메뉴 건너뛰기




Volumn 3, Issue 2, 2006, Pages 105-114

A practical password-based two-server authentication and key exchange system

Author keywords

Key exchange; Offline dictionary attack; Password system; Password verification data (PVD); User authentication

Indexed keywords

BIOMEDICAL ENGINEERING; DATABASE SYSTEMS; MATHEMATICAL MODELS; ONLINE SYSTEMS; SERVERS; SOCIETIES AND INSTITUTIONS; USER INTERFACES;

EID: 33646721791     PISSN: 15455971     EISSN: None     Source Type: Journal    
DOI: 10.1109/TDSC.2006.16     Document Type: Article
Times cited : (71)

References (24)
  • 4
    • 0026850091 scopus 로고
    • Encrypted key exchange: Password-based protocols secure against dictionary attacks
    • S. Bellovin and M. Merritt, "Encrypted Key Exchange: Password-Based Protocols Secure against Dictionary Attacks," Proc. IEEE Symp. Research in Security and Privacy, pp. 72-84, 1992.
    • (1992) Proc. IEEE Symp. Research in Security and Privacy , pp. 72-84
    • Bellovin, S.1    Merritt, M.2
  • 5
    • 0027741529 scopus 로고
    • Augmented encrypted key exchange: A password-based protocol secure against dictionary attacks and password file compromise
    • S. Bellovin and M. Merritt, "Augmented Encrypted Key Exchange: A Password-Based Protocol Secure against Dictionary Attacks and Password File Compromise," Proc. ACM Conf. Computer and Comm. Security, pp. 244-250, 1993.
    • (1993) Proc. ACM Conf. Computer and Comm. Security , pp. 244-250
    • Bellovin, S.1    Merritt, M.2
  • 6
    • 0033280383 scopus 로고    scopus 로고
    • Public-key cryptography and password protocols: The multi-user case
    • M.K. Boyarsky, "Public-Key Cryptography and Password Protocols: The Multi-User Case," Proc. ACM Conf. Computer and Comm. Security, pp. 63-72, 1999.
    • (1999) Proc. ACM Conf. Computer and Comm. Security , pp. 63-72
    • Boyarsky, M.K.1
  • 8
    • 0027726717 scopus 로고
    • Random oracles are practical: A paradigm for designing efficient protocols
    • M. Bellare and P. Rogaway, "Random Oracles are Practical: A Paradigm for Designing Efficient Protocols," Proc. ACM Computer and Comm. Security, pp. 62-73, 1993.
    • (1993) Proc. ACM Computer and Comm. Security , pp. 62-73
    • Bellare, M.1    Rogaway, P.2
  • 9
    • 0033879372 scopus 로고    scopus 로고
    • Complexity and fast algorithms for multi-exponentiations
    • V.S. Dimitrov, G.A. Jullien, and W.C. Miller, "Complexity and Fast Algorithms for Multi-Exponentiations," IEEE Trans. Computers, vol. 49, no. 2, pp. 141-147, 2000.
    • (2000) IEEE Trans. Computers , vol.49 , Issue.2 , pp. 141-147
    • Dimitrov, V.S.1    Jullien, G.A.2    Miller, W.C.3
  • 11
  • 14
    • 84937539386 scopus 로고    scopus 로고
    • Password authentication using multiple servers
    • D.P. Jablon, "Password Authentication Using Multiple Servers," RSA Security Conf., pp. 344-360, 2001.
    • (2001) RSA Security Conf. , pp. 344-360
    • Jablon, D.P.1
  • 16
    • 0040231044 scopus 로고
    • Foiling the cracker-a survey of, and improvements to, password security
    • D.V. Klein, "Foiling the Cracker-A Survey of, and Improvements to, Password Security," Proc. Second USENIX Security Symp., pp. 5-14, 1990.
    • (1990) Proc. Second USENIX Security Symp. , pp. 5-14
    • Klein, D.V.1
  • 19
    • 84945132563 scopus 로고    scopus 로고
    • Efficient password-authenticated key exchange using human-memorable passwords
    • J. Katz, R. Ostrovsky, and M. Yung, "Efficient Password- Authenticated Key Exchange Using Human-Memorable Passwords," Proc. Advances in Cryptology (Eurocrypt '01), pp. 475-494, 2001.
    • (2001) Proc. Advances in Cryptology (Eurocrypt '01) , pp. 475-494
    • Katz, J.1    Ostrovsky, R.2    Yung, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.