메뉴 건너뛰기




Volumn 38, Issue 1, 2004, Pages 29-34

A hash-based strong-password authentication scheme without using smart cards

Author keywords

Denial of service attack; Password file compromise attack; Replay attack; Strong password; User authentication

Indexed keywords

COMPUTER CRIME; SECURITY OF DATA; SMART CARDS;

EID: 33744725812     PISSN: 01635980     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/974104.974107     Document Type: Conference Paper
Times cited : (33)

References (17)
  • 1
    • 0027741529 scopus 로고
    • Augmented encrypted key exchange: A password-based protocol secure against dictionary attacks and password-file compromise
    • S. Bellovin and M. Merritt, "Augmented encrypted key exchange: A password-based protocol secure against dictionary attacks and password-file compromise," in Proceedings of the ACM Conference on Computer and Communications Security, pp. 244-250, 1993.
    • (1993) Proceedings of the ACM Conference on Computer and Communications Security , pp. 244-250
    • Bellovin, S.1    Merritt, M.2
  • 2
    • 0037285263 scopus 로고    scopus 로고
    • Stolen-verifier attack on two new strong-password authentication protocols
    • Nov
    • C. M. Chen and W. C. Ku, "Stolen-verifier attack on two new strong-password authentication protocols," IEICE Transactions on Communications, vol. E85-B, no. 11, pp. 2519-2521, Nov. 2002.
    • (2002) IEICE Transactions on Communications , vol.E85-B , Issue.11 , pp. 2519-2521
    • Chen, C.M.1    Ku, W.C.2
  • 5
    • 0000873739 scopus 로고
    • Reparable key distribution protocols for Internet environments
    • May
    • T. Hwang and W. C. Ku, "Reparable key distribution protocols for Internet environments," IEEE Transactions on Communications, vol. 43, no. 5, pp. 1947-1950, May 1995.
    • (1995) IEEE Transactions on Communications , vol.43 , Issue.5 , pp. 1947-1950
    • Hwang, T.1    Ku, W.C.2
  • 6
    • 0030261758 scopus 로고    scopus 로고
    • Strong password-only authenticated key exchange
    • D. Jablon, "Strong password-only authenticated key exchange," ACM Computer Communications Review, vol. 20, no. 5, pp. 5-26, 1996.
    • (1996) ACM Computer Communications Review , vol.20 , Issue.5 , pp. 5-26
    • Jablon, D.1
  • 7
    • 0142007776 scopus 로고    scopus 로고
    • Cryptanalysis of a variant of Peyravian-Zunic's password authentication scheme
    • May
    • W. C. Ku, C. M. Chen, and H. L. Lee, "Cryptanalysis of a variant of Peyravian-Zunic's password authentication scheme," IEICE Transactions on Communications, vol. E86-B, no. 5, pp. 1682-1684, May 2003.
    • (2003) IEICE Transactions on Communications , vol.E86-B , Issue.5 , pp. 1682-1684
    • Ku, W.C.1    Chen, C.M.2    Lee, H.L.3
  • 8
    • 21244469256 scopus 로고    scopus 로고
    • Two simple attacks on Lin-Shen-Hwang's strong-password authentication protocol
    • Oct
    • W. C. Ku, H. C. Tsai, and S. M. Chen, "Two simple attacks on Lin-Shen-Hwang's strong-password authentication protocol," ACM Operating Systems Review, vol. 37, no. 4, pp. 26-31, Oct. 2003.
    • (2003) ACM Operating Systems Review , vol.37 , Issue.4 , pp. 26-31
    • Ku, W.C.1    Tsai, H.C.2    Chen, S.M.3
  • 9
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • Nov
    • L. Lamport, "Password authentication with insecure communication," Communications of the ACM, vol. 24, no. 11, pp. 770-772, Nov. 1981.
    • (1981) Communications of the ACM , vol.24 , Issue.11 , pp. 770-772
    • Lamport, L.1
  • 10
    • 0035445093 scopus 로고    scopus 로고
    • Attacks and solutions on strong-password authentication
    • Sept
    • C. L. Lin, H. M. Sun, and T. Hwang, "Attacks and solutions on strong-password authentication," IEICE Transactions on Communications, vol. E84-B, no. 9, pp. 2622-2627, Sept. 2001.
    • (2001) IEICE Transactions on Communications , vol.E84-B , Issue.9 , pp. 2622-2627
    • Lin, C.L.1    Sun, H.M.2    Hwang, T.3
  • 11
    • 23444434098 scopus 로고    scopus 로고
    • Security enhancement for optimal strong password authentication protocol
    • April
    • C. W. Lin, J. J. Shen, and M. S. Hwang, "Security enhancement for optimal strong password authentication protocol," ACM Operating Systems Review, vol. 37, no. 2, pp. 7-12, April 2003.
    • (2003) ACM Operating Systems Review , vol.37 , Issue.2 , pp. 7-12
    • Lin, C.W.1    Shen, J.J.2    Hwang, M.S.3
  • 12
    • 0013456359 scopus 로고    scopus 로고
    • Comments on the S/KEY user authentication scheme
    • Oct
    • C. J. Mitchell and L. Chen, "Comments on the S/KEY user authentication scheme," ACM Operating Systems Review, vol. 30, no. 4, pp. 12-16, Oct. 1996.
    • (1996) ACM Operating Systems Review , vol.30 , Issue.4 , pp. 12-16
    • Mitchell, C.J.1    Chen, L.2
  • 13
    • 0034204951 scopus 로고    scopus 로고
    • Simple and secure password authentication protocol (SAS)
    • June
    • M. Sandirigama, A. Shimizu, and M. T. Noda, "Simple and secure password authentication protocol (SAS)," IEICE Transactions on Communications, vol. E83-B, no. 6, pp. 1363-1365, June 2000.
    • (2000) IEICE Transactions on Communications , vol.E83-B , Issue.6 , pp. 1363-1365
    • Sandirigama, M.1    Shimizu, A.2    Noda, M.T.3
  • 14
    • 34248565307 scopus 로고    scopus 로고
    • A. Shimizu, A dynamic password authentication method by one-way function, IEICE Transactions, J73-D-I, no. 7, pp. 630-636, July 1990.
    • A. Shimizu, "A dynamic password authentication method by one-way function," IEICE Transactions, vol. J73-D-I, no. 7, pp. 630-636, July 1990.
  • 15
    • 0032137355 scopus 로고    scopus 로고
    • A password authentication methods for contents communication on the Internet
    • Aug
    • A. Shimizu, T. Horioka, and H. Inagaki, "A password authentication methods for contents communication on the Internet," IEICE Transactions on Communications, vol. E81-B, no. 8, pp. 1666-1673, Aug. 1998.
    • (1998) IEICE Transactions on Communications , vol.E81-B , Issue.8 , pp. 1666-1673
    • Shimizu, A.1    Horioka, T.2    Inagaki, H.3
  • 16
    • 0141938442 scopus 로고    scopus 로고
    • An impersonation attack on one-time password authentication protocol OSPA
    • July
    • T. Tsuji and A. Shimizu, "An impersonation attack on one-time password authentication protocol OSPA," IEICE Transactions on Communications, vol. E86-B, no. 7, pp. 2182-2185, July 2003.
    • (2003) IEICE Transactions on Communications , vol.E86-B , Issue.7 , pp. 2182-2185
    • Tsuji, T.1    Shimizu, A.2
  • 17
    • 34248548154 scopus 로고    scopus 로고
    • D11 (Standard specifications for password-based public-key cryptographic techniques), IEEE P1363 working group,
    • IEEE P1363.2, Aug
    • IEEE P1363.2 / D11 (Standard specifications for password-based public-key cryptographic techniques), IEEE P1363 working group, Aug. 2003.
    • (2003)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.