-
1
-
-
0027741529
-
Augmented encrypted key exchange: A password-based protocol secure against dictionary attacks and password file compromise
-
S. M. Bellovin and M. Merritt, "Augmented encrypted key exchange: A password-based protocol secure against dictionary attacks and password file compromise", ACM Conf. Comp. & Comm. Security, pp.244-250, 1993.
-
(1993)
ACM Conf. Comp. & Comm. Security
, pp. 244-250
-
-
Bellovin, S.M.1
Merritt, M.2
-
2
-
-
0027615231
-
Protecting poorly chosen secrets from guessing attacks
-
L. Gong, M. Lomas, R. Needham, and J. Saltzer, " Protecting poorly chosen secrets from guessing attacks", IEEE J. Sel. Areas Commun., vol.11, no.5, pp.648-656, 1993.
-
(1993)
IEEE J. Sel. Areas Commun
, vol.11
, Issue.5
, pp. 648-656
-
-
Gong, L.1
Lomas, M.2
Needham, R.3
Saltzer, J.4
-
3
-
-
0002839106
-
Refinement and extension of encrypted key exchange
-
M. Steiner, G. Tsudik, and M. Waidner, "Refinement and extension of encrypted key exchange", ACM Operating Systems Review, vol.29, no.3, pp.22-30, 1995.
-
(1995)
ACM Operating Systems Review
, vol.29
, Issue.3
, pp. 22-30
-
-
Steiner, M.1
Tsudik, G.2
Waidner, M.3
-
4
-
-
0030261758
-
Strong password-only authenticated key exchange
-
D. Jablon, "Strong password-only authenticated key exchange," ACM Computer Communications Review, vol.20,no.5, pp.5-26, 1996.
-
(1996)
ACM Computer Communications Review
, vol.20
, Issue.5
, pp. 5-26
-
-
Jablon, D.1
-
5
-
-
0031381717
-
An adaptable and reliable authentication protocol for communication networks
-
T. Kwon, M. Kang, and J. Song, "An adaptable and reliable authentication protocol for communication networks", Proc. IEEE INFOCOM' 97, pp.737-744, 1997.
-
(1997)
Proc. IEEE INFOCOM' 97
, pp. 737-744
-
-
Kwon, T.1
Kang, M.2
Song, J.3
-
6
-
-
0032640752
-
xy via password authentication
-
May
-
xy via password authentication," Electron. Lett., vol.35, no.11,pp.892-893, May 1999.
-
(1999)
Electron. Lett
, vol.35
, Issue.11
, pp. 892-893
-
-
Kwon, T.1
Song, J.2
-
7
-
-
0019634370
-
Password authentication with insecure communications
-
L. Lamport, "Password authentication with insecure communications, " Commun. ACM, vol.24, no. 11, pp.770-772, 1981.
-
(1981)
Commun. ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
8
-
-
47349100384
-
-
A. Shimizu, A dynamic password authentication method by one-way function, IEICE Trans Commun., J73-D-I, no.7, pp.630-636, July 1990.
-
A. Shimizu, " A dynamic password authentication method by one-way function," IEICE Trans Commun., Vol.J73-D-I, no.7, pp.630-636, July 1990.
-
-
-
-
10
-
-
0032137355
-
A password authentication method for contents communication on the internet
-
Aug
-
A. Shimizu, T. Horioka, and H. Inagaki, "A password authentication method for contents communication on the internet," IEICE Trans.Commun., vol.E81-B, no.8, pp.1666-1673, Aug. 1998.
-
(1998)
IEICE Trans.Commun
, vol.E81-B
, Issue.8
, pp. 1666-1673
-
-
Shimizu, A.1
Horioka, T.2
Inagaki, H.3
-
11
-
-
0034204951
-
Simple and secure password authentication protocol (SAS)
-
June
-
M. Sandirigama, A. Shimizu, and M.T. Noda, "Simple and secure password authentication protocol (SAS)," IEICE Trans. Commun., vol.E83-B, no.6, pp.1363-1365, June 2000.
-
(2000)
IEICE Trans. Commun
, vol.E83-B
, Issue.6
, pp. 1363-1365
-
-
Sandirigama, M.1
Shimizu, A.2
Noda, M.T.3
-
12
-
-
0035445093
-
Attacks and solutions on strong-password authentication
-
Step
-
C.L. Lin, H.M. Sun, and T. Hwang, "Attacks and solutions on strong-password authentication", IEICE Trans. Commun., vol.E84-B, no.9, pp.2622-2627, Step. 2001.
-
(2001)
IEICE Trans. Commun
, vol.E84-B
, Issue.9
, pp. 2622-2627
-
-
Lin, C.L.1
Sun, H.M.2
Hwang, T.3
-
13
-
-
23444434098
-
Security enhancement for optimal strong password authentication protocol
-
April
-
C.W. Lin, J. J. Shen, and M. S. Hwang, "Security enhancement for optimal strong password authentication protocol," ACM Operating Systems Review, vol. 37, no. 2, pp. 7-12, April 2003.
-
(2003)
ACM Operating Systems Review
, vol.37
, Issue.2
, pp. 7-12
-
-
Lin, C.W.1
Shen, J.J.2
Hwang, M.S.3
-
14
-
-
33744725812
-
A hash-based strong-password authentication scheme without using smart card
-
Jan
-
W. C., Ku, "A hash-based strong-password authentication scheme without using smart card" ACM Operating Systems Review, vol. 38, no. 1, pp. 29-34, Jan. 2004.
-
(2004)
ACM Operating Systems Review
, vol.38
, Issue.1
, pp. 29-34
-
-
Ku, W.C.1
-
15
-
-
15244362289
-
Password-only authenticated key establishment protocol without public key cryptography
-
Feb
-
C.S. Laih, L. Ding and Y.M. Huang, "Password-only authenticated key establishment protocol without public key cryptography," Electronics Letters, Vol. 41, No. 4, pages 185-186, Feb. 2005.
-
(2005)
Electronics Letters
, vol.41
, Issue.4
, pp. 185-186
-
-
Laih, C.S.1
Ding, L.2
Huang, Y.M.3
-
16
-
-
47349089305
-
-
Richard E. Smith, The Strong Password Dilemma, published in CSI Computer Security Journal, 2002.
-
Richard E. Smith, "The Strong Password Dilemma," published in CSI Computer Security Journal, 2002.
-
-
-
|