-
1
-
-
0141946906
-
Security on the Internet: Authenticating the user
-
J. Botting Security on the Internet: authenticating the user Telecommunications 31 12 1997 77 80
-
(1997)
Telecommunications
, vol.31
, Issue.12
, pp. 77-80
-
-
Botting, J.1
-
2
-
-
0036556279
-
Improvement on Peyravian-Zunic's password authentication schemes
-
J.J. Hwang, and T.C. Yeh Improvement on Peyravian-Zunic's password authentication schemes EICE Transactions on Communications E85-B 4 2002 823 825
-
(2002)
EICE Transactions on Communications
, vol.E85-B
, Issue.4
, pp. 823-825
-
-
Hwang, J.J.1
Yeh, T.C.2
-
4
-
-
0033704170
-
Methods for protecting password transmission
-
M. Peyravian, and N. Zunic Methods for protecting password transmission Computers and Security 19 5 2000 466 469
-
(2000)
Computers and Security
, vol.19
, Issue.5
, pp. 466-469
-
-
Peyravian, M.1
Zunic, N.2
-
6
-
-
8344253818
-
-
FIPS PUB 180-2, August
-
National Institute of Standards and Technology, Secure Hash Standard, FIPS PUB 180-2, August 2002.
-
(2002)
Secure Hash Standard
-
-
-
7
-
-
0030261758
-
Strong password only authenticated key exchange
-
D.P. Jablon Strong password only authenticated key exchange Computer Communication Review 26 5 1996 5 26
-
(1996)
Computer Communication Review
, vol.26
, Issue.5
, pp. 5-26
-
-
Jablon, D.P.1
-
8
-
-
0037282439
-
A password authentication scheme with secure password updating
-
C.L. Lin, and T. Hwang A password authentication scheme with secure password updating Computers and Security 22 1 2003 68 72
-
(2003)
Computers and Security
, vol.22
, Issue.1
, pp. 68-72
-
-
Lin, C.L.1
Hwang, T.2
-
9
-
-
84937550984
-
Provably secure password authenticated key exchange using Diffie-Hellman
-
V. Boyko, P. MacKenzie, and S. Patel Provably secure password authenticated key exchange using Diffie-Hellman Proceedings of Eurocrypt 2000 156 171
-
(2000)
Proceedings of Eurocrypt
, pp. 156-171
-
-
Boyko, V.1
MacKenzie, P.2
Patel, S.3
-
11
-
-
58149326626
-
Password authentication using triangles and straight lines
-
T.L. Horng Password authentication using triangles and straight lines Computers and Mathematics Applications 30 9 1995 63 71
-
(1995)
Computers and Mathematics Applications
, vol.30
, Issue.9
, pp. 63-71
-
-
Horng, T.L.1
-
12
-
-
0141642166
-
On the security of some password authentication protocols
-
B.T. Hsieh, H.M. Sun, and T. Hwang On the security of some password authentication protocols Informatica 14 2 2003 195 204
-
(2003)
Informatica
, vol.14
, Issue.2
, pp. 195-204
-
-
Hsieh, B.T.1
Sun, H.M.2
Hwang, T.3
-
13
-
-
7644232640
-
Weaknesses of Lee-Li-Hwang's Hash-based password authentication scheme
-
W.C. Ku, C.M. Chen, and H.L. Lee Weaknesses of Lee-Li-Hwang's Hash-based password authentication scheme Operating Systems Review 37 4 2003 19 25
-
(2003)
Operating Systems Review
, vol.37
, Issue.4
, pp. 19-25
-
-
Ku, W.C.1
Chen, C.M.2
Lee, H.L.3
-
14
-
-
0032621240
-
The relationship between breaking the Diffie-Hellman protocol and computing discrete logarithms
-
U. Maurer, and S. Wolf The relationship between breaking the Diffie-Hellman protocol and computing discrete logarithms SIAM Journal on Computing 28 5 1999 1689 1721
-
(1999)
SIAM Journal on Computing
, vol.28
, Issue.5
, pp. 1689-1721
-
-
Maurer, U.1
Wolf, S.2
|