메뉴 건너뛰기




Volumn 29, Issue 5, 2006, Pages 660-667

Secure remote user access over insecure networks

Author keywords

Authentication; Hash; Network; Password; Security; User; Vulnerability

Indexed keywords

INTERNET; NETWORK PROTOCOLS; PUBLIC KEY CRYPTOGRAPHY; USER INTERFACES;

EID: 33144456748     PISSN: 01403664     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comcom.2005.07.025     Document Type: Conference Paper
Times cited : (54)

References (14)
  • 1
    • 0141946906 scopus 로고    scopus 로고
    • Security on the Internet: Authenticating the user
    • J. Botting Security on the Internet: authenticating the user Telecommunications 31 12 1997 77 80
    • (1997) Telecommunications , vol.31 , Issue.12 , pp. 77-80
    • Botting, J.1
  • 2
    • 0036556279 scopus 로고    scopus 로고
    • Improvement on Peyravian-Zunic's password authentication schemes
    • J.J. Hwang, and T.C. Yeh Improvement on Peyravian-Zunic's password authentication schemes EICE Transactions on Communications E85-B 4 2002 823 825
    • (2002) EICE Transactions on Communications , vol.E85-B , Issue.4 , pp. 823-825
    • Hwang, J.J.1    Yeh, T.C.2
  • 4
    • 0033704170 scopus 로고    scopus 로고
    • Methods for protecting password transmission
    • M. Peyravian, and N. Zunic Methods for protecting password transmission Computers and Security 19 5 2000 466 469
    • (2000) Computers and Security , vol.19 , Issue.5 , pp. 466-469
    • Peyravian, M.1    Zunic, N.2
  • 6
    • 8344253818 scopus 로고    scopus 로고
    • FIPS PUB 180-2, August
    • National Institute of Standards and Technology, Secure Hash Standard, FIPS PUB 180-2, August 2002.
    • (2002) Secure Hash Standard
  • 7
    • 0030261758 scopus 로고    scopus 로고
    • Strong password only authenticated key exchange
    • D.P. Jablon Strong password only authenticated key exchange Computer Communication Review 26 5 1996 5 26
    • (1996) Computer Communication Review , vol.26 , Issue.5 , pp. 5-26
    • Jablon, D.P.1
  • 8
    • 0037282439 scopus 로고    scopus 로고
    • A password authentication scheme with secure password updating
    • C.L. Lin, and T. Hwang A password authentication scheme with secure password updating Computers and Security 22 1 2003 68 72
    • (2003) Computers and Security , vol.22 , Issue.1 , pp. 68-72
    • Lin, C.L.1    Hwang, T.2
  • 9
    • 84937550984 scopus 로고    scopus 로고
    • Provably secure password authenticated key exchange using Diffie-Hellman
    • V. Boyko, P. MacKenzie, and S. Patel Provably secure password authenticated key exchange using Diffie-Hellman Proceedings of Eurocrypt 2000 156 171
    • (2000) Proceedings of Eurocrypt , pp. 156-171
    • Boyko, V.1    MacKenzie, P.2    Patel, S.3
  • 11
    • 58149326626 scopus 로고
    • Password authentication using triangles and straight lines
    • T.L. Horng Password authentication using triangles and straight lines Computers and Mathematics Applications 30 9 1995 63 71
    • (1995) Computers and Mathematics Applications , vol.30 , Issue.9 , pp. 63-71
    • Horng, T.L.1
  • 12
    • 0141642166 scopus 로고    scopus 로고
    • On the security of some password authentication protocols
    • B.T. Hsieh, H.M. Sun, and T. Hwang On the security of some password authentication protocols Informatica 14 2 2003 195 204
    • (2003) Informatica , vol.14 , Issue.2 , pp. 195-204
    • Hsieh, B.T.1    Sun, H.M.2    Hwang, T.3
  • 13
    • 7644232640 scopus 로고    scopus 로고
    • Weaknesses of Lee-Li-Hwang's Hash-based password authentication scheme
    • W.C. Ku, C.M. Chen, and H.L. Lee Weaknesses of Lee-Li-Hwang's Hash-based password authentication scheme Operating Systems Review 37 4 2003 19 25
    • (2003) Operating Systems Review , vol.37 , Issue.4 , pp. 19-25
    • Ku, W.C.1    Chen, C.M.2    Lee, H.L.3
  • 14
    • 0032621240 scopus 로고    scopus 로고
    • The relationship between breaking the Diffie-Hellman protocol and computing discrete logarithms
    • U. Maurer, and S. Wolf The relationship between breaking the Diffie-Hellman protocol and computing discrete logarithms SIAM Journal on Computing 28 5 1999 1689 1721
    • (1999) SIAM Journal on Computing , vol.28 , Issue.5 , pp. 1689-1721
    • Maurer, U.1    Wolf, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.