메뉴 건너뛰기




Volumn 181, Issue , 2005, Pages 251-265

The pairing problem with user interaction

Author keywords

Authentication; key exchange; pairing

Indexed keywords

AUTHENTICATION; SECURITY OF DATA; UBIQUITOUS COMPUTING;

EID: 33745121720     PISSN: 18684238     EISSN: None     Source Type: Book Series    
DOI: 10.1007/0-387-25660-1_17     Document Type: Conference Paper
Times cited : (4)

References (14)
  • 1
    • 0026850091 scopus 로고
    • Encrypted key exchange: Password-based protocols secure againsr dictionnary attacks
    • IEEE Computer Society Press
    • Steven M. Bellovin and Michael Menitt, Encrypted key exchange: Password-based protocols secure againsr dictionnary attacks, EEE symposium on Research In Securtya nd Pnvacy, IEEE Computer Society Press, 1992, pp. 72-84.
    • (1992) EEE symposium on Research In Securtya nd Pnvacy , pp. 72-84
    • Bellovin, S.M.1    Menitt, M.2
  • 2
    • 33645603568 scopus 로고    scopus 로고
    • Protocols for authentication and key establishment
    • Springer-Verlag
    • Colin Boyd and Anish Mathuria, Protocols for authentication and key establishment, Infomation Security and Cryptography, Springer-Verlag, 2003.
    • (2003) Infomation Security and Cryptography
    • Boyd, C.1    Mathuria, A.2
  • 4
    • 84873466407 scopus 로고    scopus 로고
    • Authenticated key exchange secure against dictionary attacks, Advances in Cryptology (Eurocrypt'OO)
    • Springer-Verlag
    • Mihir Bellare, David Pointcheval, and Phillip Rogaway, Authenticated key exchange secure against dictionary attacks, Advances in Cryptology (Eurocrypt'OO), Lecture notes in computer science, vol. 1807, Springer-Verlag, 2000, pp. 139-155.
    • (2000) Lecture notes in computer science , vol.1807 , pp. 139-155
    • Bellare, M.1    Pointcheval, D.2    Rogaway, P.3
  • 5
    • 84945119254 scopus 로고
    • Entity authentrcation and key dirtribution, Advdnce? in Cryptology (Crypto'93)
    • Springer-Verlag
    • Mihir Bellare and Phillip Rogaway, Entity authentrcation and key dirtribution, Advdnce? in Cryptology (Crypto'93), Lecture notes in computer science, vol. 773, Springer-Verlag, 1994, p. 232.
    • (1994) Lecture notes in computer science , vol.773 , pp. 232
    • Bellare, M.1    Rogaway, P.2
  • 7
    • 84885060835 scopus 로고    scopus 로고
    • Enhancements to Bluetooth baseband secunr
    • Copenhagen, Denmark
    • Christian Gehann and Kaisa Nyberg, Enhancements to Bluetooth baseband secunr., Proceedings of Nordsec 2001,2001, Copenhagen, Denmark.
    • (2001) Proceedings of Nordsec 2001
    • Gehann, C.1    Nyberg, K.2
  • 8
    • 24644434353 scopus 로고    scopus 로고
    • Security in personal area networks
    • IEE, London
    • Christian Gehann and Kaisa Nyberg, Security in personal area networks, Security for Mobillty (2004), 191-230, IEE, London.
    • (2004) Security for Mobillty , pp. 191-230
    • Gehann, C.1    Nyberg, K.2
  • 9
    • 34247333484 scopus 로고    scopus 로고
    • The ephenieralparring problem, Elghth International Conference on FInancial Cryptography
    • Springer-Verlag, Key West, FL, USA
    • Jaap-Henk Hoepman, The ephenieralparring problem, Elghth International Conference on FInancial Cryptography, Lecture notes in computer science, vol. 3 110, Springer-Verlag, 2004, Key West, FL, USA, pp. 212-226.
    • (2004) Lecture notes in computer science , vol.3110 , pp. 212-226
    • Hoepman, J.-H.1
  • 10
    • 84885055342 scopus 로고    scopus 로고
    • Ephemeral pairing on anonymous networks, To appear in the Proceedings of Second IEEE International Workshop on Pervasive Computing and Communication Security
    • Springer-Verlag
    • Christian Gehann and Kaisa Nyberg, Ephemeral pairing on anonymous networks, To appear in the Proceedings of Second IEEE International Workshop on Pervasive Computing and Communication Security, Lecture notes in computer science, Springer-Verlag, 2005.
    • (2005) Lecture notes in computer science
    • Gehann, C.1    Nyberg, K.2
  • 12
    • 85084161708 scopus 로고    scopus 로고
    • Dual-workfuctor encrypted key exchange: Efjicrentlypreventingpassword charning and dictionnary attacks
    • San Jose, California
    • Barry Jaspan, Dual-workfuctor encrypted key exchange: Efjicrentlypreventingpassword charning and dictionnary attacks, 6th USENIX Security Symposium, San Jose, California, 1996, pp. 4S50.
    • (1996) 6th USENIX Security Symposium
    • Jaspan, B.1
  • 13
    • 0029719080 scopus 로고    scopus 로고
    • Some nav attacks upon security protocols
    • IEEE Computer Society Press
    • Gavin Lowe, Some nav attacks upon security protocols, 9th JEEE Computer Security Fondations Workshop, IEEE Computer Society Press, 1996, pp. 162-169.
    • (1996) 9th JEEE Computer Security Fondations Workshop , pp. 162-169
    • Lowe, G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.