-
1
-
-
33751044073
-
Talking to strangers: Authentication in ad-hoc wireless networks
-
[BSSW02] San Diego, CA, USA
-
[BSSW02] BALFANZ, D., SMETTERS, D. K., STEWART, P., AND WONG, H. C. Talking to strangers: Authentication in ad-hoc wireless networks. In NDSS (San Diego, CA, USA, 2002).
-
(2002)
NDSS
-
-
Balfanz, D.1
Smetters, D.K.2
Stewart, P.3
Wong, H.C.4
-
2
-
-
84873466407
-
Authenticated key exchange secure against dictionary attacks
-
[BPR00] Bruges, Belgium, 2000, B. Preneel (Ed.), LNCS 1807, Springer
-
[BPR00] BELLARE, M., POINTCHEVAL, D., AND ROGAWAY, P. Authenticated key exchange secure against dictionary attacks. In EUROCRYPT 2000 (Bruges, Belgium, 2000), B. Preneel (Ed.), LNCS 1807, Springer, pp. 139-155.
-
EUROCRYPT 2000
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
3
-
-
0026850091
-
Encrypted key exchange: Password-based protocols secure against dictionary attacks
-
[BM92] (Oakland, CA, USA), IEEE
-
[BM92] BELLOVIN, S. M., AND MERRITT, M. Encrypted key exchange: Password-based protocols secure against dictionary attacks. In IEEE Security & Privacy (Oakland, CA, USA, 1992), IEEE, pp. 72-84.
-
(1992)
IEEE Security & Privacy
, pp. 72-84
-
-
Bellovin, S.M.1
Merritt, M.2
-
4
-
-
84937550984
-
Provably secure password-authenticated key exchange using Diffie-Hellman
-
[BMP00] Bruges, Belgium, 2000, B. Preneel (Ed.), LNCS 1807, Springer
-
[BMP00] BOYKO, V., MACKENZIE, P., AND PATEL, S. Provably secure password-authenticated key exchange using Diffie-Hellman. In EUROCRYPT 2000 (Bruges, Belgium, 2000), B. Preneel (Ed.), LNCS 1807, Springer, pp. 156-171.
-
EUROCRYPT 2000
, pp. 156-171
-
-
Boyko, V.1
Mackenzie, P.2
Patel, S.3
-
5
-
-
35048860626
-
Analysis of key-exchange protocols and their use for building secure channels
-
[CK01] (Innsbruck, Austria), B. Pfitzmann (Ed.), LNCS 2045, Springer
-
[CK01] CANETTI, R., AND KRAWCZYK, H. Analysis of key-exchange protocols and their use for building secure channels. In EUROCRYPT 2001 (Innsbruck, Austria, 2001), B. Pfitzmann (Ed.), LNCS 2045, Springer, pp. 453-474.
-
(2001)
EUROCRYPT 2001
, pp. 453-474
-
-
Canetti, R.1
Krawczyk, H.2
-
6
-
-
0017018484
-
New directions in cryptography
-
[DH76]
-
[DH76] DIFFIE, W., AND HELLMAN, M. E. New directions in cryptography. IEEE Trans. Inf. Theory IT-11 (1976), 644-654.
-
(1976)
IEEE Trans. Inf. Theory
, vol.IT-11
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.E.2
-
8
-
-
23944521144
-
Manual authentication for wireless devices
-
[GMN04]
-
[GMN04] GEHRMANN, C., MITCHELL, C. J., AND NYBERG, K. Manual authentication for wireless devices. RSA Cryptobytes 7, 1 (2004), 29-37.
-
(2004)
RSA Cryptobytes
, vol.7
, Issue.1
, pp. 29-37
-
-
Gehrmann, C.1
Mitchell, C.J.2
Nyberg, K.3
-
9
-
-
24644434353
-
Security in personal area networks
-
[GN04] C. J. Mitchell (Ed.). IEEE
-
[GN04] GEHRMANN, C., AND NYBERG, K. Security in personal area networks. In Security for Mobility, C. J. Mitchell (Ed.). IEEE, 2004.
-
(2004)
Security for Mobility
-
-
Gehrmann, C.1
Nyberg, K.2
-
10
-
-
24144468439
-
A framework for password-based authenticated key exchange
-
[GL03] IBM T.J. Watson. Abstract appeared in EUROCRYPT 2003
-
[GL03] GENNARO, R., AND LINDELL, Y. A framework for password-based authenticated key exchange. Tech. rep., IBM T.J. Watson, 2003. Abstract appeared in EUROCRYPT 2003.
-
(2003)
Tech. Rep.
-
-
Gennaro, R.1
Lindell, Y.2
-
11
-
-
34247333484
-
The ephemeral pairing problem
-
[Hoe04] (Key West, FL, USA), LNCS 3110, Springer
-
[Hoe04] HOEPMAN, J.-H. The ephemeral pairing problem. In 8th Int. Conf. Fin. Crypt. (Key West, FL, USA, 2004), LNCS 3110, Springer, pp. 212-226.
-
(2004)
8th Int. Conf. Fin. Crypt.
, pp. 212-226
-
-
Hoepman, J.-H.1
-
12
-
-
0030261758
-
Strong password-only authenticated key exchange
-
[Jab96] and www.integritysciences.com
-
[Jab96] JABLON, D. P. Strong password-only authenticated key exchange. Comput. Comm. Rev. (1996). http://www.std.com/~dpj and www.integritysciences. com.
-
(1996)
Comput. Comm. Rev.
-
-
Jablon, D.P.1
-
13
-
-
84945132563
-
Efficient password-authenticated key exchange using human-memorable passwords
-
[KOY01] (Innsbruck, Austria), B. Pfitzmann (Ed.), LNCS 2045, Springer
-
[KOY01] KATZ, J., OSTROVSKY, R., AND YUNG, M. Efficient password-authenticated key exchange using human-memorable passwords. In EUROCRYPT 2001 (Innsbruck, Austria, 2001), B. Pfitzmann (Ed.), LNCS 2045, Springer, pp. 475-494.
-
(2001)
EUROCRYPT 2001
, pp. 475-494
-
-
Katz, J.1
Ostrovsky, R.2
Yung, M.3
-
14
-
-
0345686108
-
Open key exchange: How to defeat dictionary attacks without encrypting public keys
-
[Luc97]
-
[Luc97] LUCKS, S. Open key exchange: How to defeat dictionary attacks without encrypting public keys. In The Security Protocol Workshop '97 (1997), pp. 79-90.
-
(1997)
The Security Protocol Workshop '97
, pp. 79-90
-
-
Lucks, S.1
-
15
-
-
0004023090
-
On formal models for secure key exchange
-
[Sho99] IBM 1999. Invited talk at ACM Computer and Communications Security conference
-
[Sho99] SHOUP, V. On formal models for secure key exchange. Tech. Rep. RZ 3120 (#93166), IBM, 1999. Invited talk at ACM Computer and Communications Security conference, 1999.
-
(1999)
Tech. Rep. RZ 3120 (#93166)
-
-
Shoup, V.1
-
16
-
-
0001831930
-
The resurrecting duckling: Security issues for ad-hoc wireless networks
-
[SA99] B. Christianson, B. Crispo, and M. Roe (Eds.), LNCS
-
[SA99] STAJANO, F., AND ANDERSON, R. The resurrecting duckling: Security issues for ad-hoc wireless networks. In Security Procotols, 7th Int. Workshop (1999), B. Christianson, B. Crispo, and M. Roe (Eds.), LNCS, pp. 172-194.
-
(1999)
Security Procotols, 7th Int. Workshop
, pp. 172-194
-
-
Stajano, F.1
Anderson, R.2
|