메뉴 건너뛰기




Volumn 29, Issue 5, 2007, Pages 513-520

Efficient verifier-based password-authenticated key exchange in the three-party setting

Author keywords

Cryptology; Dictionary attack; Password authenticated key exchange; Verifier based

Indexed keywords

AUTHENTICATION; COMPUTER CRIME; GLOSSARIES; NETWORK PROTOCOLS; PROBLEM SOLVING; SECURITY OF DATA; SERVERS;

EID: 34248672528     PISSN: 09205489     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.csi.2006.12.002     Document Type: Review
Times cited : (33)

References (13)
  • 1
    • 84976665942 scopus 로고
    • Timestamps in key distribution protocols
    • Denning D., and Sacco G.M. Timestamps in key distribution protocols. Communications of the ACM 24 8 (1981) 533-536
    • (1981) Communications of the ACM , vol.24 , Issue.8 , pp. 533-536
    • Denning, D.1    Sacco, G.M.2
  • 4
    • 0002805220 scopus 로고
    • Undetectable on-line password guessing attacks
    • Ding Y., and Horster P. Undetectable on-line password guessing attacks. ACM Operating Systems Review 29 4 (1995) 77-86
    • (1995) ACM Operating Systems Review , vol.29 , Issue.4 , pp. 77-86
    • Ding, Y.1    Horster, P.2
  • 5
    • 0035701459 scopus 로고    scopus 로고
    • Three-party encrypted key exchange without server public-keys
    • Lin C.L., Sun H.M., Steiner M., and Hwang T. Three-party encrypted key exchange without server public-keys. IEEE Communication Letters 5 12 (2001) 497-499
    • (2001) IEEE Communication Letters , vol.5 , Issue.12 , pp. 497-499
    • Lin, C.L.1    Sun, H.M.2    Steiner, M.3    Hwang, T.4
  • 7
    • 2342566530 scopus 로고    scopus 로고
    • A novel three-party encrypted key exchange protocol
    • Chang C.C., and Chang Y.F. A novel three-party encrypted key exchange protocol. Computer Standards and Interfaces 26 5 (2004) 471-476
    • (2004) Computer Standards and Interfaces , vol.26 , Issue.5 , pp. 471-476
    • Chang, C.C.1    Chang, Y.F.2
  • 8
    • 9544230689 scopus 로고    scopus 로고
    • Secure key agreement protocols for three-party against guessing attacks
    • Sun H.M., Chen B.C., and Hwang T. Secure key agreement protocols for three-party against guessing attacks. Journal of Systems and Software 75 1-2 (2005) 63-68
    • (2005) Journal of Systems and Software , vol.75 , Issue.1-2 , pp. 63-68
    • Sun, H.M.1    Chen, B.C.2    Hwang, T.3
  • 9
    • 12244259085 scopus 로고    scopus 로고
    • Improvement of Lee and Lee's authenticated key agreement scheme
    • Lee S.W., Kim H.S., and Yoo K.Y. Improvement of Lee and Lee's authenticated key agreement scheme. Applied Mathmatics and Computation 162 3 (2005) 1049-1053
    • (2005) Applied Mathmatics and Computation , vol.162 , Issue.3 , pp. 1049-1053
    • Lee, S.W.1    Kim, H.S.2    Yoo, K.Y.3
  • 10
    • 25144525619 scopus 로고    scopus 로고
    • Efficient verifier-based key agreement protocol for three parties without server's public key
    • Lee S.W., Kim H.S., and Yoo K.Y. Efficient verifier-based key agreement protocol for three parties without server's public key. Applied Mathmatics and Computation 167 2 (2005) 996-1003
    • (2005) Applied Mathmatics and Computation , vol.167 , Issue.2 , pp. 996-1003
    • Lee, S.W.1    Kim, H.S.2    Yoo, K.Y.3
  • 13
    • 33746614267 scopus 로고    scopus 로고
    • Efficient password-authenticated key exchange for three-party secure against undetectable on-line dictionary attacks
    • Springer
    • Kwon J.O., Sakurai K., and Lee D.H. Efficient password-authenticated key exchange for three-party secure against undetectable on-line dictionary attacks. Proc. ICCS '06, Lecture Note in Computer Science vol. 3991 (2006), Springer 977-980
    • (2006) Proc. ICCS '06, Lecture Note in Computer Science , vol.3991 , pp. 977-980
    • Kwon, J.O.1    Sakurai, K.2    Lee, D.H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.