메뉴 건너뛰기




Volumn 19, Issue 6, 2003, Pages 1059-1070

Efficient three-party authentication and key agreement protocols resistant to password guessing attacks

Author keywords

Authentication; Key agreement; Network protocol; Password guessing attack; Perfect forward secrecy

Indexed keywords

CLIENT SERVER COMPUTER SYSTEMS; CRYPTOGRAPHY; DATA PRIVACY; DATABASE SYSTEMS; NETWORK PROTOCOLS; ONLINE SYSTEMS;

EID: 0345098454     PISSN: 10162364     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (44)

References (17)
  • 2
    • 0006805744 scopus 로고
    • Augmented encrypted key exchange: A password-based protocol secure against dictionary attacks and password file compromise
    • AT&T Bell Laboratories
    • S. Bellovin and M. Merritt, "Augmented encrypted key exchange: a password-based protocol secure against dictionary attacks and password file compromise," AT&T Bell Laboratories, 1993.
    • (1993)
    • Bellovin, S.1    Merritt, M.2
  • 3
    • 0030261758 scopus 로고    scopus 로고
    • Strong password-only authentication key exchange
    • D. Jablon, "Strong password-only authentication key exchange," Computer Communication Review, Vol. 26, 1996, pp. 5-26.
    • (1996) Computer Communication Review , vol.26 , pp. 5-26
    • Jablon, D.1
  • 5
    • 0345686108 scopus 로고    scopus 로고
    • Open key exchange: How to defeat dictionary attacks without encrypting public keys
    • S. Lucks, "Open key exchange: how to defeat dictionary attacks without encrypting public keys," in Proceedings of the Security Protocol Workshop '97, 1997, pp. 79-90.
    • Proceedings of the Security Protocol Workshop '97, 1997 , pp. 79-90
    • Lucks, S.1
  • 8
    • 0002839106 scopus 로고
    • Refinement and extension of encrypted key exchange
    • M. Steiner, G. Tsudik, and M. Waidner, "Refinement and extension of encrypted key exchange," Operating Systems Review, Vol. 29, 1995, pp. 22-30.
    • (1995) Operating Systems Review , vol.29 , pp. 22-30
    • Steiner, M.1    Tsudik, G.2    Waidner, M.3
  • 9
    • 0002805220 scopus 로고
    • Undetectable on-line password guessing attacks
    • Y. Ding and P. Horster, "Undetectable on-line password guessing attacks," Operating System Review, Vol. 29, 1995, pp. 77-86.
    • (1995) Operating System Review , vol.29 , pp. 77-86
    • Ding, Y.1    Horster, P.2
  • 10
    • 0008145442 scopus 로고    scopus 로고
    • Three-party encrypted key exchange: Attacks and a solution
    • C. L. Lin, H. M. Sun, and T. Hwang, "Three-party encrypted key exchange: attacks and a solution," ACM Operating Systems Review, Vol. 34, 2000, pp. 12-20.
    • (2000) ACM Operating Systems Review , vol.34 , pp. 12-20
    • Lin, C.L.1    Sun, H.M.2    Hwang, T.3
  • 12
    • 0031381717 scopus 로고    scopus 로고
    • An adaptable and reliable authentication protocol for communication networks
    • T. Kwon, M. Kang, and J. Song, "An adaptable and reliable authentication protocol for communication networks," in Proceedings of IEEE INFOCOM 97, 1997, pp. 738-745.
    • Proceedings of IEEE INFOCOM 97, 1997 , pp. 738-745
    • Kwon, T.1    Kang, M.2    Song, J.3
  • 13
    • 0031680336 scopus 로고    scopus 로고
    • Efficient key exchange and authentication protocol protecting weak secrets
    • T. Kwon and J. Song, "Efficient key exchange and authentication protocol protecting weak secrets," IEICE Transactions on Fundamentals, Vol. E81-A, 1998, pp. 156-163.
    • (1998) IEICE Transactions on Fundamentals , vol.E81-A , pp. 156-163
    • Kwon, T.1    Song, J.2
  • 14
    • 0033157651 scopus 로고    scopus 로고
    • An improvement of the password-based authentication protocol (K1P) on security against replay attacks
    • T. Kwon, M. Kang, S. Jung, and J. Song, "An improvement of the password-based authentication protocol (K1P) on security against replay attacks," IEICE Transactions on Communications, Vol. E82-B, 1999, pp. 991-997.
    • (1999) IEICE Transactions on Communications , vol.E82-B , pp. 991-997
    • Kwon, T.1    Kang, M.2    Jung, S.3    Song, J.4
  • 16
    • 0032182009 scopus 로고    scopus 로고
    • Authentication key exchange protocols resistant to password guessing attacks
    • T. Kwon and J. Song, "Authentication key exchange protocols resistant to password guessing attacks," IEE Communications, Vol. 145, 1998, pp. 304-308.
    • (1998) IEE Communications , vol.145 , pp. 304-308
    • Kwon, T.1    Song, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.