메뉴 건너뛰기




Volumn 50, Issue 2, 2004, Pages 619-624

Efficient three-party key exchange using smart cards

Author keywords

[No Author keywords available]

Indexed keywords

COMMUNICATION CHANNELS (INFORMATION THEORY); COMPUTER CRIME; CRYPTOGRAPHY; SECURITY SYSTEMS; SERVERS; SMART CARDS;

EID: 4043095653     PISSN: 00983063     EISSN: None     Source Type: Journal    
DOI: 10.1109/TCE.2004.1309439     Document Type: Article
Times cited : (32)

References (23)
  • 3
    • 0036302680 scopus 로고    scopus 로고
    • An efficient and practical solution to remote authentication: Smart card
    • H. Chien, J. Jan, and Y. Tseng, "An efficient and practical solution to remote authentication: smart card," Computers and Security, Vol. 21, No. 4, pp. 372-375, 2002.
    • (2002) Computers and Security , vol.21 , Issue.4 , pp. 372-375
    • Chien, H.1    Jan, J.2    Tseng, Y.3
  • 4
    • 84870707379 scopus 로고    scopus 로고
    • A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack
    • Springer, New York
    • R. Cramer and V. Shoup, "A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack," Advances in Cryptology-Crypt'98, pp. 13-25, Springer, New York, 1998.
    • (1998) Advances in Cryptology-Crypt'98 , pp. 13-25
    • Cramer, R.1    Shoup, V.2
  • 6
    • 0002805220 scopus 로고
    • Undetectable on-line password guessing attacks
    • Y. Ding and P. Horster, "Undetectable on-line password guessing attacks," ACM Operating System Rev., Vol. 29, No. 4, pp. 77-86, 1995.
    • (1995) ACM Operating System Rev. , vol.29 , Issue.4 , pp. 77-86
    • Ding, Y.1    Horster, P.2
  • 7
    • 0034140374 scopus 로고    scopus 로고
    • A new remote user authentication scheme using smart cards
    • M. Hwang and L. Li, "A new remote user authentication scheme using smart cards," IEEE Trans. on Consumer Electronics, Vol. 46, No. 1, pp. 28-30, 2000.
    • (2000) IEEE Trans. on Consumer Electronics , vol.46 , Issue.1 , pp. 28-30
    • Hwang, M.1    Li, L.2
  • 8
    • 0000873739 scopus 로고
    • Reparable key distribution protocols for internet environments
    • T. Hwang and W. Ku, "Reparable key distribution protocols for internet environments," IEEE Trans. On Communications, Vol. 43, No. 5, pp. 1947-1950, 1995.
    • (1995) IEEE Trans. On Communications , vol.43 , Issue.5 , pp. 1947-1950
    • Hwang, T.1    Ku, W.2
  • 9
    • 1542335451 scopus 로고    scopus 로고
    • Efficient password authenticated key agreement using smart cards
    • W. Juang, "Efficient password authenticated key agreement using smart cards," Computers and Security, Vol. 23, No. 2, pp. 167-173, 2004.
    • (2004) Computers and Security , vol.23 , Issue.2 , pp. 167-173
    • Juang, W.1
  • 10
    • 1942455353 scopus 로고    scopus 로고
    • Efficient multi-server password authenticated key agreement using smart cards
    • W. Juang, "Efficient multi-server password authenticated key agreement using smart cards," IEEE Trans. on Consumer Electronics, Vol. 50, No. 1, pp. 251-255, 2004.
    • (2004) IEEE Trans. on Consumer Electronics , vol.50 , Issue.1 , pp. 251-255
    • Juang, W.1
  • 11
    • 1942423677 scopus 로고    scopus 로고
    • Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards
    • W. Ku and S. Chen, "Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards," IEEE Trans on Consumer Electronics, Vol. 50, No. 1, pp. 204-207, 2004.
    • (2004) IEEE Trans on Consumer Electronics , vol.50 , Issue.1 , pp. 204-207
    • Ku, W.1    Chen, S.2
  • 12
    • 0008145442 scopus 로고    scopus 로고
    • Three-party encrypted key exchange: Attacks and a solution
    • C. Lin, H. Sun and T. Hwang, "Three-party encrypted key exchange: attacks and a solution," ACM Operating System Rev., Vol. 34, No. 4, pp. 12-20, 2000.
    • (2000) ACM Operating System Rev. , vol.34 , Issue.4 , pp. 12-20
    • Lin, C.1    Sun, H.2    Hwang, T.3
  • 13
    • 0035701459 scopus 로고    scopus 로고
    • Three-party encrypted key exchange without server public-keys
    • C. Lin, H. Sun, M. Steiner and T. Hwang, "Three-party encrypted key exchange without server public-keys," IEEE Communications Letters, Vol. 5, No. 12, pp. 497-499, 2001.
    • (2001) IEEE Communications Letters , vol.5 , Issue.12 , pp. 497-499
    • Lin, C.1    Sun, H.2    Steiner, M.3    Hwang, T.4
  • 15
    • 84937461306 scopus 로고
    • One way hash functions and DES
    • Brassard, G. (ed.), Lecture Notes in Computer Science Springer, New York
    • R. Merkle, "One way hash functions and DES," In Brassard, G. (ed.), Advances in Cryptology-Crypt'89, Lecture Notes in Computer Science, 435, pp. 428-446, Springer, New York, 1989.
    • (1989) Advances in Cryptology-Crypt'89 , vol.435 , pp. 428-446
    • Merkle, R.1
  • 16
    • 0003629990 scopus 로고
    • NIST FIPS PUB 180, National Institute of Standards and Technology, U. S. Department of Commerce, DRAFT
    • NIST FIPS PUB 180, "Secure Hash Standard," National Institute of Standards and Technology, U. S. Department of Commerce, DRAFT, 1993.
    • (1993) Secure Hash Standard
  • 17
    • 0037542969 scopus 로고    scopus 로고
    • NIST FIPS PUB 197 National Institute of Standards and Technology, U. S. Department of Commerce
    • NIST FIPS PUB 197, "Announcing the Advanced Encryption Standard(AES)," National Institute of Standards and Technology, U. S. Department of Commerce, 2001.
    • (2001) Announcing the Advanced Encryption Standard(AES)
  • 18
    • 0017930809 scopus 로고
    • A Method for obtaining digital signatures and public key cryptosystems
    • R. Rivest, A. Shamir and L. Adleman, "A Method for obtaining digital signatures and public key cryptosystems," Comm. of ACM, Vol. 21, No. 2, pp. 120-126, 1978.
    • (1978) Comm. of ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.3
  • 19
    • 0003602325 scopus 로고
    • RFC 1321, Internet Activities Board, Internet Privacy Task Force
    • R. Rivest, "The MD5 message-digest algorithm," RFC 1321, Internet Activities Board, Internet Privacy Task Force, 1992.
    • (1992) The MD5 Message-Digest Algorithm
    • Rivest, R.1
  • 21
    • 0002839106 scopus 로고
    • Refinement and extension of encrypted key exchange
    • M. Steiner, G. Tsudik and M. Waidner, "Refinement and extension of encrypted key exchange," ACM Operating System Rev., Vol. 29, No. 3, pp. 22-30, 1995.
    • (1995) ACM Operating System Rev. , vol.29 , Issue.3 , pp. 22-30
    • Steiner, M.1    Tsudik, G.2    Waidner, M.3
  • 23
    • 0034318245 scopus 로고    scopus 로고
    • An efficient remote user authentication scheme using smart cards
    • H. Sun, "An efficient remote user authentication scheme using smart cards," IEEE Trans on Consumer Electronics, Vol. 46, No. 4, pp. 958-961, 2000.
    • (2000) IEEE Trans on Consumer Electronics , vol.46 , Issue.4 , pp. 958-961
    • Sun, H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.