-
1
-
-
0027741529
-
Augmented encrypted key exchange: A password-based protocols secure against dictionary attacks and password file compromise
-
S.M. Bellovin, M. Merritt, (1993) Augmented encrypted key exchange: A password-based protocols secure against dictionary attacks and password file compromise, Proceedings of First ACM Conference on Computer & Communications Security, pp.244-250.
-
(1993)
Proceedings of First ACM Conference on Computer & Communications Security
, pp. 244-250
-
-
Bellovin, S.M.1
Merritt, M.2
-
2
-
-
67049109840
-
-
Y. Ding, P. Horster, (1995) Undetectable on-line password guessing attacks, ACM Operating Syst. Rev., pp.77-86.
-
Y. Ding, P. Horster, (1995) Undetectable on-line password guessing attacks, ACM Operating Syst. Rev., pp.77-86.
-
-
-
-
4
-
-
0018543411
-
Password security: A case history
-
R. Morris, K. Thompson, (1979) Password security: a case history. Communications of the ACM, 22(11), pp.594-597.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 594-597
-
-
Morris, R.1
Thompson, K.2
-
5
-
-
33644781729
-
A new protocol to counter online dictionary attacks
-
V. Goyal, V. Kumar, M. Singh, A. Abraham, and S. Sanyal, (2006) A new protocol to counter online dictionary attacks, Computers & Security, 25, pp.114-120.
-
(2006)
Computers & Security
, vol.25
, pp. 114-120
-
-
Goyal, V.1
Kumar, V.2
Singh, M.3
Abraham, A.4
Sanyal, S.5
-
6
-
-
0037230409
-
Robust and simple authentication protocol
-
H.Y. Chien, J.K. Jan, (2003) Robust and simple authentication protocol, Computer Journal, 46, pp.193-201.
-
(2003)
Computer Journal
, vol.46
, pp. 193-201
-
-
Chien, H.Y.1
Jan, J.K.2
-
7
-
-
0035445093
-
Attacks and solutions on strong-password authentication
-
C.L. Lin, H.M. Sun, T. Hwang, (2001) Attacks and solutions on strong-password authentication, IEICE Trans. Commun. E84-B, No. 9, pp.2622-2627.
-
(2001)
IEICE Trans. Commun
, vol.E84-B
, Issue.9
, pp. 2622-2627
-
-
Lin, C.L.1
Sun, H.M.2
Hwang, T.3
-
8
-
-
0032218224
-
Public-key cryptography and password protocols
-
San Francisco, CA, pp
-
S. Halevi, H. Krawczyk, (1998) Public-key cryptography and password protocols, Proceedings of the 5th ACM Conference on Computer and Communications Security, San Francisco, CA, pp.122-131.
-
(1998)
Proceedings of the 5th ACM Conference on Computer and Communications Security
, pp. 122-131
-
-
Halevi, S.1
Krawczyk, H.2
-
9
-
-
0028405583
-
A Remote Password Authentication Scheme Based upon ElGamal's Signature Scheme
-
C.C. Chang,W.Y. Liao, (1994) A Remote Password Authentication Scheme Based upon ElGamal's Signature Scheme, Computer & Security, Vol. 13, pp.137-144.
-
(1994)
Computer & Security
, vol.13
, pp. 137-144
-
-
Chang, C.C.1
Liao, W.Y.2
-
11
-
-
0034140374
-
A new remote user authentication scheme using smart card
-
M.S. Hwang, L.H. Li, (2000) A new remote user authentication scheme using smart card, IEEE Transactions on Consumer Electronics, 46(1), pp.28-30.
-
(2000)
IEEE Transactions on Consumer Electronics
, vol.46
, Issue.1
, pp. 28-30
-
-
Hwang, M.S.1
Li, L.H.2
-
12
-
-
1542335451
-
Efficient password authenticated key agreement using smart card
-
W. S. Juang, (2004) Efficient password authenticated key agreement using smart card, Computer & Security, 23, pp.167-173.
-
(2004)
Computer & Security
, vol.23
, pp. 167-173
-
-
Juang, W.S.1
-
13
-
-
25844495474
-
An efficient nonce-based authentication scheme with key agreement
-
Y.C. Chen, L.Y. Yeh, (2005) An efficient nonce-based authentication scheme with key agreement, Applied Mathematics and Computation, 169, pp.982-994.
-
(2005)
Applied Mathematics and Computation
, vol.169
, pp. 982-994
-
-
Chen, Y.C.1
Yeh, L.Y.2
-
14
-
-
0037008805
-
A simple remote user authentication scheme
-
M.S. Hwang, C.C. Lee, Y.L. Tang, (2002) A simple remote user authentication scheme, Mathematical and Computer Modelling,36, pp.103-107.
-
(2002)
Mathematical and Computer Modelling
, vol.36
, pp. 103-107
-
-
Hwang, M.S.1
Lee, C.C.2
Tang, Y.L.3
-
16
-
-
3042536394
-
Using IC Cards to Remotely Login Passwords without Verification Tables
-
Fukoka, Japan, pp
-
C.T. Wang, C.C. Chang, C.H. Lin, (2004) Using IC Cards to Remotely Login Passwords without Verification Tables, Proceedings of the 18th International Conference on Advanced Information Networking and Application(AINA), Fukoka, Japan, pp.321-326.
-
(2004)
Proceedings of the 18th International Conference on Advanced Information Networking and Application(AINA)
, pp. 321-326
-
-
Wang, C.T.1
Chang, C.C.2
Lin, C.H.3
|