-
1
-
-
0027741529
-
Augmented encrypted key exchange: A password-based protocol secure against dictionary attacks and password-file compromise
-
S. Bellovin and M. Merritt, "Augmented encrypted key exchange: A password-based protocol secure against dictionary attacks and password-file compromise," in Proceedings of the ACM Conference on Computer and Communications Security, pp. 244-250, 1993.
-
(1993)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 244-250
-
-
Bellovin, S.1
Merritt, M.2
-
2
-
-
0037285263
-
Stolen-verifier attack on two new strong-password authentication protocols
-
Nov
-
C. M. Chen and W. C. Ku, "Stolen-verifier attack on two new strong-password authentication protocols," IEICE Transactions on Communications, vol. E85-B, no. 11, pp. 2519-2521, Nov. 2002.
-
(2002)
IEICE Transactions on Communications
, vol.E85-B
, Issue.11
, pp. 2519-2521
-
-
Chen, C.M.1
Ku, W.C.2
-
5
-
-
0000873739
-
Reparable key distribution protocols for Internet environments
-
May
-
T. Hwang and W. C. Ku, "Reparable key distribution protocols for Internet environments," IEEE Transactions on Communications, vol. 43, no. 5, pp. 1947-1950, May 1995.
-
(1995)
IEEE Transactions on Communications
, vol.43
, Issue.5
, pp. 1947-1950
-
-
Hwang, T.1
Ku, W.C.2
-
6
-
-
0030261758
-
Strong password-only authenticated key exchange
-
D. Jablon, "Strong password-only authenticated key exchange," ACM Computer Communications Review, vol. 20, no. 5, pp. 5-26, 1996.
-
(1996)
ACM Computer Communications Review
, vol.20
, Issue.5
, pp. 5-26
-
-
Jablon, D.1
-
7
-
-
0142007776
-
Cryptanalysis of a variant of Peyravian-Zunic's password authentication scheme
-
May
-
W. C. Ku, C. M. Chen, and H. L. Lee, "Cryptanalysis of a variant of Peyravian-Zunic's password authentication scheme," IEICE Transactions on Communications, vol. E86-B, no. 5, pp. 1682-1684, May 2003.
-
(2003)
IEICE Transactions on Communications
, vol.E86-B
, Issue.5
, pp. 1682-1684
-
-
Ku, W.C.1
Chen, C.M.2
Lee, H.L.3
-
8
-
-
21244469256
-
Two simple attacks on Lin-Shen-Hwang's strong-password authentication protocol
-
Oct
-
W. C. Ku, H. C. Tsai, and S. M. Chen, "Two simple attacks on Lin-Shen-Hwang's strong-password authentication protocol," ACM Operating Systems Review, vol. 37, no. 4, pp. 26-31, Oct. 2003.
-
(2003)
ACM Operating Systems Review
, vol.37
, Issue.4
, pp. 26-31
-
-
Ku, W.C.1
Tsai, H.C.2
Chen, S.M.3
-
9
-
-
0019634370
-
Password authentication with insecure communication
-
Nov
-
L. Lamport, "Password authentication with insecure communication," Communications of the ACM, vol. 24, no. 11, pp. 770-772, Nov. 1981.
-
(1981)
Communications of the ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
10
-
-
0035445093
-
Attacks and solutions on strong-password authentication
-
Sept
-
C. L. Lin, H. M. Sun, and T. Hwang, "Attacks and solutions on strong-password authentication," IEICE Transactions on Communications, vol. E84-B, no. 9, pp. 2622-2627, Sept. 2001.
-
(2001)
IEICE Transactions on Communications
, vol.E84-B
, Issue.9
, pp. 2622-2627
-
-
Lin, C.L.1
Sun, H.M.2
Hwang, T.3
-
11
-
-
23444434098
-
Security enhancement for optimal strong password authentication protocol
-
April
-
C. W. Lin, J. J. Shen, and M. S. Hwang, "Security enhancement for optimal strong password authentication protocol," ACM Operating Systems Review, vol. 37, no. 2, pp. 7-12, April 2003.
-
(2003)
ACM Operating Systems Review
, vol.37
, Issue.2
, pp. 7-12
-
-
Lin, C.W.1
Shen, J.J.2
Hwang, M.S.3
-
12
-
-
0013456359
-
Comments on the S/KEY user authentication scheme
-
Oct
-
C. J. Mitchell and L. Chen, "Comments on the S/KEY user authentication scheme," ACM Operating Systems Review, vol. 30, no. 4, pp. 12-16, Oct. 1996.
-
(1996)
ACM Operating Systems Review
, vol.30
, Issue.4
, pp. 12-16
-
-
Mitchell, C.J.1
Chen, L.2
-
13
-
-
0034204951
-
Simple and secure password authentication protocol (SAS)
-
June
-
M. Sandirigama, A. Shimizu, and M. T. Noda, "Simple and secure password authentication protocol (SAS)," IEICE Transactions on Communications, vol. E83-B, no. 6, pp. 1363-1365, June 2000.
-
(2000)
IEICE Transactions on Communications
, vol.E83-B
, Issue.6
, pp. 1363-1365
-
-
Sandirigama, M.1
Shimizu, A.2
Noda, M.T.3
-
14
-
-
34248565307
-
-
A. Shimizu, A dynamic password authentication method by one-way function, IEICE Transactions, J73-D-I, no. 7, pp. 630-636, July 1990.
-
A. Shimizu, "A dynamic password authentication method by one-way function," IEICE Transactions, vol. J73-D-I, no. 7, pp. 630-636, July 1990.
-
-
-
-
15
-
-
0032137355
-
A password authentication methods for contents communication on the Internet
-
Aug
-
A. Shimizu, T. Horioka, and H. Inagaki, "A password authentication methods for contents communication on the Internet," IEICE Transactions on Communications, vol. E81-B, no. 8, pp. 1666-1673, Aug. 1998.
-
(1998)
IEICE Transactions on Communications
, vol.E81-B
, Issue.8
, pp. 1666-1673
-
-
Shimizu, A.1
Horioka, T.2
Inagaki, H.3
-
16
-
-
0141938442
-
An impersonation attack on one-time password authentication protocol OSPA
-
July
-
T. Tsuji and A. Shimizu, "An impersonation attack on one-time password authentication protocol OSPA," IEICE Transactions on Communications, vol. E86-B, no. 7, pp. 2182-2185, July 2003.
-
(2003)
IEICE Transactions on Communications
, vol.E86-B
, Issue.7
, pp. 2182-2185
-
-
Tsuji, T.1
Shimizu, A.2
-
17
-
-
34248548154
-
D11 (Standard specifications for password-based public-key cryptographic techniques), IEEE P1363 working group,
-
IEEE P1363.2, Aug
-
IEEE P1363.2 / D11 (Standard specifications for password-based public-key cryptographic techniques), IEEE P1363 working group, Aug. 2003.
-
(2003)
-
-
|