-
1
-
-
84976665942
-
Timestamps in key distribution protocols
-
Denning D., and Sacco G.M. Timestamps in key distribution protocols. Communications of the ACM 24 8 (1981) 533-536
-
(1981)
Communications of the ACM
, vol.24
, Issue.8
, pp. 533-536
-
-
Denning, D.1
Sacco, G.M.2
-
4
-
-
0002805220
-
Undetectable on-line password guessing attacks
-
Ding Y., and Horster P. Undetectable on-line password guessing attacks. ACM Operating Systems Review 29 4 (1995) 77-86
-
(1995)
ACM Operating Systems Review
, vol.29
, Issue.4
, pp. 77-86
-
-
Ding, Y.1
Horster, P.2
-
5
-
-
0035701459
-
Three-party encrypted key exchange without server public-keys
-
Lin C.L., Sun H.M., Steiner M., and Hwang T. Three-party encrypted key exchange without server public-keys. IEEE Communication Letters 5 12 (2001) 497-499
-
(2001)
IEEE Communication Letters
, vol.5
, Issue.12
, pp. 497-499
-
-
Lin, C.L.1
Sun, H.M.2
Steiner, M.3
Hwang, T.4
-
6
-
-
84944063128
-
Password-authenticated key exchange between clients with different passwords
-
Springer
-
Byun J.W., Jeong I.R., Lee D.H., and Park C.-S. Password-authenticated key exchange between clients with different passwords. Proc. ICICS '02, Lecture Note in Computer Science vol. 2513 (2002), Springer 134-146
-
(2002)
Proc. ICICS '02, Lecture Note in Computer Science
, vol.2513
, pp. 134-146
-
-
Byun, J.W.1
Jeong, I.R.2
Lee, D.H.3
Park, C.-S.4
-
7
-
-
2342566530
-
A novel three-party encrypted key exchange protocol
-
Chang C.C., and Chang Y.F. A novel three-party encrypted key exchange protocol. Computer Standards and Interfaces 26 5 (2004) 471-476
-
(2004)
Computer Standards and Interfaces
, vol.26
, Issue.5
, pp. 471-476
-
-
Chang, C.C.1
Chang, Y.F.2
-
8
-
-
9544230689
-
Secure key agreement protocols for three-party against guessing attacks
-
Sun H.M., Chen B.C., and Hwang T. Secure key agreement protocols for three-party against guessing attacks. Journal of Systems and Software 75 1-2 (2005) 63-68
-
(2005)
Journal of Systems and Software
, vol.75
, Issue.1-2
, pp. 63-68
-
-
Sun, H.M.1
Chen, B.C.2
Hwang, T.3
-
9
-
-
12244259085
-
Improvement of Lee and Lee's authenticated key agreement scheme
-
Lee S.W., Kim H.S., and Yoo K.Y. Improvement of Lee and Lee's authenticated key agreement scheme. Applied Mathmatics and Computation 162 3 (2005) 1049-1053
-
(2005)
Applied Mathmatics and Computation
, vol.162
, Issue.3
, pp. 1049-1053
-
-
Lee, S.W.1
Kim, H.S.2
Yoo, K.Y.3
-
10
-
-
25144525619
-
Efficient verifier-based key agreement protocol for three parties without server's public key
-
Lee S.W., Kim H.S., and Yoo K.Y. Efficient verifier-based key agreement protocol for three parties without server's public key. Applied Mathmatics and Computation 167 2 (2005) 996-1003
-
(2005)
Applied Mathmatics and Computation
, vol.167
, Issue.2
, pp. 996-1003
-
-
Lee, S.W.1
Kim, H.S.2
Yoo, K.Y.3
-
11
-
-
26044435697
-
Cryptanalysis of Lee-Kim-Yoo password-based key agreement scheme
-
Kwon J.O., Hwang J.Y., Kim C.W., and Lee D.H. Cryptanalysis of Lee-Kim-Yoo password-based key agreement scheme. Applied Mathmatics and Computation 168 2 (2005) 858-865
-
(2005)
Applied Mathmatics and Computation
, vol.168
, Issue.2
, pp. 858-865
-
-
Kwon, J.O.1
Hwang, J.Y.2
Kim, C.W.3
Lee, D.H.4
-
12
-
-
33646809001
-
A simple threshold authenticated key exchange from short secrets
-
Springer
-
Abdalla M., Chevassut O., Fouque P.-A., and Pointcheval D. A simple threshold authenticated key exchange from short secrets. Proc. Asiacrypt '05 Lecture Note in Computer Science vol. 3788 (2005), Springer 566-584
-
(2005)
Proc. Asiacrypt '05 Lecture Note in Computer Science
, vol.3788
, pp. 566-584
-
-
Abdalla, M.1
Chevassut, O.2
Fouque, P.-A.3
Pointcheval, D.4
-
13
-
-
33746614267
-
Efficient password-authenticated key exchange for three-party secure against undetectable on-line dictionary attacks
-
Springer
-
Kwon J.O., Sakurai K., and Lee D.H. Efficient password-authenticated key exchange for three-party secure against undetectable on-line dictionary attacks. Proc. ICCS '06, Lecture Note in Computer Science vol. 3991 (2006), Springer 977-980
-
(2006)
Proc. ICCS '06, Lecture Note in Computer Science
, vol.3991
, pp. 977-980
-
-
Kwon, J.O.1
Sakurai, K.2
Lee, D.H.3
|