    • Methods for protecting password transmission
    • Peyravian, M., N. Zunic (2000). Methods for protecting password transmission. Computers &. Security, 19(5), 466-469.
    • (2000) Computers &. Security , vol.19 , Issue.5 , pp. 466-469
    • Peyravian, M.1    Zunic, N.2
  • 9
    • 0032658583 scopus 로고    scopus 로고
    • Simple authenticated key agreement algorithm
    • Seo, D.H., P. Sweeney (1999). Simple authenticated key agreement algorithm. Electronics Letters, 35(13), 1073-1074.
    • (1999) Electronics Letters , vol.35 , Issue.13 , pp. 1073-1074
    • Seo, D.H.1    Sweeney, P.2
  • 10
    • 0033640351 scopus 로고    scopus 로고
    • Weakness in a simple authenticated key agreement protocol
    • Tseng, Y.M. (2000). Weakness in a simple authenticated key agreement protocol. Electronics Letters, 36(1), 48-49.
    • (2000) Electronics Letters , vol.36 , Issue.1 , pp. 48-49
    • Tseng, Y.M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.