-
1
-
-
0037282439
-
A password authentication scheme with secure password updating
-
Lin, C.-L. and Hwang, T. (2003) A password authentication scheme with secure password updating. Comp. Sec., 22(1), 68-72.
-
(2003)
Comp. Sec.
, vol.22
, Issue.1
, pp. 68-72
-
-
Lin, C.-L.1
Hwang, T.2
-
2
-
-
0034204951
-
Simple and secure password authentication protocol (SAS)
-
Sandirigama, M., Shimizu, A. and Noda, M. T. (2000) Simple and secure password authentication protocol (SAS). IEICE Trans. Commun., E83-B(6), 1363-1365.
-
(2000)
IEICE Trans. Commun.
, vol.E83-B
, Issue.6
, pp. 1363-1365
-
-
Sandirigama, M.1
Shimizu, A.2
Noda, M.T.3
-
3
-
-
0012543492
-
-
IEICE Technical Report OFS2001-48, No. 435, The Institute of Electronics, Information and Communication Engineers, Tokyo, Japan
-
Kamioka, T. and Shimizum, A. (2001) The examination of the security of SAS one-time password authentication. IEICE Technical Report OFS2001-48, No. 435, The Institute of Electronics, Information and Communication Engineers, Tokyo, Japan.
-
(2001)
The Examination of the Security of SAS One-Time Password Authentication
-
-
Kamioka, T.1
Shimizum, A.2
-
4
-
-
0035445093
-
Attacks and solutions on strong-password authentication
-
Lin, C.-L., Sun, H.-M. and Hwang, T. (2001) Attacks and solutions on strong-password authentication. IEICE Trans. Commun., E84-B 9), 2622-2627.
-
(2001)
IEICE Trans. Commun.
, vol.E84-B
, Issue.9
, pp. 2622-2627
-
-
Lin, C.-L.1
Sun, H.-M.2
Hwang, T.3
-
5
-
-
0037230409
-
Robust and simple authentication protocol
-
Chien, H.-Y. and Jan, J.-K. (2003) Robust and simple authentication protocol. Comp. J., 46(2), 193-201.
-
(2003)
Comp. J.
, vol.46
, Issue.2
, pp. 193-201
-
-
Chien, H.-Y.1
Jan, J.-K.2
-
7
-
-
0005986692
-
Secret-key agreement without public key cryptography
-
LNCS, 2729, Springer-Verlag
-
Leighton, T. and Micali, S. (1994) Secret-key agreement without public key cryptography. In: Proceedings of Crypto'93, LNCS, 2729, Springer-Verlag.
-
(1994)
Proceedings of Crypto'93
-
-
Leighton, T.1
Micali, S.2
-
8
-
-
0029221302
-
On key agreements based on tamper-proof hardware
-
Zheng, Y. (1995) On key agreements based on tamper-proof hardware, Inform. Proc. Lett., 53, 49-54.
-
(1995)
Inform. Proc. Lett.
, vol.53
, pp. 49-54
-
-
Zheng, Y.1
-
9
-
-
0032218234
-
Authenticated group key agreement and friends
-
Gong, L. and Reiter, M. (eds), San Francisco, CA, ACM Press, New York
-
Ateniese, G., Steiner, M. and Tsudik, G. (1998) Authenticated group key agreement and friends. In Gong, L. and Reiter, M. (eds), Proceedings of the 5th ACM Conference on Computer and Communications Security, San Francisco, CA, pp. 17-26. ACM Press, New York.
-
(1998)
Proceedings of the 5th ACM Conference on Computer and Communications Security
, pp. 17-26
-
-
Ateniese, G.1
Steiner, M.2
Tsudik, G.3
|