-
2
-
-
0006805744
-
Augmented encrypted key exchange: A password-based protocol secure against dictionary attacks and password file compromise
-
AT&T Bell Laboratories
-
S. Bellovin and M. Merritt, "Augmented encrypted key exchange: a password-based protocol secure against dictionary attacks and password file compromise," AT&T Bell Laboratories, 1993.
-
(1993)
-
-
Bellovin, S.1
Merritt, M.2
-
3
-
-
0030261758
-
Strong password-only authentication key exchange
-
D. Jablon, "Strong password-only authentication key exchange," Computer Communication Review, Vol. 26, 1996, pp. 5-26.
-
(1996)
Computer Communication Review
, vol.26
, pp. 5-26
-
-
Jablon, D.1
-
5
-
-
0345686108
-
Open key exchange: How to defeat dictionary attacks without encrypting public keys
-
S. Lucks, "Open key exchange: how to defeat dictionary attacks without encrypting public keys," in Proceedings of the Security Protocol Workshop '97, 1997, pp. 79-90.
-
Proceedings of the Security Protocol Workshop '97, 1997
, pp. 79-90
-
-
Lucks, S.1
-
7
-
-
0027615231
-
Protecting poorly chosen secrets from guessing attacks
-
L. Gong, M. Lomas, R. Needham, and J. Saltzer, "Protecting poorly chosen secrets from guessing attacks," IEEE Journal on Selected Areas in Communications, 11, 1993, pp. 648-656.
-
(1993)
IEEE Journal on Selected Areas in Communications
, vol.11
, pp. 648-656
-
-
Gong, L.1
Lomas, M.2
Needham, R.3
Saltzer, J.4
-
8
-
-
0002839106
-
Refinement and extension of encrypted key exchange
-
M. Steiner, G. Tsudik, and M. Waidner, "Refinement and extension of encrypted key exchange," Operating Systems Review, Vol. 29, 1995, pp. 22-30.
-
(1995)
Operating Systems Review
, vol.29
, pp. 22-30
-
-
Steiner, M.1
Tsudik, G.2
Waidner, M.3
-
9
-
-
0002805220
-
Undetectable on-line password guessing attacks
-
Y. Ding and P. Horster, "Undetectable on-line password guessing attacks," Operating System Review, Vol. 29, 1995, pp. 77-86.
-
(1995)
Operating System Review
, vol.29
, pp. 77-86
-
-
Ding, Y.1
Horster, P.2
-
10
-
-
0008145442
-
Three-party encrypted key exchange: Attacks and a solution
-
C. L. Lin, H. M. Sun, and T. Hwang, "Three-party encrypted key exchange: attacks and a solution," ACM Operating Systems Review, Vol. 34, 2000, pp. 12-20.
-
(2000)
ACM Operating Systems Review
, vol.34
, pp. 12-20
-
-
Lin, C.L.1
Sun, H.M.2
Hwang, T.3
-
12
-
-
0031381717
-
An adaptable and reliable authentication protocol for communication networks
-
T. Kwon, M. Kang, and J. Song, "An adaptable and reliable authentication protocol for communication networks," in Proceedings of IEEE INFOCOM 97, 1997, pp. 738-745.
-
Proceedings of IEEE INFOCOM 97, 1997
, pp. 738-745
-
-
Kwon, T.1
Kang, M.2
Song, J.3
-
13
-
-
0031680336
-
Efficient key exchange and authentication protocol protecting weak secrets
-
T. Kwon and J. Song, "Efficient key exchange and authentication protocol protecting weak secrets," IEICE Transactions on Fundamentals, Vol. E81-A, 1998, pp. 156-163.
-
(1998)
IEICE Transactions on Fundamentals
, vol.E81-A
, pp. 156-163
-
-
Kwon, T.1
Song, J.2
-
14
-
-
0033157651
-
An improvement of the password-based authentication protocol (K1P) on security against replay attacks
-
T. Kwon, M. Kang, S. Jung, and J. Song, "An improvement of the password-based authentication protocol (K1P) on security against replay attacks," IEICE Transactions on Communications, Vol. E82-B, 1999, pp. 991-997.
-
(1999)
IEICE Transactions on Communications
, vol.E82-B
, pp. 991-997
-
-
Kwon, T.1
Kang, M.2
Jung, S.3
Song, J.4
-
16
-
-
0032182009
-
Authentication key exchange protocols resistant to password guessing attacks
-
T. Kwon and J. Song, "Authentication key exchange protocols resistant to password guessing attacks," IEE Communications, Vol. 145, 1998, pp. 304-308.
-
(1998)
IEE Communications
, vol.145
, pp. 304-308
-
-
Kwon, T.1
Song, J.2
|