메뉴 건너뛰기




Volumn 14, Issue 4, 2003, Pages 551-558

Security of Improvement on Methods for Protecting Password Transmission

Author keywords

Authentication; Cryptography; Discrete logarithm; Password

Indexed keywords


EID: 0742306164     PISSN: 08684952     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (28)

References (21)
  • 1
    • 0141946906 scopus 로고    scopus 로고
    • Security on the Internet: Authenticating the use
    • Botting, J. (1997). Security on the Internet: authenticating the use. Telecommunications, 31(12), 77-80.
    • (1997) Telecommunications , vol.31 , Issue.12 , pp. 77-80
    • Botting, J.1
  • 3
    • 0013017020 scopus 로고    scopus 로고
    • Rijndael, the advanced encryption standard
    • Daemen, J., and V. Rijmen (2001). Rijndael, the advanced encryption standard. Dr. Dobb's Journal, 26(3), 137-139.
    • (2001) Dr. Dobb's Journal , vol.26 , Issue.3 , pp. 137-139
    • Daemen, J.1    Rijmen, V.2
  • 5
    • 0002805220 scopus 로고
    • Undetected on-line password guessing attacks
    • Ding, Y., and P. Horster (1995). Undetected on-line password guessing attacks. ACM Operating Systems Review, 29(4), 77-86.
    • (1995) ACM Operating Systems Review , vol.29 , Issue.4 , pp. 77-86
    • Ding, Y.1    Horster, P.2
  • 6
    • 84874800178 scopus 로고
    • A public-key cryptosystem and a signature scheme based on discrete logarithms
    • ElGamal, T. (1985). A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, IT-31, 469-472.
    • (1985) IEEE Transactions on Information Theory , vol.IT-31 , pp. 469-472
    • ElGamal, T.1
  • 7
    • 0000270009 scopus 로고
    • Password authentication without using password table
    • Horng, G. (1995). Password authentication without using password table. Information Processing Letters, 55(4), 247-250.
    • (1995) Information Processing Letters , vol.55 , Issue.4 , pp. 247-250
    • Horng, G.1
  • 8
    • 0036556279 scopus 로고    scopus 로고
    • Improvement on Peyravian-Zunic's password authentication schemes
    • Hwang, J.J., and T.C. Yeh (2002). Improvement on Peyravian-Zunic's password authentication schemes. IEICE Trans. on Communications, E85-B(4), 823-825.
    • (2002) IEICE Trans. on Communications , vol.E85-B , Issue.4 , pp. 823-825
    • Hwang, J.J.1    Yeh, T.C.2
  • 9
    • 0000694693 scopus 로고    scopus 로고
    • A remote password authentication scheme based on the digital signature method
    • Hwang, M.S. (1999). A remote password authentication scheme based on the digital signature method. International Journal of Computer Mathematics, 70, 657-666.
    • (1999) International Journal of Computer Mathematics , vol.70 , pp. 657-666
    • Hwang, M.S.1
  • 10
    • 0346438816 scopus 로고    scopus 로고
    • A new redundancy reducing cipher
    • Hwang, M.S. (2000). A new redundancy reducing cipher. Informatica, 11(4), 435-440.
    • (2000) Informatica , vol.11 , Issue.4 , pp. 435-440
    • Hwang, M.S.1
  • 13
    • 0000362936 scopus 로고    scopus 로고
    • An improvement of SPLICE/AS in WIDE against guessing attack
    • Hwang, M.S., C.C. Lee and Y.L. Tang (2001). An improvement of SPLICE/AS in WIDE against guessing attack. Informatica, 12(2), 297-302.
    • (2001) Informatica , vol.12 , Issue.2 , pp. 297-302
    • Hwang, M.S.1    Lee, C.C.2    Tang, Y.L.3
  • 14
    • 0038564821 scopus 로고    scopus 로고
    • Cryptanalysis of the batch verifying multiple RSA digital signatures
    • Hwang, M.S., I.C. Lin and K.F. Hwang (2000). Cryptanalysis of the batch verifying multiple RSA digital signatures. Informatica, 11(1), 15-18.
    • (2000) Informatica , vol.11 , Issue.1 , pp. 15-18
    • Hwang, M.S.1    Lin, I.C.2    Hwang, K.F.3
  • 15
    • 0030261758 scopus 로고    scopus 로고
    • Strong password only authenticated key exchange
    • Jablon, D.P. (1996). Strong password only authenticated key exchange. Computer Communication Review, 26, 5-26.
    • (1996) Computer Communication Review , vol.26 , pp. 5-26
    • Jablon, D.P.1
  • 16
    • 0041698518 scopus 로고    scopus 로고
    • A flexible remote user authentication scheme using smart cards
    • Lee, C.C., M.S. Hwang and W.P. Yang (2002). A flexible remote user authentication scheme using smart cards. ACM Operating Systems Review, 36(3), 46-52.
    • (2002) ACM Operating Systems Review , vol.36 , Issue.3 , pp. 46-52
    • Lee, C.C.1    Hwang, M.S.2    Yang, W.P.3
  • 17
    • 0035506864 scopus 로고    scopus 로고
    • A remote password authentication scheme for multi-server architecture using neural networks
    • Li, L.H., I.C. Lin and M.S. Hwang (2001). A remote password authentication scheme for multi-server architecture using neural networks. IEEE Transactions on Neural Networks, 12(6), 1498-1504.
    • (2001) IEEE Transactions on Neural Networks , vol.12 , Issue.6 , pp. 1498-1504
    • Li, L.H.1    Lin, I.C.2    Hwang, M.S.3
  • 18
    • 0033704170 scopus 로고    scopus 로고
    • Methods for protecting password transmission
    • Peyravian, M., and N. Zunic (2000). Methods for protecting password transmission. Computers and Security, 19(5), 466-469.
    • (2000) Computers and Security , vol.19 , Issue.5 , pp. 466-469
    • Peyravian, M.1    Zunic, N.2
  • 19
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public key cryptosystems
    • Rivest, R.L., A. Shainir and L. Adleman (1978). A method for obtaining digital signatures and public key cryptosystems. Communications of the ACM, 21, 120-126.
    • (1978) Communications of the ACM , vol.21 , pp. 120-126
    • Rivest, R.L.1    Shainir, A.2    Adleman, L.3
  • 20
    • 0024012695 scopus 로고
    • The data encryption standard: Past and future
    • Smid, M.E., and D. K. Branstad (1988). The data encryption standard: past and future. Proc. of the IEEE, 76, 550-559.
    • (1988) Proc. of the IEEE , vol.76 , pp. 550-559
    • Smid, M.E.1    Branstad, D.K.2
  • 21
    • 0141518232 scopus 로고    scopus 로고
    • On the security of methods for protecting password transmission
    • Tseng, Y.M., J.K. Jan and H.Y. Chien (2001). On the security of methods for protecting password transmission. Informatica, 12(3), 469-477.
    • (2001) Informatica , vol.12 , Issue.3 , pp. 469-477
    • Tseng, Y.M.1    Jan, J.K.2    Chien, H.Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.