-
1
-
-
0026850091
-
-
Bellovin, S.M., Merrit, M., 1992. Encrypted key exchanged: password-based protocols secure against dictionary attacks. In: Proceedings of IEEE Symposium on Research in Security and Privacy, pp. 72-84.
-
Bellovin, S.M., Merrit, M., 1992. Encrypted key exchanged: password-based protocols secure against dictionary attacks. In: Proceedings of IEEE Symposium on Research in Security and Privacy, pp. 72-84.
-
-
-
-
2
-
-
0029250361
-
The KryptoKnight family of light-weight protocols for authentication and key distribution
-
Bird R., Gopal I., Herzberg A., Janson P., Kutten S., Molva R., and Yung M. The KryptoKnight family of light-weight protocols for authentication and key distribution. IEEE/ACM Transactions on Networking 3 1 (1995) 31-41
-
(1995)
IEEE/ACM Transactions on Networking
, vol.3
, Issue.1
, pp. 31-41
-
-
Bird, R.1
Gopal, I.2
Herzberg, A.3
Janson, P.4
Kutten, S.5
Molva, R.6
Yung, M.7
-
3
-
-
2342566530
-
A novel three-party encrypted key exchange protocol
-
Chang C.C., and Chang Y.F. A novel three-party encrypted key exchange protocol. Computer Standards and Interfaces 26 5 (2004) 472-476
-
(2004)
Computer Standards and Interfaces
, vol.26
, Issue.5
, pp. 472-476
-
-
Chang, C.C.1
Chang, Y.F.2
-
5
-
-
0029531472
-
-
Gong, L., 1995. Optimal authentication protocols resistant to password guessing attack. In: Proceedings of the 8th IEEE Computer Security Foundation Workshop, pp. 24-29.
-
Gong, L., 1995. Optimal authentication protocols resistant to password guessing attack. In: Proceedings of the 8th IEEE Computer Security Foundation Workshop, pp. 24-29.
-
-
-
-
7
-
-
4043095653
-
Efficient three-party key exchange using smart cards
-
Jaung W.S. Efficient three-party key exchange using smart cards. IEEE Transactions on Consumer Electronics 50 2 (2004) 619-624
-
(2004)
IEEE Transactions on Consumer Electronics
, vol.50
, Issue.2
, pp. 619-624
-
-
Jaung, W.S.1
-
9
-
-
8344221264
-
Enhanced three-party encrypted key exchange without server public keys
-
Lee T.F., Hwang T., and Lin C.L. Enhanced three-party encrypted key exchange without server public keys. Computer and Security 23 7 (2004) 571-577
-
(2004)
Computer and Security
, vol.23
, Issue.7
, pp. 571-577
-
-
Lee, T.F.1
Hwang, T.2
Lin, C.L.3
-
10
-
-
25144525619
-
Efficient verifier-based key agreement protocol for three parties without server's public key
-
Lee S.W., Kim H.S., and Yoo K.Y. Efficient verifier-based key agreement protocol for three parties without server's public key. Applied Mathematics and Computation 167 2 (2005) 996-1003
-
(2005)
Applied Mathematics and Computation
, vol.167
, Issue.2
, pp. 996-1003
-
-
Lee, S.W.1
Kim, H.S.2
Yoo, K.Y.3
-
11
-
-
0008145442
-
Three-party encrypted key exchange: attacks and a solution
-
Lin C.L., Sun H.M., and Hwang T. Three-party encrypted key exchange: attacks and a solution. ACM Operating Systems Review 34 (2000) 12-20
-
(2000)
ACM Operating Systems Review
, vol.34
, pp. 12-20
-
-
Lin, C.L.1
Sun, H.M.2
Hwang, T.3
-
13
-
-
32244432466
-
Attack on the Sun-Chen-Hwang's three-party key agreement protocols using passwords
-
Nam J., Kim S., and Won D. Attack on the Sun-Chen-Hwang's three-party key agreement protocols using passwords. IEICE Transactions on Fundamentals E89-A 1 (2006) 209-212
-
(2006)
IEICE Transactions on Fundamentals
, vol.E89-A
, Issue.1
, pp. 209-212
-
-
Nam, J.1
Kim, S.2
Won, D.3
-
14
-
-
33845941453
-
Security weakness in a three-party pairing-based protocol for password authenticated key exchange
-
Nam J., Lee Y., Kim S., and Won D. Security weakness in a three-party pairing-based protocol for password authenticated key exchange. Information Sciences 177 6 (2007) 1364-1375
-
(2007)
Information Sciences
, vol.177
, Issue.6
, pp. 1364-1375
-
-
Nam, J.1
Lee, Y.2
Kim, S.3
Won, D.4
-
15
-
-
0028514601
-
Kerberos: an authentication service for computer networks
-
Neuman B.C., and Ts'o T. Kerberos: an authentication service for computer networks. IEEE Communication Magazine 32 9 (1994) 33-38
-
(1994)
IEEE Communication Magazine
, vol.32
, Issue.9
, pp. 33-38
-
-
Neuman, B.C.1
Ts'o, T.2
-
17
-
-
47549115877
-
-
Springer-Verlag pp. 239-252
-
Schnorr C.P. Efficient identification and signatures for smart cards. CRYPTO'89 (1990), Springer-Verlag pp. 239-252
-
(1990)
CRYPTO'89
-
-
Schnorr, C.P.1
-
19
-
-
9544230689
-
Secure key agreement protocols for three-party against guessing attacks
-
Sun H.M., Chen B.C., and Hwang T. Secure key agreement protocols for three-party against guessing attacks. The Journal of Systems and Software 75 (2005) 63-68
-
(2005)
The Journal of Systems and Software
, vol.75
, pp. 63-68
-
-
Sun, H.M.1
Chen, B.C.2
Hwang, T.3
-
20
-
-
21644467750
-
Provably secure three-party password-based authenticated key exchange protocol using Weil pairing
-
Wen H.A., Lee T.F., and Hwang T. Provably secure three-party password-based authenticated key exchange protocol using Weil pairing. IEE Proceedings of Communications 152 2 (2005) 138-143
-
(2005)
IEE Proceedings of Communications
, vol.152
, Issue.2
, pp. 138-143
-
-
Wen, H.A.1
Lee, T.F.2
Hwang, T.3
-
21
-
-
0345098454
-
Efficient three-party authentication and key agreement protocols resistant to password guessing attacks
-
Yeh H.T., Sun H.M., and Hwang T. Efficient three-party authentication and key agreement protocols resistant to password guessing attacks. International Journal of Information and System Engineering 19 6 (2003) 1059-1070
-
(2003)
International Journal of Information and System Engineering
, vol.19
, Issue.6
, pp. 1059-1070
-
-
Yeh, H.T.1
Sun, H.M.2
Hwang, T.3
|