-
5
-
-
0030261758
-
Strong password-only authenticated key exchange
-
D. Jablon Strong password-only authenticated key exchange ACM Comput Commun Rev 20 5 1996 5 26
-
(1996)
ACM Comput Commun Rev
, vol.20
, Issue.5
, pp. 5-26
-
-
Jablon, D.1
-
7
-
-
84945132563
-
Efficient password-authenticated key exchange using human-memorable passwords
-
J. Katz, R. Ostrovsky, and M. Yung Efficient password-authenticated key exchange using human-memorable passwords Adv Cryptol-EUROCRYPT'01 2001 475 494
-
(2001)
Adv Cryptol-EUROCRYPT'01
, pp. 475-494
-
-
Katz, J.1
Ostrovsky, R.2
Yung, M.3
-
8
-
-
0032182009
-
Authentication key exchange protocols resistant to password guessing attacks
-
T. Kwon, and J. Song Authentication key exchange protocols resistant to password guessing attacks IEE Commun 145 5 1998 304 308
-
(1998)
IEE Commun
, vol.145
, Issue.5
, pp. 304-308
-
-
Kwon, T.1
Song, J.2
-
9
-
-
0345686108
-
Open key exchange: How to defeat dictionary attacks without encrypting public keys
-
Lucks S. Open key exchange: how to defeat dictionary attacks without encrypting public keys. In: Proceedings of the Workshop on Security Protocols, 1997, p. 79-90.
-
(1997)
Proceedings of the Workshop on Security Protocols
, pp. 79-90
-
-
Lucks, S.1
-
11
-
-
0027615231
-
Protecting poorly chosen secrets from guessing attacks
-
L. Gong, M. Lomas, R. Needham, and J. Saltzer Protecting poorly chosen secrets from guessing attacks IEEE J Selected Areas Commun 11 5 1993 648 656
-
(1993)
IEEE J Selected Areas Commun
, vol.11
, Issue.5
, pp. 648-656
-
-
Gong, L.1
Lomas, M.2
Needham, R.3
Saltzer, J.4
-
14
-
-
0032640752
-
xy via password authentication
-
xy via password authentication Electron Lett 35 11 1999 892 893
-
(1999)
Electron Lett
, vol.35
, Issue.11
, pp. 892-893
-
-
Kwon, T.1
Song, J.2
-
15
-
-
0033157651
-
An improvement of the password-based authentication protocol (K1P) on security against replay attacks
-
T. Kwon, M. Kang, M. Jung, and J. Song An improvement of the password-based authentication protocol (K1P) on security against replay attacks IEICE Trans Commun E82-B 7 1999 991 997
-
(1999)
IEICE Trans Commun
, vol.E82-B
, Issue.7
, pp. 991-997
-
-
Kwon, T.1
Kang, M.2
Jung, M.3
Song, J.4
-
16
-
-
0031381717
-
An adaptable and reliable authentication protocol for communication networks
-
Kwon T, Kang M, Song J. An adaptable and reliable authentication protocol for communication networks. In: Proceedings of IEEE INFOCOM'97, 1997, p. 737-44.
-
(1997)
Proceedings of IEEE INFOCOM'97
, pp. 737-744
-
-
Kwon, T.1
Kang, M.2
Song, J.3
-
17
-
-
0002839106
-
Refinement and extension of encrypted key exchange
-
M. Steiner, G. Tsudik, and M. Waidner Refinement and extension of encrypted key exchange ACM Operat Syst Rev 29 3 1995 22 30
-
(1995)
ACM Operat Syst Rev
, vol.29
, Issue.3
, pp. 22-30
-
-
Steiner, M.1
Tsudik, G.2
Waidner, M.3
-
18
-
-
0002548429
-
The evolution of the kerberos authentication system
-
IEEE Computer Society Press Berlin
-
J.T. Kohl, B.C. Neuman, and T. Ts'o The evolution of the kerberos authentication system Distributed Open System 1994 IEEE Computer Society Press Berlin 78 94
-
(1994)
Distributed Open System
, pp. 78-94
-
-
Kohl, J.T.1
Neuman, B.C.2
Ts'o, T.3
-
19
-
-
71849087704
-
Public-key cryptography and password protocols
-
S. Halevi, and H. Krawczyk Public-key cryptography and password protocols ACM Trans Inform Syst Security 2 3 1999 25 60
-
(1999)
ACM Trans Inform Syst Security
, vol.2
, Issue.3
, pp. 25-60
-
-
Halevi, S.1
Krawczyk, H.2
|