메뉴 건너뛰기




Volumn 58, Issue 4, 2009, Pages 641-648

Communication-efficient three-party protocols for authentication and key agreement

Author keywords

Authentication; Diffie Hellman; EKE; Key agreement; Network communication

Indexed keywords

AUTHENTICATION AND KEY AGREEMENTS; COMPUTATIONAL COSTS; DIFFIE-HELLMAN; EKE; ENCRYPTED KEY EXCHANGE; KEY AGREEMENT; NETWORK COMMUNICATION; PASSWORD GUESSING ATTACK; PUBLIC NETWORKS; SCIENCE AND ENGINEERING; SECURITY WEAKNESS; THREE-PARTY;

EID: 67649791953     PISSN: 08981221     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.camwa.2009.02.039     Document Type: Article
Times cited : (36)

References (16)
  • 3
    • 0030261758 scopus 로고    scopus 로고
    • Strong password-only authentication key exchange
    • Jablon D. Strong password-only authentication key exchange. Computer Communication Review 26 5 (1996) 5-26
    • (1996) Computer Communication Review , vol.26 , Issue.5 , pp. 5-26
    • Jablon, D.1
  • 5
    • 0345686108 scopus 로고    scopus 로고
    • Open key exchange: How to defeat dictionary attacks without encrypting public keys
    • 97
    • S. Lucks, Open key exchange: How to defeat dictionary attacks without encrypting public keys, in: Proceedings of the Security Protocol Workshop '97, 1997, pp. 79-90
    • (1997) Proceedings of the Security Protocol Workshop , pp. 79-90
    • Lucks, S.1
  • 6
    • 0031381717 scopus 로고    scopus 로고
    • An adaptable and reliable authentication protocol for communication networks
    • T. Kwon, M. Kang, J. Song, An adaptable and reliable authentication protocol for communication networks, in: Proceedings of IEEE INFOCOM 97, 1997, pp. 738-745
    • (1997) Proceedings of IEEE INFOCOM , vol.97 , pp. 738-745
    • Kwon, T.1    Kang, M.2    Song, J.3
  • 7
    • 0031680336 scopus 로고    scopus 로고
    • Efficient key exchange and authentication protocol protecting weak secrets
    • Kwon T., and Song J. Efficient key exchange and authentication protocol protecting weak secrets. IEICE Transactions on Fundamentals E81-A 1 (1998) 156-163
    • (1998) IEICE Transactions on Fundamentals , vol.E81-A , Issue.1 , pp. 156-163
    • Kwon, T.1    Song, J.2
  • 8
    • 0032182009 scopus 로고    scopus 로고
    • Authentication key exchange protocols resistant to password guessing attacks
    • Kwon T., and Song J. Authentication key exchange protocols resistant to password guessing attacks. IEE Communications 145 5 (1998) 304-308
    • (1998) IEE Communications , vol.145 , Issue.5 , pp. 304-308
    • Kwon, T.1    Song, J.2
  • 11
    • 0033157651 scopus 로고    scopus 로고
    • An improvement of the password-based authentication protocol (K1P) on security against replay attacks
    • Kwon T., Kang M., Jung S., and Song J. An improvement of the password-based authentication protocol (K1P) on security against replay attacks. IEICE Transaction on Communications E82-B 7 (1999) 991-997
    • (1999) IEICE Transaction on Communications , vol.E82-B , Issue.7 , pp. 991-997
    • Kwon, T.1    Kang, M.2    Jung, S.3    Song, J.4
  • 12
    • 0002805220 scopus 로고
    • Undetectable on-line password guessing attacks
    • Ding Y., and Horster P. Undetectable on-line password guessing attacks. ACM Operating System Review 29 4 (1995) 77-86
    • (1995) ACM Operating System Review , vol.29 , Issue.4 , pp. 77-86
    • Ding, Y.1    Horster, P.2
  • 13
    • 0008145442 scopus 로고    scopus 로고
    • Three-party encrypted key exchange: Attacks and a solution
    • Lin C.L., Sun H.M., and Hwang T. Three-party encrypted key exchange: Attacks and a solution. ACM Operating System Review 34 4 (2000) 12-20
    • (2000) ACM Operating System Review , vol.34 , Issue.4 , pp. 12-20
    • Lin, C.L.1    Sun, H.M.2    Hwang, T.3
  • 15
    • 0345098454 scopus 로고    scopus 로고
    • Efficient three-party authentication and key agreement protocols resistant to password guessing attacks
    • Yeh H.T., Sun H.M., and Hwang T. Efficient three-party authentication and key agreement protocols resistant to password guessing attacks. Information Science and Engineering 19 6 (2003) 1059-1070
    • (2003) Information Science and Engineering , vol.19 , Issue.6 , pp. 1059-1070
    • Yeh, H.T.1    Sun, H.M.2    Hwang, T.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.