메뉴 건너뛰기




Volumn E86-B, Issue 11, 2003, Pages 3278-3282

Improvement of password authenticated key exchange based on RSA for imbalanced wireless networks

Author keywords

Authenticated; Guessing attack; Key exchange; Password; Wireless network

Indexed keywords

ONLINE SYSTEMS; PERSONAL DIGITAL ASSISTANTS; PUBLIC KEY CRYPTOGRAPHY; SMART CARDS; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 0344309039     PISSN: 09168516     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Letter
Times cited : (10)

References (9)
  • 2
    • 0027741529 scopus 로고
    • Augmented encrypted key exchange: A password-based protocol secure against dictionary attacks and password file compromise
    • S.M. Bellovin and M. Merritt, "Augmented encrypted key exchange: A password-based protocol secure against dictionary attacks and password file compromise," Proc. First ACM Conference on Computer and Communications Security, pp.244-250, 1993.
    • (1993) Proc. First ACM Conference on Computer and Communications Security , pp. 244-250
    • Bellovin, S.M.1    Merritt, M.2
  • 3
    • 0030261758 scopus 로고    scopus 로고
    • Strong password-only authenticated key exchange
    • D. Jablon, "Strong password-only authenticated key exchange," ACM Computer Communications Review, vol.20, no.5, pp.5-26, 1996.
    • (1996) ACM Computer Communications Review , vol.20 , Issue.5 , pp. 5-26
    • Jablon, D.1
  • 4
    • 0031354417 scopus 로고    scopus 로고
    • Extended password key exchange protocols immune to dictionary attack
    • June
    • D. Jablon, "Extended password key exchange protocols immune to dictionary attack," Proc. WETICE'97 Workshop on Enterprise Security, pp.248-255, June 1997.
    • (1997) Proc. WETICE'97 Workshop on Enterprise Security , pp. 248-255
    • Jablon, D.1
  • 5
    • 0345686108 scopus 로고    scopus 로고
    • Open key exchange: How to defeat dictionary attacks without encrypting public keys
    • S. Lucks, "Open key exchange: How to defeat dictionary attacks without encrypting public keys," Proc. Workshop on Security Protocols, pp.79-90, 1997.
    • (1997) Proc. Workshop on Security Protocols , pp. 79-90
    • Lucks, S.1
  • 7
    • 0031680336 scopus 로고    scopus 로고
    • Efficient key exchange and authentication protocol protecting weak secrets
    • Jan.
    • T. Kwon and J. Song, "Efficient key exchange and authentication protocol protecting weak secrets," IEICE Trans. Fundamentals, vol.E81-A, no.1, pp.156-163, Jan. 1998.
    • (1998) IEICE Trans. Fundamentals , vol.E81-A , Issue.1 , pp. 156-163
    • Kwon, T.1    Song, J.2
  • 8
    • 84945247158 scopus 로고    scopus 로고
    • Password authenticated key exchange based on RSA for imbalanced wireless networks
    • F. Zhu, D.S. Wong, A.H. Chan, and R. Ye, "Password authenticated key exchange based on RSA for imbalanced wireless networks," Proc. ISC 2002, LNCS 2433, pp.150-161, 2002.
    • (2002) Proc. ISC 2002, LNCS 2433 , pp. 150-161
    • Zhu, F.1    Wong, D.S.2    Chan, A.H.3    Ye, R.4
  • 9
    • 0017930809 scopus 로고
    • A method for obtaining digital signature and public key cryptosystem
    • R.L. Rivest, A. Shamir, and L. Adelman, "A method for obtaining digital signature and public key cryptosystem," Commun. ACM, vol.21, no.2, pp.120-126, 1978.
    • (1978) Commun. ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adelman, L.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.