-
1
-
-
0002805220
-
Undetectable on-line password guessing attacks
-
Ding, Y., Horster, P.: Undetectable on-line password guessing attacks. ACM Operating Systems Review 29(4), 77-86 (1995)
-
(1995)
ACM Operating Systems Review
, vol.29
, Issue.4
, pp. 77-86
-
-
Ding, Y.1
Horster, P.2
-
2
-
-
0001940580
-
Provably secure session key distribution: The three party case
-
ACM Press, New York
-
Bellare, M., Rogaway, P.: Provably secure session key distribution: The three party case. In: 27th ACM Symposium on the Theory of Computing.STOC 1995, pp. 57-66. ACM Press, New York (1995)
-
(1995)
27th ACM Symposium on the Theory of Computing.STOC
, pp. 57-66
-
-
Bellare, M.1
Rogaway, P.2
-
3
-
-
0002839106
-
Refinement and extension of encrypted key exchange
-
Steiner, M., Tsudik, G., Waidner, M.: Refinement and extension of encrypted key exchange. ACM Operating Systems Review 29(3), 22-30 (1995)
-
(1995)
ACM Operating Systems Review
, vol.29
, Issue.3
, pp. 22-30
-
-
Steiner, M.1
Tsudik, G.2
Waidner, M.3
-
4
-
-
0035701459
-
Three-party encrypted key exchange without server public-keys
-
Lin, C.L., Sun, H.M., Steiner, M., Hwang, T.: Three-party encrypted key exchange without server public-keys. IEEE Commun. Lett. 5(12), 497-499 (2001)
-
(2001)
IEEE Commun. Lett
, vol.5
, Issue.12
, pp. 497-499
-
-
Lin, C.L.1
Sun, H.M.2
Steiner, M.3
Hwang, T.4
-
5
-
-
2342566530
-
A novel three-party encrypted key exchange protocol
-
Chang, C.C., Chang, Y.F.: A novel three-party encrypted key exchange protocol. Computer Standards and Interfaces 26(5), 471-476 (2004)
-
(2004)
Computer Standards and Interfaces
, vol.26
, Issue.5
, pp. 471-476
-
-
Chang, C.C.1
Chang, Y.F.2
-
6
-
-
25144525619
-
Efficient verifier-based key agreement protocol for three parties without server's public key
-
Lee, S.W., Kim, H.S., Yoo, K.Y.: Efficient verifier-based key agreement protocol for three parties without server's public key. Appl. Math. Comput. 167(2), 996-1003 (2005)
-
(2005)
Appl. Math. Comput
, vol.167
, Issue.2
, pp. 996-1003
-
-
Lee, S.W.1
Kim, H.S.2
Yoo, K.Y.3
-
7
-
-
9544230689
-
Secure key agreement protocols for three-party against guessing attacks
-
Sun, H.M., Chen, B.C., Hwang, T.: Secure key agreement protocols for three-party against guessing attacks. Systems and Software 75, 63-68 (2005)
-
(2005)
Systems and Software
, vol.75
, pp. 63-68
-
-
Sun, H.M.1
Chen, B.C.2
Hwang, T.3
-
8
-
-
4043095653
-
Efficient three-party key exchange using smart cards
-
Jaung, W.S.: Efficient three-party key exchange using smart cards. IEEE Trans. Consum. Electron. 50(2), 619-624 (2004)
-
(2004)
IEEE Trans. Consum. Electron
, vol.50
, Issue.2
, pp. 619-624
-
-
Jaung, W.S.1
-
9
-
-
48249142956
-
Three-round smart card-based key exchange scheme
-
Kwon, J.O., Jeong, I.R., Lee, D.H.: Three-round smart card-based key exchange scheme. IEICE Trans. Commun. E90-B(11), 3255-3258 (2007)
-
(2007)
IEICE Trans. Commun
, vol.E90-B
, Issue.11
, pp. 3255-3258
-
-
Kwon, J.O.1
Jeong, I.R.2
Lee, D.H.3
-
10
-
-
35048900746
-
-
P
-
Abdalla, M., Bellare, M., Rogaway, P.: DHAES: An encryption scheme based on the Diffie-Hellman problem, Submission to IEEE P1363 (1998)
-
(1998)
DHAES: An encryption scheme based on the Diffie-Hellman problem, Submission to IEEE
, pp. 1363
-
-
Abdalla, M.1
Bellare, M.2
Rogaway, P.3
-
11
-
-
84937579774
-
-
Abdalla, M., Bellare, M., Rogaway, P.: The oracle Diffie-Hellman assumption and an analysis of DHIES, CT-RSA01, pp.143-158 (2001)
-
(2001)
The oracle Diffie-Hellman assumption and an analysis of DHIES, CT-RSA01
, pp. 143-158
-
-
Abdalla, M.1
Bellare, M.2
Rogaway, P.3
|