메뉴 건너뛰기




Volumn 3450, Issue , 2005, Pages 101-116

Ephemeral pairing on anonymous networks

Author keywords

Anonymous networks; Authentication; Identification; Key exchange; Pairing

Indexed keywords

BANDWIDTH; COMMUNICATION CHANNELS (INFORMATION THEORY); DIGITAL COMMUNICATION SYSTEMS; MOBILE COMPUTING; NETWORK PROTOCOLS; PROBLEM SOLVING;

EID: 24644472550     PISSN: 03029743     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/978-3-540-32004-3_12     Document Type: Conference Paper
Times cited : (24)

References (16)
  • 1
    • 33751044073 scopus 로고    scopus 로고
    • Talking to strangers: Authentication in ad-hoc wireless networks
    • [BSSW02] San Diego, CA, USA
    • [BSSW02] BALFANZ, D., SMETTERS, D. K., STEWART, P., AND WONG, H. C. Talking to strangers: Authentication in ad-hoc wireless networks. In NDSS (San Diego, CA, USA, 2002).
    • (2002) NDSS
    • Balfanz, D.1    Smetters, D.K.2    Stewart, P.3    Wong, H.C.4
  • 2
    • 84873466407 scopus 로고    scopus 로고
    • Authenticated key exchange secure against dictionary attacks
    • [BPR00] Bruges, Belgium, 2000, B. Preneel (Ed.), LNCS 1807, Springer
    • [BPR00] BELLARE, M., POINTCHEVAL, D., AND ROGAWAY, P. Authenticated key exchange secure against dictionary attacks. In EUROCRYPT 2000 (Bruges, Belgium, 2000), B. Preneel (Ed.), LNCS 1807, Springer, pp. 139-155.
    • EUROCRYPT 2000 , pp. 139-155
    • Bellare, M.1    Pointcheval, D.2    Rogaway, P.3
  • 3
    • 0026850091 scopus 로고
    • Encrypted key exchange: Password-based protocols secure against dictionary attacks
    • [BM92] (Oakland, CA, USA), IEEE
    • [BM92] BELLOVIN, S. M., AND MERRITT, M. Encrypted key exchange: Password-based protocols secure against dictionary attacks. In IEEE Security & Privacy (Oakland, CA, USA, 1992), IEEE, pp. 72-84.
    • (1992) IEEE Security & Privacy , pp. 72-84
    • Bellovin, S.M.1    Merritt, M.2
  • 4
    • 84937550984 scopus 로고    scopus 로고
    • Provably secure password-authenticated key exchange using Diffie-Hellman
    • [BMP00] Bruges, Belgium, 2000, B. Preneel (Ed.), LNCS 1807, Springer
    • [BMP00] BOYKO, V., MACKENZIE, P., AND PATEL, S. Provably secure password-authenticated key exchange using Diffie-Hellman. In EUROCRYPT 2000 (Bruges, Belgium, 2000), B. Preneel (Ed.), LNCS 1807, Springer, pp. 156-171.
    • EUROCRYPT 2000 , pp. 156-171
    • Boyko, V.1    Mackenzie, P.2    Patel, S.3
  • 5
    • 35048860626 scopus 로고    scopus 로고
    • Analysis of key-exchange protocols and their use for building secure channels
    • [CK01] (Innsbruck, Austria), B. Pfitzmann (Ed.), LNCS 2045, Springer
    • [CK01] CANETTI, R., AND KRAWCZYK, H. Analysis of key-exchange protocols and their use for building secure channels. In EUROCRYPT 2001 (Innsbruck, Austria, 2001), B. Pfitzmann (Ed.), LNCS 2045, Springer, pp. 453-474.
    • (2001) EUROCRYPT 2001 , pp. 453-474
    • Canetti, R.1    Krawczyk, H.2
  • 6
    • 0017018484 scopus 로고
    • New directions in cryptography
    • [DH76]
    • [DH76] DIFFIE, W., AND HELLMAN, M. E. New directions in cryptography. IEEE Trans. Inf. Theory IT-11 (1976), 644-654.
    • (1976) IEEE Trans. Inf. Theory , vol.IT-11 , pp. 644-654
    • Diffie, W.1    Hellman, M.E.2
  • 8
    • 23944521144 scopus 로고    scopus 로고
    • Manual authentication for wireless devices
    • [GMN04]
    • [GMN04] GEHRMANN, C., MITCHELL, C. J., AND NYBERG, K. Manual authentication for wireless devices. RSA Cryptobytes 7, 1 (2004), 29-37.
    • (2004) RSA Cryptobytes , vol.7 , Issue.1 , pp. 29-37
    • Gehrmann, C.1    Mitchell, C.J.2    Nyberg, K.3
  • 9
    • 24644434353 scopus 로고    scopus 로고
    • Security in personal area networks
    • [GN04] C. J. Mitchell (Ed.). IEEE
    • [GN04] GEHRMANN, C., AND NYBERG, K. Security in personal area networks. In Security for Mobility, C. J. Mitchell (Ed.). IEEE, 2004.
    • (2004) Security for Mobility
    • Gehrmann, C.1    Nyberg, K.2
  • 10
    • 24144468439 scopus 로고    scopus 로고
    • A framework for password-based authenticated key exchange
    • [GL03] IBM T.J. Watson. Abstract appeared in EUROCRYPT 2003
    • [GL03] GENNARO, R., AND LINDELL, Y. A framework for password-based authenticated key exchange. Tech. rep., IBM T.J. Watson, 2003. Abstract appeared in EUROCRYPT 2003.
    • (2003) Tech. Rep.
    • Gennaro, R.1    Lindell, Y.2
  • 11
    • 34247333484 scopus 로고    scopus 로고
    • The ephemeral pairing problem
    • [Hoe04] (Key West, FL, USA), LNCS 3110, Springer
    • [Hoe04] HOEPMAN, J.-H. The ephemeral pairing problem. In 8th Int. Conf. Fin. Crypt. (Key West, FL, USA, 2004), LNCS 3110, Springer, pp. 212-226.
    • (2004) 8th Int. Conf. Fin. Crypt. , pp. 212-226
    • Hoepman, J.-H.1
  • 12
    • 0030261758 scopus 로고    scopus 로고
    • Strong password-only authenticated key exchange
    • [Jab96] and www.integritysciences.com
    • [Jab96] JABLON, D. P. Strong password-only authenticated key exchange. Comput. Comm. Rev. (1996). http://www.std.com/~dpj and www.integritysciences. com.
    • (1996) Comput. Comm. Rev.
    • Jablon, D.P.1
  • 13
    • 84945132563 scopus 로고    scopus 로고
    • Efficient password-authenticated key exchange using human-memorable passwords
    • [KOY01] (Innsbruck, Austria), B. Pfitzmann (Ed.), LNCS 2045, Springer
    • [KOY01] KATZ, J., OSTROVSKY, R., AND YUNG, M. Efficient password-authenticated key exchange using human-memorable passwords. In EUROCRYPT 2001 (Innsbruck, Austria, 2001), B. Pfitzmann (Ed.), LNCS 2045, Springer, pp. 475-494.
    • (2001) EUROCRYPT 2001 , pp. 475-494
    • Katz, J.1    Ostrovsky, R.2    Yung, M.3
  • 14
    • 0345686108 scopus 로고    scopus 로고
    • Open key exchange: How to defeat dictionary attacks without encrypting public keys
    • [Luc97]
    • [Luc97] LUCKS, S. Open key exchange: How to defeat dictionary attacks without encrypting public keys. In The Security Protocol Workshop '97 (1997), pp. 79-90.
    • (1997) The Security Protocol Workshop '97 , pp. 79-90
    • Lucks, S.1
  • 15
    • 0004023090 scopus 로고    scopus 로고
    • On formal models for secure key exchange
    • [Sho99] IBM 1999. Invited talk at ACM Computer and Communications Security conference
    • [Sho99] SHOUP, V. On formal models for secure key exchange. Tech. Rep. RZ 3120 (#93166), IBM, 1999. Invited talk at ACM Computer and Communications Security conference, 1999.
    • (1999) Tech. Rep. RZ 3120 (#93166)
    • Shoup, V.1
  • 16
    • 0001831930 scopus 로고    scopus 로고
    • The resurrecting duckling: Security issues for ad-hoc wireless networks
    • [SA99] B. Christianson, B. Crispo, and M. Roe (Eds.), LNCS
    • [SA99] STAJANO, F., AND ANDERSON, R. The resurrecting duckling: Security issues for ad-hoc wireless networks. In Security Procotols, 7th Int. Workshop (1999), B. Christianson, B. Crispo, and M. Roe (Eds.), LNCS, pp. 172-194.
    • (1999) Security Procotols, 7th Int. Workshop , pp. 172-194
    • Stajano, F.1    Anderson, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.