메뉴 건너뛰기




Volumn , Issue , 2008, Pages 839-844

Simultaneous authentication of equals: A secure, password-based key exchange for mesh networks

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL; AUTHENTICATION; COMPUTER CRIME; COMPUTER NETWORKS; NETWORK PROTOCOLS; ROUTERS; SENSOR NETWORKS; SENSORS; WIRELESS SENSOR NETWORKS; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 55849149445     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SENSORCOMM.2008.131     Document Type: Conference Paper
Times cited : (65)

References (15)
  • 1
    • 0026850091 scopus 로고
    • Encrypted Key Exchange: Password-based Protocols Secure Against Dictionary Attacks
    • IEEE
    • S. Bellovin and M. Merritt, Encrypted Key Exchange: Password-based Protocols Secure Against Dictionary Attacks. Proc of the Symposium on Security and Privacy, pages 72-84, IEEE, 1992
    • (1992) Proc of the Symposium on Security and Privacy , pp. 72-84
    • Bellovin, S.1    Merritt, M.2
  • 4
    • 84873466407 scopus 로고    scopus 로고
    • Authenticated Key Exchange Secure Aga inst Dictionary Attacks, Advances in Cryptology- Eurocrypt 2000
    • Springer-Verlag, pp
    • M. Bellare, D. Pointcheval and P. Rogaway, Authenticated Key Exchange Secure Aga inst Dictionary Attacks, Advances in Cryptology- Eurocrypt 2000, LNCS vol 1807, Springer-Verlag, pp. 139-155, 2000
    • (2000) LNCS , vol.1807 , pp. 139-155
    • Bellare, M.1    Pointcheval, D.2    Rogaway, P.3
  • 9
    • 0030261758 scopus 로고    scopus 로고
    • Strong Password-Only Authenticated Key Exchange
    • October
    • D. Jablon, Strong Password-Only Authenticated Key Exchange, ACM Computer Communications Review, October 1996
    • (1996) ACM Computer Communications Review
    • Jablon, D.1
  • 11
    • 0345686108 scopus 로고    scopus 로고
    • Open Key Exchange: How to Defeat Dictionary Attacks Without Encrypting Public Keys
    • Proc. of the Security Protocols Workshop, Springer-Verl ag
    • S. Lucks. Open Key Exchange: How to Defeat Dictionary Attacks Without Encrypting Public Keys. Proc. of the Security Protocols Workshop, LNCS 1361, Springer-Verl ag, 1997
    • (1997) LNCS , vol.1361
    • Lucks, S.1
  • 12
    • 0018543411 scopus 로고
    • Password Security: A Case Study
    • November
    • R. Morris, K. Thompson, Password Security: A Case Study, Communications of the ACM, Vol.22, No. 11, November, 1993
    • (1993) Communications of the ACM , vol.22 , Issue.11
    • Morris, R.1    Thompson, K.2
  • 13
    • 0003629991 scopus 로고    scopus 로고
    • National Institute of Standards and Technology, Federal Information Processing Standard FIPS
    • National Institute of Standards and Technology, Secure Hash Standard, Federal Information Processing Standard (FIPS) 180-2
    • Secure Hash Standard , pp. 180-182


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.