메뉴 건너뛰기




Volumn 31, Issue 3, 2005, Pages 175-189

Password authenticated key exchange protocols among diverse network domains

Author keywords

Authentication; Cryptography; Key exchange; Network security; Password guessing attacks; Perfect forward secrecy

Indexed keywords

CLIENT SERVER COMPUTER SYSTEMS; COMPUTER NETWORKS; CRYPTOGRAPHY; NETWORK PROTOCOLS; SERVERS;

EID: 22644442489     PISSN: 00457906     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.compeleceng.2005.03.001     Document Type: Article
Times cited : (13)

References (19)
  • 1
  • 4
    • 84937550984 scopus 로고    scopus 로고
    • Provably secure password-authenticated key exchange using Diffie-Hellman
    • Boyko V, MacKenzie P, Patel S. Provably secure password-authenticated key exchange using Diffie-Hellman. In: Advances in Cryptology-EUROCRYPT'00, 2000, p. 156-71.
    • (2000) Advances in Cryptology-EUROCRYPT'00 , pp. 156-171
    • Boyko, V.1    MacKenzie, P.2    Patel, S.3
  • 5
    • 0030261758 scopus 로고    scopus 로고
    • Strong password-only authenticated key exchange
    • D. Jablon Strong password-only authenticated key exchange ACM Comput Commun Rev 20 5 1996 5 26
    • (1996) ACM Comput Commun Rev , vol.20 , Issue.5 , pp. 5-26
    • Jablon, D.1
  • 7
    • 84945132563 scopus 로고    scopus 로고
    • Efficient password-authenticated key exchange using human-memorable passwords
    • J. Katz, R. Ostrovsky, and M. Yung Efficient password-authenticated key exchange using human-memorable passwords Adv Cryptol-EUROCRYPT'01 2001 475 494
    • (2001) Adv Cryptol-EUROCRYPT'01 , pp. 475-494
    • Katz, J.1    Ostrovsky, R.2    Yung, M.3
  • 8
    • 0032182009 scopus 로고    scopus 로고
    • Authentication key exchange protocols resistant to password guessing attacks
    • T. Kwon, and J. Song Authentication key exchange protocols resistant to password guessing attacks IEE Commun 145 5 1998 304 308
    • (1998) IEE Commun , vol.145 , Issue.5 , pp. 304-308
    • Kwon, T.1    Song, J.2
  • 9
    • 0345686108 scopus 로고    scopus 로고
    • Open key exchange: How to defeat dictionary attacks without encrypting public keys
    • Lucks S. Open key exchange: how to defeat dictionary attacks without encrypting public keys. In: Proceedings of the Workshop on Security Protocols, 1997, p. 79-90.
    • (1997) Proceedings of the Workshop on Security Protocols , pp. 79-90
    • Lucks, S.1
  • 14
    • 0032640752 scopus 로고    scopus 로고
    • xy via password authentication
    • xy via password authentication Electron Lett 35 11 1999 892 893
    • (1999) Electron Lett , vol.35 , Issue.11 , pp. 892-893
    • Kwon, T.1    Song, J.2
  • 15
    • 0033157651 scopus 로고    scopus 로고
    • An improvement of the password-based authentication protocol (K1P) on security against replay attacks
    • T. Kwon, M. Kang, M. Jung, and J. Song An improvement of the password-based authentication protocol (K1P) on security against replay attacks IEICE Trans Commun E82-B 7 1999 991 997
    • (1999) IEICE Trans Commun , vol.E82-B , Issue.7 , pp. 991-997
    • Kwon, T.1    Kang, M.2    Jung, M.3    Song, J.4
  • 16
    • 0031381717 scopus 로고    scopus 로고
    • An adaptable and reliable authentication protocol for communication networks
    • Kwon T, Kang M, Song J. An adaptable and reliable authentication protocol for communication networks. In: Proceedings of IEEE INFOCOM'97, 1997, p. 737-44.
    • (1997) Proceedings of IEEE INFOCOM'97 , pp. 737-744
    • Kwon, T.1    Kang, M.2    Song, J.3
  • 17
    • 0002839106 scopus 로고
    • Refinement and extension of encrypted key exchange
    • M. Steiner, G. Tsudik, and M. Waidner Refinement and extension of encrypted key exchange ACM Operat Syst Rev 29 3 1995 22 30
    • (1995) ACM Operat Syst Rev , vol.29 , Issue.3 , pp. 22-30
    • Steiner, M.1    Tsudik, G.2    Waidner, M.3
  • 18
    • 0002548429 scopus 로고
    • The evolution of the kerberos authentication system
    • IEEE Computer Society Press Berlin
    • J.T. Kohl, B.C. Neuman, and T. Ts'o The evolution of the kerberos authentication system Distributed Open System 1994 IEEE Computer Society Press Berlin 78 94
    • (1994) Distributed Open System , pp. 78-94
    • Kohl, J.T.1    Neuman, B.C.2    Ts'o, T.3
  • 19
    • 71849087704 scopus 로고    scopus 로고
    • Public-key cryptography and password protocols
    • S. Halevi, and H. Krawczyk Public-key cryptography and password protocols ACM Trans Inform Syst Security 2 3 1999 25 60
    • (1999) ACM Trans Inform Syst Security , vol.2 , Issue.3 , pp. 25-60
    • Halevi, S.1    Krawczyk, H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.