메뉴 건너뛰기




Volumn 15, Issue 3, 2005, Pages 193-202

Efficient authenticated key agreement protocols resistant to a denial-of-service attack

Author keywords

[No Author keywords available]

Indexed keywords

BANDWIDTH; DATA COMMUNICATION SYSTEMS; SECURITY OF DATA; SERVERS; SOCIETIES AND INSTITUTIONS; TELECOMMUNICATION SERVICES;

EID: 18844408349     PISSN: 10557148     EISSN: None     Source Type: Journal    
DOI: 10.1002/nem.561     Document Type: Article
Times cited : (17)

References (21)
  • 1
    • 0028532812 scopus 로고
    • Denial of services: An example
    • Needham RM. Denial of services: An example. Communications of ACM 1994; 37(11)-42-46.
    • (1994) Communications of ACM , vol.37 , Issue.11 , pp. 42-46
    • Needham, R.M.1
  • 5
    • 3342930018 scopus 로고    scopus 로고
    • Integrating authentication in public key distribution system
    • Lee WB, Chang CC. Integrating authentication in public key distribution system. Information Processing Letters 1996; 57:49-52.
    • (1996) Information Processing Letters , vol.57 , pp. 49-52
    • Lee, W.B.1    Chang, C.C.2
  • 7
    • 0041520685 scopus 로고    scopus 로고
    • Multi-party key agreement protocols with cheater identification
    • Tseng YM. Multi-party key agreement protocols with cheater identification. Applied Mathematics and Computation 2003; 145(2-3)551-559.
    • (2003) Applied Mathematics and Computation , vol.145 , Issue.2-3 , pp. 551-559
    • Tseng, Y.M.1
  • 8
    • 2042471479 scopus 로고    scopus 로고
    • On the security of an efficient two-pass key agreement protocol
    • Tseng YM. On the security of an efficient two-pass key agreement protocol. Computer Standards and Interfaces 2004; 26(4):371-374.
    • (2004) Computer Standards and Interfaces , vol.26 , Issue.4 , pp. 371-374
    • Tseng, Y.M.1
  • 10
    • 0032640752 scopus 로고    scopus 로고
    • xy via password authentication
    • xy via password authentication. Electronics Letters 1999; 35(11):892-893.
    • (1999) Electronics Letters , vol.35 , Issue.11 , pp. 892-893
    • Kwon, T.1    Song, J.2
  • 11
    • 84874800178 scopus 로고
    • A public key cryptosystem and signature scheme based on discrete logarithm
    • ElGamal T. A public key cryptosystem and signature scheme based on discrete logarithm. IEEE Transactions on Information Theory 1985; 31(4):469-472.
    • (1985) IEEE Transactions on Information Theory , vol.31 , Issue.4 , pp. 469-472
    • Elgamal, T.1
  • 17
    • 84943235829 scopus 로고
    • Pricing via processing or combating junk mail
    • Lecture Notes in Computer Science 740, Springer-Verlag
    • Dwork C, Naor M. Pricing via processing or combating junk mail. Advances in Cryptology - Crypto'92, Lecture Notes in Computer Science 740, Springer-Verlag, 1993; 139-147.
    • (1993) Advances in Cryptology - Crypto'92 , pp. 139-147
    • Dwork, C.1    Naor, M.2
  • 19
    • 0035311761 scopus 로고    scopus 로고
    • Key agreement protocols resistant to a denial-of-service attack
    • Hirose S, Matsuura K. Key agreement protocols resistant to a denial-of-service attack. IEICE Transactions on Information and Systems 2001; E-84-D(4):477-484.
    • (2001) IEICE Transactions on Information and Systems , vol.E-84-D , Issue.4 , pp. 477-484
    • Hirose, S.1    Matsuura, K.2
  • 20
    • 0001849866 scopus 로고    scopus 로고
    • The status of MD5 after a recent attack
    • Dobbertin H. The status of MD5 after a recent attack. CryptoBytes 1996; 2(2):1-6.
    • (1996) CryptoBytes , vol.2 , Issue.2 , pp. 1-6
    • Dobbertin, H.1
  • 21
    • 0002670834 scopus 로고    scopus 로고
    • Message recovery for signature schemes based on the discrete logarithm
    • Nyberg K, Rueppel RA. Message recovery for signature schemes based on the discrete logarithm. Designs Codes and Cryptography 1996; 7(1-2): 61-81.
    • (1996) Designs Codes and Cryptography , vol.7 , Issue.1-2 , pp. 61-81
    • Nyberg, K.1    Rueppel, R.A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.